You are on page 1of 22

Domain Controller

And
Antivirus
Implementation

Submitted by:
Himanshu Pareek
060337
Final Yr. CS
HINDALCO
About Hindalco

 Hindalco was set up in Achievements


collaboration with •World's largest aluminium rolling company
Kaiser Aluminium and •
Chemicals •Fully integrated aluminium plant at
Renukoot, UP.
Collaboration, USA, in •
a record time of 18 •Aluminium wheels plant at Silvassa, in
months. The plant Dadra & Nagar Haveli.

started its commercial •.Foil plants at Silvassa and Kalwa.
production in the year •
1962 with a capacity of •Alumina refining capacity of 1,160,000 TPA
going up to 1,500,000 TPA.
20,000 tones per annum. •
 •Aluminum metal producing capacity of
445,000 TPA.
Workgroups

A workgroup is a logical group of


computers
• Characterized by a decentralized security
and and administration model
• Authentication provided by a local account
database – Security Accounts Manager
(SAM)
Limitations

• Users need unique accounts on each


workstation
• Users manage their own accounts (security
issues)
Windows Server 2003 and Domains
•Windows Server 2003 networks are organized into domains.

•A domain is a centralized collection of common security policies,
user, and computer accounts.

•This collection of accounts is stored within Active Directory.
•called domain controllers which host the AD DB

•Users must log in and be authenticated by a domain controller
before they can access resources in a domain.

•Members of a domain share a common DNS suffix (such as
companyname.internal or cis121.local).
What is a Domain?
A domain is a logical group of
computers
•Characterized by centralized
authentication and administration
•Authentication provided through
centralized Active Directory

•Active Directory database can be
physically distributed across domain
controllers

•Requires at least one system
configured as a domain controller
Trees and Forests
subsidiary.com
company.com

•A forest is a
collection of domains
(uncommon namespaces) kid.company.com

that share the same child.company.com


Active Directory schema. child.subsidiary.com


•A tree is a collection
of domains within a west.kid.company.com east.kid.company.com

forest that share a


common DNS namespace.

•A schema is the structure of the database


•what objects exist
•what attributes or properties of these
objects can be assigned
Trees and Forests

Active Directory organizes multiple


domains hierarchically in a domain tree


• Root domain: base of Active Directory tree
• Child domains: branch out to separate
groups of objects with same policies
• Organizational units branch out underneath
child domains to further subdivide
network’s systems and objects
Tru st R e la tio n sh ip
•A trust relationship means that users
in one domain can access resources in a
different domain.

•Trust relationships exist between all
domains in a forest.

•Forest trusts allow all domains in one
forest to automatically trust all domains
in a second forest.

•Trusts can be changed: 2 way, 1 way


Trust Relationships

Two-way trusts between domains in a tree


Introduction to Windows Server 2003
Active Directory
Provides the following services

• Central point for storing and managing


network objects
• Central point for administration of objects
and resources
• Logon and authentication services
• Delegation of administration
Introduction to Windows Server 2003
Active Directory Continued

•Stored on domain controllers in the


network
•Changes made to any Active Directory

will be replicated across all domain


controllers
• Multimaster replication
• Fault tolerance for domain controller failure
Uses Domain Name Service (DNS)

conventions for network resources


What is Domain Controller?

•E xp licitly co n fig u re d to sto re


a co p y o f A ctive D ire cto ry
•S e rvice u se r a u th e n tica tio n
re q u e sts
•S e rvice q u e rie s a b o u t
d o m a in o b je cts
•M a y b e a d e d ica te d se rve r
b u t is n o t re q u ire d to b e
Domain Controller(continued)

•Domain controllers: host the Active Directory database.


- should use at least two on each network
• Replication: identical copy of directory data on domain
controller
• Member servers: do not store AD information and can not
authenticate users
Planning For Installation
 Critical preinstallation decisions:
 How many, how large, and what kind of
partitions will the server require?
 What type of file system will the server use?
 What will you name the server?
 Which protocols & network services should
the server use?
 What will the Administrator password be?
 Should the network use domains or
workgroups and, if so, what will they be
called?
 Will the server support additional services?
 Which licensing mode will you use?
 How can I remember all of this information?
Domain Controller Security
Policy
 Password Policy, Account Policy, and
Kerberos Policy settings are only
applicable to domain objects
 Other nodes in Security Settings
category can be applied at both
domain and OU levels
 Local Policies
 Audit Policy
 User Rights Assignment
 Security Options
Managing Security Settings
(continued)
• Event Log
• Restricted Groups
• System Services
• Registry
• File System
• Wireless Network Policies
• Public Key Policies
• Software Restriction Policies
• IP Security Policies on Active Directory
Configuring Domain Controller Security
Policy
Object Security Settings
 Objective: Use Domain Controller
Security Policy settings to
configure a logon banner for
domain users
 Use Active Directory Users and
Computers to access the Default
Domain Policy GPO
 Create a logon banner
 Verify that the banner appears
Configuring File System Security
Using
Domain Controller Security
 Policy
Objective: Use Domain Controller
Security Policy settings to
configure security permissions
 Create a folder
 Use Active Directory Users and
Computers to configure the
permissions on the folders
 Update Security Policy settings on
the server
Antivirus Implementation

 The chapters studied above are


tested with an antivirus installation
 Run the antivirus setup by typing ip
address of the workgroup which
has its setup in Run Command
 The Domain Controller asks for
Username and Password
 It authenticates the user and
allows/denies as per the
permissions
THANK YOU
Queries Please?

You might also like