appendix b: referencesappendix b: references chapter 1 core concepts of active directory domain...
TRANSCRIPT
Appendix B: References
Chapter 1Core Concepts of Active Directory Domain Services: https:/ /docs. microsoft.com/ en- us/ windows/ desktop/ ad/ core- concepts- of-active- directory-domain- services
Active Directory Schema Terminology: https:/ /docs. microsoft. com/ en-us/windows/ desktop/ adschema/ active- directory- schema- site
ESE Deep Dive: Part 1: The Anatomy of an ESE database: https:/ /blogs.technet. microsoft. com/ askds/ 2017/ 12/04/ ese- deep- dive- part- 1-the-anatomy- of- an- ese- database/
What is Azure Active Directory?: https:/ /docs. microsoft. com/ en-us/azure/ active- directory/ fundamentals/ active- directory- whatis
Tutorial: Add an on-premises application for remote access through ApplicationProxy in Azure Active Directory: https:/ /docs. microsoft. com/ en-us/azure/ active- directory/ manage- apps/ application- proxy- add-on-premises- application
Chapter 2Privileged Access Management for Active Directory Domain Services: https:/ /docs. microsoft. com/ en- us/ microsoft- identity- manager/ pam/privileged- identity- management- for- active- directory- domain-services
Microsoft Identity Manager 2016 news and updates: https:/ / docs. microsoft.com/ en- us/ microsoft- identity- manager/ microsoft- identity- manager-2016
How Windows Hello for Business works: https:/ / docs. microsoft. com/en-us/windows/ security/ identity- protection/ hello- for- business/ hello-how- it- works
What is device management in Azure Active Directory?: https:/ / docs.microsoft. com/ en- us/ azure/ active- directory/ devices/ overview
Appendix B: References
[ 2 ]
Register your personal device on your organization's network: https:/ /docs.microsoft. com/ en- us/ azure/ active- directory/ user- help/ user- help-register- device- on- network
How to: Plan your Azure AD join implementation: https:/ /docs. microsoft.com/ en- us/ azure/ active- directory/ devices/ azureadjoin- plan
Chapter 3AD DS Design and Planning: https:/ /docs. microsoft. com/ en- us/windows- server/ identity/ ad-ds/ plan/ ad- ds-design- and-planning
Creating a Forest Design: https:/ / docs. microsoft. com/en- us/ windows-server/ identity/ ad- ds/ plan/creating- a- forest- design
Planning Domain Controller Placement: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad- ds/ plan/ planning- domain- controller-placement
Step by Step Guide to downgrade domain and forest functional level: http:/ /www. rebeladmin. com/ 2016/ 01/step- by- step- guide- to- downgrade-domain- and- forest- functional- level/
Virtualizing Domain Controllers using Hyper-V: https:/ /docs. microsoft.com/ en- us/ windows- server/ identity/ ad-ds/ get- started/ virtual- dc/virtualized- domain- controllers- hyper- v
Virtualizing a Windows Active Directory Domain Infrastructure: https:/ /www.vmware. com/ content/ dam/ digitalmarketing/ vmware/ en/ pdf/ techpaper/Virtualizing_ Windows_ Active_ Directory. pdf
Planning Global Catalog Server Placement: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad- ds/ plan/ planning- global- catalog-server- placement
Azure Active Directory Hybrid Identity Design Considerations: https:/ /docs.microsoft. com/ en- us/ azure/ active- directory/ hybrid/ plan- hybrid-identity- design- considerations- overview
Azure Active Directory Pass-through Authentication: http:/ /www. rebeladmin.com/ 2017/ 08/ azure- active- directory- pass- authentication/
Azure AD Connect: Design concepts: https:/ /docs. microsoft. com/ en-us/azure/ active- directory/ hybrid/ plan- connect- design- concepts
Azure Active Directory pricing: https:/ /azure. microsoft. com/ en- gb/pricing/ details/ active- directory/
Enterprise Mobility + Security pricing options: https:/ /www. microsoft. com/en-gb/ cloud- platform/ enterprise- mobility- security- pricing
Appendix B: References
[ 3 ]
Chapter 4DNS and AD DS: https:/ /docs. microsoft. com/ en- us/windows- server/identity/ ad- ds/ plan/ dns- and- ad-ds
Active Directory-Integrated DNS Zones: https:/ / docs. microsoft. com/en-us/windows- server/ identity/ ad- ds/ plan/ active- directory-integrated-dns-zones
Root Servers: https:/ /www. iana. org/ domains/ root/ servers
Azure DNS: https:/ / docs. microsoft. com/ en-us/ azure/ dns/ dns-overview
What is Azure DNS?: http:/ /www.rebeladmin. com/ 2016/ 03/ azure- dns/
Chapter 5FSMO Roles: https:/ /msdn. microsoft. com/ en- us/library/ cc223749.aspx
FSMO placement and optimization on Active Directory domaincontrollers: https:/ /support. microsoft. com/ en- gb/help/ 223346/ fsmo-placement- and- optimization- on- active- directory- domain- controllers
Using Ntdsutil.exe to transfer or seize FSMO roles to a domaincontroller: https:/ /support. microsoft. com/ en-gb/ help/ 255504/ using-ntdsutil- exe- to- transfer- or- seize- fsmo- roles- to- a-domain- control
Chapter 6Virtualizing Domain Controllers using Hyper-V: https:/ /docs. microsoft.com/ en- us/ windows- server/ identity/ ad-ds/ get- started/ virtual- dc/virtualized- domain- controllers- hyper- v
Virtualizing a Windows Active Directory Domain Infrastructure: https:/ /www.vmware. com/ content/ dam/ digitalmarketing/ vmware/ en/ pdf/ techpaper/Virtualizing_ Windows_ Active_ Directory. pdf
Step-by-Step Guide to Migrate from Active Directory 2012 R2 to Active Directory2019 (PowerShell Guide): http:/ / www.rebeladmin. com/2019/ 01/ step- step-guide- migrate- active- directory- 2012- r2- active- directory- 2019-powershell- guide/
Appendix B: References
[ 4 ]
Chapter 7Introducing Windows Admin Center: https:/ /www. microsoft. com/ en-us/cloud- platform/ windows- admin- center
Advanced AD DS Management Using Active Directory Administrative Center(Level 200): https:/ /docs. microsoft. com/ en- us/windows- server/identity/ ad- ds/ get- started/ adac/ advanced- ad- ds-management- using-active- directory- administrative- center- -level- 200-
Remote Server Administration Tools: https:/ /docs. microsoft. com/ en- us/windows- server/ remote/ remote- server- administration- tools
Remote Server Administration Tools for Windows 10: https:/ / www.microsoft.com/ en- gb/ download/ details. aspx? id= 45520
Chapter 8Active Directory Schema: https:/ /docs. microsoft. com/ en-us/ windows/desktop/ adschema/ active- directory- schema
Obtaining a Root OID from an ISO Name Registration Authority: https:/ /docs. microsoft. com/ en- us/ windows/ desktop/ ad/ obtaining- a-root- oid-from- an- iso- name- registration- authority
Managed Service Accounts: Understanding, Implementing, Best Practices, andTroubleshooting: https:/ / blogs. technet. microsoft. com/ askds/ 2009/ 09/10/managed- service- accounts- understanding- implementing- best-practices- and- troubleshooting/ #comments
Getting Started with Group Managed Service Accounts: https:/ / docs.microsoft. com/ en- us/ windows- server/ security/ group- managed-service- accounts/ getting- started- with- group- managed- service-accounts
Create the Key Distribution Services KDS Root Key: https:/ /docs. microsoft.com/ en- us/ windows- server/ security/ group- managed- service- accounts/create- the- key- distribution- services- kds- root- key
Creating an inetOrgPerson User: https:/ /docs. microsoft. com/ en-us/previous- versions/ windows/ it- pro/ windows- server- 2008- R2-and- 2008/dd378851(v%3dws. 10)
Appendix B: References
[ 5 ]
Chapter 9Delegating Administration of Account OUs and Resource OUs: https:/ / docs.microsoft. com/ en- us/ windows- server/ identity/ ad-ds/ plan/delegating- administration- of- account- ous- and- resource- ous
Delegating Administration of Default Containers and OUs: https:/ /docs.microsoft. com/ en- us/ windows- server/ identity/ ad-ds/ plan/delegating- administration- of- default- containers- and-ous
Creating an Organizational Unit Design: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad- ds/ plan/ creating- an- organizational-unit- design
Chapter 10Group Policy Architecture: https:/ /docs. microsoft. com/ en- gb/previous-versions/ windows/ desktop/ Policy/ group- policy- architecture
Group Policy Documentation Survival Guide: https:/ /docs. microsoft. com/en-us/ previous- versions/ windows/ it- pro/ windows- server- 2008- R2-and- 2008/ cc754151(v= ws. 10)
Group Policy Settings Reference for Windows and Windows Server: https:/ /www. microsoft. com/ en- gb/ download/ details. aspx? id= 25250
Group Policy Search: https:/ / gpsearch. azurewebsites. net/
Chapter 11Migrate SYSVOL replication to DFS Replication: https:/ / docs. microsoft.com/ en- us/ windows- server/ storage/ dfs-replication/ migrate- sysvol-to-dfsr
Creating a Site Link Bridge Design: https:/ / docs. microsoft. com/en- us/windows- server/ identity/ ad-ds/ plan/ creating- a-site- link- bridge-design
Designing the Site Topology: https:/ /docs. microsoft. com/ en- us/windows-server/ identity/ ad- ds/ plan/designing- the- site- topology
Appendix B: References
[ 6 ]
A Windows Server domain controller logs Directory Services event 2095 when itencounters a USN rollback: https:/ /support. microsoft. com/ en-gb/ help/875495/ how- to- detect- and- recover- from- a-usn- rollback- in-windows-server- dc
Active Directory Replication Concepts: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad-ds/ get- started/ replication/ active-directory- replication- concepts
Install a Windows Server 2012 Active Directory Read-Only Domain Controller(RODC) (Level 200): https:/ /docs. microsoft. com/ en-us/ windows-server/ identity/ ad- ds/ deploy/ rodc/ install- a- windows- server- 2012-active- directory- read- only-domain- controller- -rodc- -- level- 200-
Active Directory Backup and Restore: https:/ / docs. microsoft. com/en- us/previous- versions/ windows/ it- pro/ windows- server- 2000/ bb727048(v=technet. 10)
Chapter 12Public Key Infrastructure – tell me in plain English AND THEN deep technicalhow PKI works: https:/ /download. microsoft. com/ documents/ uk/ technet/learning/ downloads/ evenings/ 29th_ Nov-Public_ Key_ Infrastructure-tell_ me_ in_ plain_ English_ AND_ THEN_ deep_ technical_ how_ PKI_works.ppt
Public Key Infrastructure: https:/ / docs. microsoft. com/en- us/ windows/desktop/ seccertenroll/ public- key- infrastructure
Designing and Implementing a PKI: Part I Design and Planning: https:/ /blogs. technet. microsoft. com/ askds/ 2009/ 09/01/ designing- and-implementing- a- pki- part- i-design- and-planning/
Install the Certification Authority: https:/ /docs. microsoft. com/ en- us/windows- server/ networking/ core- network- guide/ cncg/ server- certs/install- the- certification- authority
Offline Root Certification Authority (CA): https:/ /social. technet.microsoft. com/ wiki/ contents/ articles/ 2900. offline- root-certification- authority- ca.aspx
Securing PKI: Compromise Response: https:/ /docs. microsoft. com/ en- us/previous- versions/ windows/ it- pro/ windows- server- 2012- r2-and- 2012/dn786435(v%3Dws. 11)
Appendix B: References
[ 7 ]
Chapter 13AD FS Scenarios for Developers: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad-fs/ overview/ ad-fs- scenarios- for-developers
AD FS Requirements: https:/ /docs. microsoft. com/ en-us/ windows-server/ identity/ ad- fs/ overview/ ad- fs-requirements
Plan Your AD FS Deployment Topology: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad- fs/ design/ plan- your- ad- fs-deployment- topology
Set up an AD FS lab environment: https:/ /docs. microsoft. com/ en- us/windows- server/ identity/ ad-fs/ operations/ set- up- an-ad- fs-lab-environment
Add an Attribute Store: https:/ /docs. microsoft. com/ en- us/windows-server/ identity/ ad- fs/ operations/ add-an- attribute- store
AD FS user sign-in customization: https:/ /docs. microsoft. com/ en- us/windows- server/ identity/ ad-fs/ operations/ ad- fs-user- sign- in-customization
Create a Claims Provider Trust: https:/ /docs. microsoft. com/ en-us/windows- server/ identity/ ad-fs/ operations/ create- a-claims-provider- trust
Chapter 14Licenses and Certificates, and how AD RMS protects and consumesdocuments: https:/ /techcommunity. microsoft. com/ t5/Enterprise-Mobility- Security/ Licenses- and- Certificates- and- how-AD- RMS-protects- and- consumes/ ba- p/247309
Comparing Azure Information Protection and AD RMS: https:/ /docs.microsoft. com/ en- us/ azure/ information- protection/ compare- on-premise
AD RMS Installation Best Practices: https:/ / techcommunity. microsoft.com/ t5/ Enterprise- Mobility- Security/ AD- RMS- Installation- Best-Practices/ ba- p/ 247318
How to Deploy AD RMS Policy Templates: https:/ / social. technet.microsoft. com/ wiki/ contents/ articles/ 3911. how- to- deploy- ad- rms-policy- templates. aspx
Migrating from AD RMS to Azure Information Protection: https:/ /docs.microsoft. com/ en- us/ azure/ information- protection/ migrate- from- ad-rms- to- azure- rms
Appendix B: References
[ 8 ]
Chapter 15Key Distribution Center documentation: https:/ /docs. microsoft. com/ en-us/windows/ desktop/ secauthn/ key-distribution- center
Microsoft Kerberos documentation: https:/ /docs. microsoft. com/ en- us/windows/ desktop/ secauthn/ microsoft- kerberos
Authentication Policies and Authentication Policy Silos: https:/ /docs.microsoft. com/ en- us/ windows- server/ security/ credentials-protection- and- management/ authentication- policies- and-authentication- policy- silos
Just Enough Administration: https:/ /docs. microsoft. com/ en- us/powershell/ jea/ overview
Privileged Identity Management documentation: https:/ /docs. microsoft.com/ en- us/ azure/ active- directory/ privileged- identity- management/
Azure Information Protection Documentation: https:/ /docs. microsoft. com/en-us/ azure/ information- protection/
Chapter 16Azure Active Directory PowerShell for Graph: https:/ /docs. microsoft. com/en-us/ powershell/ azure/ active- directory/ overview? view= azureadps-2.0Azure Active Directory PowerShell for Graph - Public Preview Release: https:/ /www. powershellgallery. com/packages/ AzureADPreview/ 2.0. 1.18
Manage Office 365 with Office 365 PowerShell: https:/ / docs. microsoft. com/en-us/ office365/ enterprise/ powershell/ manage- office- 365- with-office- 365- powershell
Azure AD Management with Azure CLI: https:/ /docs. microsoft. com/ en-us/cli/ azure/ ad? view= azure-cli- latest
GitHub Azure AD: https:/ /github. com/ AzureAD
Chapter 17Custom installation of Azure AD Connect: https:/ /docs. microsoft. com/ en-us/azure/ active- directory/ hybrid/ how-to- connect- install-custom#configuring- federation- with- ad- fs
Topologies for Azure AD Connect: https:/ /docs. microsoft. com/ en-us/azure/ active- directory/ hybrid/ plan- connect- topologies
Appendix B: References
[ 9 ]
Single sign-on to applications in Azure Active Directory: https:/ /docs.microsoft. com/ en- us/ azure/ active- directory/ manage- apps/ what- is-single- sign- on
Plan a single sign-on deployment: https:/ /docs. microsoft. com/ en- us/azure/ active- directory/ manage- apps/ plan- sso- deployment
Azure Active Directory Application Proxy – Part 01: http:/ / www.rebeladmin.com/ 2017/ 06/ azure- active- directory- application- proxy- part- 01/
Azure Active Directory Application Proxy – Part 02: http:/ / www.rebeladmin.com/ 2017/ 06/ azure- active- directory- application- proxy- part- 02/
Azure AD Connect: Staging server and disaster recovery: https:/ / docs.microsoft. com/ en- us/ azure/ active- directory/ hybrid/ how- to-connect-sync- staging- server
Azure AD Connect Staging Mode: http:/ /www. rebeladmin. com/ 2017/ 09/azure- ad- connect- staging- mode/
Chapter 18What is Advanced Threat Analytics?: https:/ /docs. microsoft. com/ en-us/advanced- threat- analytics/ what- is- ata
ATA Architecture: https:/ /docs.microsoft. com/ en- us/advanced- threat-analytics/ ata- architecture
Advanced Threat Analytics suspicious activity guide: https:/ /docs.microsoft. com/ en- us/ advanced- threat- analytics/ suspicious-activity- guide
Changing of the guard: How Microsoft moved from SCOM to AzureMonitor: https:/ /www. microsoft. com/ itshowcase/ blog/ changing- of-the- guard- how- microsoft- moved- from- scom- to- azure- monitor/
Azure Monitor Documentation: https:/ /docs. microsoft. com/ en- us/azure/azure- monitor/
Azure Sentinel Preview Documentation: https:/ /docs. microsoft. com/ en-gb/azure/ sentinel/
Hunt for threats within Azure Sentinel Preview: https:/ /docs. microsoft.com/ en- gb/ azure/ sentinel/ hunting
Appendix B: References
[ 10 ]
Chapter 19Active Directory Repadmin Tool: https:/ /social. technet. microsoft. com/wiki/ contents/ articles/ 50788. active- directory- repadmin- tool. aspx
Strict Replication Consistency – Myth versus Reality: https:/ /blogs. technet.microsoft. com/ askds/ 2010/ 02/ 15/strict- replication- consistency-myth- versus- reality/
Implementing Content Freshness protection in DFSR: https:/ /blogs. technet.microsoft. com/ askds/ 2009/ 11/ 18/implementing- content- freshness-protection- in- dfsr/
Backing Up and Restoring an Active Directory Server: https:/ /docs.microsoft. com/ en- us/ windows/ desktop/ ad/ backing- up- and- restoring-an-active- directory- server
Considerations for Active Directory Domain Services Backup: https:/ /docs.microsoft. com/ en- us/ windows/ desktop/ ad/ considerations- for- active-directory- domain- services- backup
How to Seize FSMO Roles (PowerShell Guide): http:/ /www. rebeladmin. com/2018/ 01/ seize- fsmo- roles- powershell- guide/