Title: Active Directory Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> SearchWin2000.com Webcasts
![]()
IN THIS ISSUE:
>
Perform bulk changes with ADModify
>
Why protect DNS?
>
Designing AD security through risk analysis
>
Active Directory FAQ
![Headlines]()
![]()
Perform bulk changes with ADModify
[Nick Cavalancia]
Many administrators find themselves with the need to make modifications to multiple users at once using the same values. While Windows 2003 does have limited ability to modify multiple objects, it still lacks granularity and flexibility. For example, you can select and modify multiple users, groups or computers within Active Directory Users & Computers. Enter Microsoft's ADModify version 2.0.
MORE INFO:
> Read past Active Directory tips.
> Browse for more Active Directory information.
![]() |
| |
![]() |
|
![]() |
SearchWin2000.com Webcasts
Sign up to receive the Webcast Alerts newsletter from SearchWin2000.com to hear about our latest webcasts with top experts. Webcast topics include Securing Computers Using GPOs, How to Stop Directory Harvest Attacks, Anti-Spam Best Practices, Exchange 2003 Migration Best Practices and more.
Subscribe now and you'll be notified of upcoming events!
|
| |
|
![]() |
Why protect DNS?
[James Michael Stewart]
Active Directory depends upon DNS. If DNS fails, so does Active Directory. This, in turn, means that if DNS fails, your entire network may be disabled. Many of the functions and features of AD use DNS to locate domain controllers, systems, services, clients, and other objects. It should be obvious that protecting DNS is almost as important as protecting AD itself.
Designing AD security through risk analysis
[James Michael Stewart]
When designing and ultimately deploying any environment, you need to take the time to perform a risk analysis or a threat evaluation. This focused activity will help in guiding your security efforts towards those areas in greatest need of immediate attention.
![Also on SearchWin2000.com]()
![]()
FAQ:
Active Directory FAQ
Got a question about Active Directory? It may have already been answered. Browse the responses here, and pose your question if you don't find an answer.
LEARNING CENTER:
Get up to speed: Five topics fast
Looking for a quick cram-session? Check out our five helpful learning guides and get up-to-speed fast.
CHAPTER OF THE WEEK:
'Group Policy Objects (GPOs)'
Need help managing or troubleshooting your GPOs? Then this chapter is for you. Get ready for an extensive run-down of various GPO-related problems and hands-on solutions to everything from GPO backup issues to applying stubborn GPO security filters.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Updates on new site content |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|