{"id":18,"date":"2014-04-27T15:00:30","date_gmt":"2014-04-27T20:00:30","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=18"},"modified":"2014-04-29T20:26:04","modified_gmt":"2014-04-30T01:26:04","slug":"ad-reading-active-directory-database","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=18","title":{"rendered":"AD Reading: Active Directory Database"},"content":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Database.<\/p>\n<p><strong>AD Database<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx\">How the Data Store Works<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_smep\">Data Store Architecture<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_kpjm\">Data Store Protocols<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_mkhb\">Data Store Interfaces<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_gchw\">Data Store Logical Structure<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_jddq\">Data Store Physical Structure<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_kceb\">Data Store Processes and Interactions<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_xuac\">Network Ports Used by the Data Store<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx#w2k3tr_adstr_how_krin\">Related Information<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961771.aspx\">Data Storage<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961758.aspx\">Directory Tree<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961769.aspx\">Storage Limits<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961761.aspx\">Directory Data Store<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961776.aspx\">Object-Based Security<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961779.aspx\">Growth Estimates for Active Directory Users and Organizational Units<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961778.aspx\">Data Characteristics<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961772.aspx\">Windows 2000 SAM Storage<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961773.aspx\">Data Model<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961764.aspx\">Container Objects and Leaf Objects<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc961591.aspx\">Directory Partitions<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx\">Extensible Storage Engine Files<\/a><\/li>\n<\/ul>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_TransactionLogFiles\">Transaction Log Files<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_TemproaryTransactionLogFiles\">Temporary Transaction Log Files<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_ReservedTransactionLogFiles\">Reserved Transaction Log Files<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_CheckpointFiles\">Checkpoint Files<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_DatabaseFiles\">Database Files<\/a><\/p>\n<p>o\u00a0\u00a0 <a href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/gg294069%28v=exchg.10%29.aspx#ExtensibleStorageEngineFiles_TemporaryDatabases\">Temporary Databases<\/a><\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc753609%28WS.10%29.aspx\">Active Directory Domain Services Database Mounting Tool (Snapshot Viewer or Snapshot Browser) Step-by-Step Guide<\/a><\/li>\n<li><a href=\"https:\/\/blogs.technet.com\/b\/askpfeplat\/archive\/2012\/11\/12\/mcm-active-directory-indexing-for-the-masses.aspx?Redirected=true\">MCM: Active Directory Indexing For the Masses<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The following are extremely useful resources for understanding the Active Directory Database. AD Database How the Data Store Works o\u00a0\u00a0 Data Store Architecture o\u00a0\u00a0 Data Store Protocols o\u00a0\u00a0 Data Store Interfaces o\u00a0\u00a0 Data Store Logical Structure o\u00a0\u00a0 Data Store Physical Structure o\u00a0\u00a0 Data Store Processes and Interactions o\u00a0\u00a0 Network Ports Used by the Data Store &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=18\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-18","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-adreading","tag-mcm","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/18\/revisions"}],"predecessor-version":[{"id":19,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/18\/revisions\/19"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=18"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}