Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Active Directory Disaster Recovery

You're reading from  Active Directory Disaster Recovery

Product type Book
Published in Jun 2008
Publisher
ISBN-13 9781847193278
Pages 252 pages
Edition 1st Edition
Languages
Author (1):
Florian Rommel Florian Rommel
Profile icon Florian Rommel
Toc

Table of Contents (17) Chapters close

Active Directory Disaster Recovery
Credits
About the Author
About the Reviewers
1. Preface
1. An Overview of Active Directory Disaster Recovery 2. Active Directory Design Principles 3. Design and Implement a Disaster Recovery Plan for Your Organization 4. Strengthening AD to Increase Resilience 5. Active Directory Failure On a Single Domain Controller 6. Recovery of a Single Failed Domain Controller 7. Recovery of Lost or Deleted Users and Objects 8. Complete Active Directory Failure 9. Site AD Infrastructure Failure (Hardware) 10. Common Recovery Tools Explained Sample Business Continuity Plan Bibliography

Analyze the Risks, Threats, and the Ways to Mitigate


In order to be able to analyze the risks and threats for our Active Directory (AD), we need to first understand what we are actually protecting. Active Directory is not exactly a physical entity that we are protecting. We are protecting the content and its function or service. The following things are the main points of an AD, that need protection and safe-keeping:

  • The ability of a user to log on to the domain and access resources located in your network.

  • The information for authentication and authorization, such as user names, passwords, and group memberships.

  • Personal information within the AD.

  • The ability of network-based services to start, authenticate, and function properly.

  • Group policy application to the workstation, which may contain specific security settings.

A crucial step (the actual basis for proceeding forward), is to analyze the cost involved in an outage of a part of your AD backbone.

This is should be outlined in your Business...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime