{"id":44,"date":"2014-04-29T21:00:35","date_gmt":"2014-04-30T01:00:35","guid":{"rendered":"http:\/\/blog.metcorp.org\/?p=44"},"modified":"2014-04-29T21:53:14","modified_gmt":"2014-04-30T01:53:14","slug":"ad-reading-how-key-active-directory-components-work","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=44","title":{"rendered":"AD Reading: How Key Active Directory Components Work"},"content":{"rendered":"<p>The following links provide in-depth information on how key Active Directory components work.<\/p>\n<ul>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772829%28WS.10%29.aspx\">AD Data Store<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/download\/en\/details.aspx?displaylang=en&amp;id=5838%20\">Windows Server 2003 Active Directory Branch Office Guide<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bridgehead_server_selection%28WS.10%29.aspx\">Bridgehead Server Selection (Windows 2008 R2)<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772726%28WS.10%29.aspx\">AD Replication Model<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb457027.aspx%20\">Certificate Revocation &amp; Status Checking<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/de-de\/library\/cc784268%28WS.10%29.aspx%20\">Core Group Policy<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772774%28WS.10%29.aspx%20\">DNS<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc759550%28WS.10%29.aspx%20\">How DNS Support for AD works<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb742582.aspx%20\">Windows 2000 DNS<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc782417%28WS.10%29.aspx\">DFS<\/a><\/li>\n<li><a href=\"https:\/\/blogs.technet.com\/themes\/blogs\/generic\/post.aspx?WeblogApp=askds&amp;y=2010&amp;m=08&amp;d=18&amp;WeblogPostName=fine-grained-password-policy-and-urgent-replication&amp;GroupKeys=\">Fine-Grained Password Policy<\/a><\/li>\n<li><a href=\"http:\/\/searchwindowsserver.techtarget.com\/news\/1195097\/Foreign-security-principals-and-the-Active-Direcory-architecture\">Foreign Security Principals &amp; AD<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc758169%28WS.10%29.aspx\">FRS<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc773108%28WS.10%29.aspx\">FSMOs<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc772815%28WS.10%29.aspx%20\">Kerberos 5<\/a><\/li>\n<li><a href=\"https:\/\/blogs.technet.com\/themes\/blogs\/generic\/post.aspx?WeblogApp=askds&amp;y=2008&amp;m=03&amp;d=06&amp;WeblogPostName=kerberos-for-the-busy-admin&amp;GroupKeys=%20\">Kerberos for the Busy Admin<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/bb742431.aspx\">Windows 2000 Kerberos Authentication<\/a><\/li>\n<li><a href=\"https:\/\/blogs.technet.com\/themes\/blogs\/generic\/post.aspx?WeblogApp=askds&amp;y=2009&amp;m=09&amp;d=10&amp;WeblogPostName=managed-service-accounts-understanding-implementing-best-practices-and-troubleshooting&amp;GroupKeys=%20\">Managed Service Accounts<\/a><\/li>\n<li><a href=\"http:\/\/technet.microsoft.com\/en-us\/library\/cc786128%28WS.10%29.aspx\">TCPIP<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following links provide in-depth information on how key Active Directory components work. AD Data Store Windows Server 2003 Active Directory Branch Office Guide Bridgehead Server Selection (Windows 2008 R2) AD Replication Model Certificate Revocation &amp; Status Checking Core Group Policy DNS How DNS Support for AD works Windows 2000 DNS DFS Fine-Grained Password Policy &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=44\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[5,6],"class_list":["post-44","post","type-post","status-publish","format-standard","hentry","category-technical-reading","tag-adreading","tag-mcm","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":1,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/44\/revisions"}],"predecessor-version":[{"id":45,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/44\/revisions\/45"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}