- Microsoft Application Virtualization Cookbook
- James Preston
- 388字
- 2021-07-16 20:43:38
Configuring Active Directory
This recipe shows you the Active Directory configuration on a domain controller that will be used through this cookbook. In addition, it shows the configuration of a Group Policy Object (GPO) that will allow traffic through the firewall of Windows servers.
Getting ready
It is assumed that you have access rights to create objects in Active Directory, including Organizational Units (OUs), security groups, and user accounts.
How to do it...
The following list shows you the fundamental tasks involved in this recipe and the tasks required to complete the recipe (all of the actions in this recipe will take place on the server with the hostname DC
):
- Creating required OUs
- Creating required security groups
- Creating required computer accounts and user accounts
- Creating a new GPO and linking it to an OU
- Configuring the GPO with a Windows firewall policy
The implementation of the preceding steps is as follows:
- Create the following OUs and pre-provision the computer accounts as shown:
- Under the Domain Groups OU, create the following Security Groups:
- Under Domain Users, create the following user accounts. In addition to this, add Sam Adams to the App-V Administrators Security Group option:
- Open the Group Policy Management Console (GPMC) console, expand the OU tree to show Domain Servers, and then right-click on the App-V Servers OU. From the menu that appears, click on Create a GPO in this domain, and Link it here.
- In the dialogue box that appears, enter
Allow 440-442
as the name and click on OK. - In the new window that appears, right-click on the policies title option, and from the menu that appears, click on Properties.
- Tick the Disable User Configuration settings checkbox and click on OK:
- Expand the tree structure to navigate to Computer Configuration | Policies | Windows Settings | Security Settings | Windows Firewall with Advanced Security | Windows Firewall with Advanced Security – LDAP.
- Right-click on Inbound Rules and select New Rule.
- In the window that appears, select the Port radio option and click on Next.
- Leave TCP selected, enter
440-442
in the Specific local ports box, and click on Next. - Leave Allow the connection selected and click on Next.
- Remove the ticks from Private and Public to leave only Domain checked. Now, click on Next.
- Finally, give the policy the name
Allow 440-442
, and click on Finish.
推薦閱讀
- 自制編譯器
- Building a RESTful Web Service with Spring
- 編程卓越之道(卷3):軟件工程化
- 用Flutter極速構建原生應用
- 新一代SDN:VMware NSX 網絡原理與實踐
- 響應式Web設計:HTML5和CSS3實戰(第2版)
- JBoss:Developer's Guide
- Python一行流:像專家一樣寫代碼
- 青少年學Python(第2冊)
- Getting Started with React VR
- After Effects CC案例設計與經典插件(視頻教學版)
- Python自動化開發實戰
- 給產品經理講技術
- D Cookbook
- 數據預處理從入門到實戰:基于SQL、R、Python