Page 1 of 4

Transcription

Page 1 of 4
How To Create a New Zone on a DNS Server in Windows 2000
Page 1 of 4
How To Create a New Zone on a DNS Server in Windows 2000
This article was previously published under Q308201
On This Page
SUMMARY
Article ID
: 308201
Last Review : October 31, 2006
Revision
: 2.2
How to Create a Forward Lookup Zone
How to Modify the Forward Lookup Zone Properties
How to Create a Reverse Lookup Zone
How to Modify the Reverse Lookup Zone Properties
How to Create a Host Record
How to Add a CNAME
How to Add an MX Record
How to Add a Name Server
REFERENCES
SUMMARY
This article is a step-by-step guide for creating a Domain Name System (DNS) zone for a new domain.
How to Create a Forward Lookup Zone
A DNS zone is the range of IP addresses for which your DNS server hosts naming information in the DNS namespace.
The DNS Forward Lookup zone is used to resolve computer host names to an IP address ("forward name resolution").
To create a new forward lookup zone:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Right-click Forward Lookup Zones, and then click New Zone. The New Zone Wizard starts. Click Next to
continue.
5.
Click Standard primary, and then click Next.
6.
In the Name box, type the name of the zone.
The name of the zone should be the same as the DNS suffix of the host computers for which you want to
create the zone. For example, type example.com, and then click Next.
7.
On the Zone File page, click Next, and then click Finish.
The new zone is listed under Forward Lookup Zones in the DNS tree.
How to Modify the Forward Lookup Zone Properties
To modify or verify the zone properties:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Under Forward Lookup Zones, right-click the zone that you want (for example, example.com), and then
click Properties.
5.
In the Allow dynamic updates list, click Yes.
6.
Click the Start of Authority (SOA) tab.
7.
In the Responsible person box, type the e-mail address that you want (in the format of
"username.domain.com"). For example, if the e-mail address is [email protected], type
http://support.microsoft.com/kb/308201
1/11/2007
How To Create a New Zone on a DNS Server in Windows 2000
Page 2 of 4
support.example.com.
8.
Click Apply, and then click OK.
How to Create a Reverse Lookup Zone
The Reverse Lookup zone resolves IP addresses to computer host names in the DNS namespace ("reverse name
resolution").
To create a new reverse lookup zone:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Reverse Lookup Zones.
4.
Right-click Reverse Lookup Zones, and then click New Zone. The New Zone Wizard starts. Click Next to
continue.
5.
Click Standard primary, and then click Next.
6.
In the Network ID box, type the network ID.
The network ID is the portion of the TCP/IP address that identifies the network. For example, type 192.168.0,
and then click Next.For additional information about TCP/IP networks, click the article number below to view
the article in the Microsoft Knowledge Base:
164015 (http://support.microsoft.com/kb/164015/EN-US/) Understanding TCP/IP Addressing and Subnetting
Basics
7.
On the Zone File page, click Next, and then click Finish.
The new zone is listed under Reverse Lookup Zones in the DNS tree.
How to Modify the Reverse Lookup Zone Properties
To modify or verify the zone properties:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Reverse Lookup Zones.
4.
Under Reverse Lookup Zones, right-click the zone that you want (for example, 102.168.0.x Subnet), and
then click Properties.
5.
In the Allow dynamic updates list, click Yes.
6.
Click the Start of Authority (SOA) tab.
7.
In the Responsible person box, type the e-mail address that you want (in the format of
"username.domain.com"). For example, if the e-mail address is [email protected], type
support.example.com.
8.
Click Apply, and then click OK.
NOTE: When you create the forward and reverse lookup zones, the DNS service automatically creates an "A" record
for the DNS server. However, it does not create a PTR, or reverse lookup record, for the DNS server.
To create a PTR record for the DNS server:
1.
Right-click the reverse lookup zone (for example, 192.168.0.x Subnet), and then click New Pointer.
2.
In the Host IP number box, type the host portion of the DNS server IP address. For example, if the DNS
server is on a "C" class network and has an IP address of 192.168.0.10, the host portion of the IP address is
10. In this case, type 10.
3.
In the Host name box, type the host name of the DNS server. For example, type dnsserv.example.com.
4.
Click OK.
http://support.microsoft.com/kb/308201
1/11/2007
How To Create a New Zone on a DNS Server in Windows 2000
Page 3 of 4
How to Create a Host Record
Each computer requires a host record or "A" record to identify the computer in the DNS system. The host record
consists of the host name of the computer along with its corresponding IP address.
To create a host or "A" record:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Under Forward Lookup Zones, right-click the zone that you want (for example, example.com), and then
click New Host.
5.
In the Name (uses parent domain name if blank) box, type the name of the host that you want to add.
For example, if you want to add a host record for a Web server, type www.
6.
In the IP address box, type the IP address of the host that you want to add. For example, type
192.168.0.100.
7.
Select the Create associated pointer (PTR) record check box, and then click Add Host. A message similar
to the following message appears:
The host record www.example.com was successfully created.
Click OK.
8.
When you are finished adding hosts, click Done.
How to Add a CNAME
A CNAME (or "Canonical Name") is an alias or an additional host name that is resolved to the IP address of an existing
host computer in the DNS namespace. For example, if you use the same computer as both a Web server and an FTP
server, you may want to resolve both the WWW host name and the FTP host name to the same IP address. Using a
CNAME, you can resolve both names to the same IP address.
To create a CNAME:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Under Forward Lookup Zones, right-click the zone that you want (for example, example.com), and then
click New Alias.
5.
In the Alias name box, type the alias that you want. For example, type ftp.
6.
In the Fully qualified name for target host box, type the fully qualified host name of the host computer
that you want. For example, type www.example.com, and then click OK.
How to Add an MX Record
An MX (or "Mail Exchanger") record is used to identify a host computer as a Simple Mail Transport Protocol
(SMTP)/Post Office Protocol (POP3) server. To add an MX record, use the following steps. Note that you must first
create the "A" record for the mail server host.
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Right-click the zone that you want (for example, example.com), and then click New Mail Exchanger.
5.
In the Mail server box, type the fully qualified domain name of the host computer that acts as the mail
server. For example, type mail.example.com.
http://support.microsoft.com/kb/308201
1/11/2007
How To Create a New Zone on a DNS Server in Windows 2000
6.
Page 4 of 4
Click OK.
How to Add a Name Server
To identify an additional name server:
1.
Start the DNS snap-in. To do this, click Start, point to Programs, point to Administrative Tools, and then
click DNS.
2.
Under DNS, expand Host name (where Host name is the host name of the DNS server).
3.
Expand Forward Lookup Zones.
4.
Under Forward Lookup Zones, right-click the zone that you want (for example, example.com), and then
click Properties.
5.
Click the Name Servers tab, and then click Add.
6.
In the Server name box, type the host name of the server that you want to add. For example, type
namesvr2.example.com.
7.
In the IP address box, type the IP address of the Name server that you want to add (for example, type
192.168.0.22), and then click Add.
8.
Click OK, and then click OK to return to the DNS window.
9.
Expand Reverse Lookup Zones, right-click the zone that you want, and then click Properties.
10.
Click the Name Servers tab, and then click Add.
11.
In the Server name box, type the host name of the server that you want to add. For example, type
namesvr2.example.com.
12.
In the IP address box, type the IP address of the Name server that you want to add (for example, type
192.168.0.22), and then click Add.
13.
Click OK, and then click OK to return to the DNS window.
REFERENCES
For additional information about installing and configuring DNS, click the article numbers below to view the articles in
the Microsoft Knowledge Base:
172953 (http://support.microsoft.com/kb/172953/EN-US/) How to Install and Configure Microsoft DNS Server
238797 (http://support.microsoft.com/kb/238797/EN-US/) Microsoft DNS Server Installation and Configuration
Document Available on Windows NT FTP Site
http://support.microsoft.com/kb/308201
1/11/2007
Frequently asked questions about Windows 2000 DNS and Windows Server 2003 DNS
Page 1 of 3
Frequently asked questions about Windows 2000 DNS and Windows
Server 2003 DNS
This article was previously published under Q291382
On This Page
SUMMARY
Article ID
: 291382
Last Review : November 1, 2006
Revision
: 9.1
MORE INFORMATION
Additional Resources
SUMMARY
This article describes DNS functionality in Windows 2000 and Windows Server 2003, and provides answers to
frequently asked questions about Windows 2000 and Windows Server 2003 DNS.
MORE INFORMATION
DNS is the backbone of Active Directory and the primary name resolution mechanism of Windows 2000 and Windows
Server 2003. Windows 2000 and Windows Server 2003 domain controllers dynamically register information about
themselves and about Active Directory in DNS. Other Windows 2000 and Windows Server 2003 domain controllers,
servers, and workstations that are part of the domain query DNS to find Active Directory-related information. If DNS
is not set up correctly, domain-wide issues can occur such as replication between domain controllers. You may also be
unable to log on to the domain or to join the domain from a workstation or server.
Question: What are the common mistakes that are made when administrators set up DNS on network that contains a
single Windows 2000 or Windows Server 2003 domain controller?
Answer: The most common mistakes are:
• The domain controller is not pointing to itself for DNS resolution on all network interfaces.
• The "." zone exists under forward lookup zones in DNS.
• Other computers on the local area network (LAN) do not point to the Windows 2000 or Windows Server 2003
DNS server for DNS.
Question: Why do I have to point my domain controller to itself for DNS?
Answer: The Netlogon service on the domain controller registers a number of records in DNS that enable other
domain controllers and computers to find Active Directory-related information. If the domain controller is pointing to
the Internet service provider's (ISP) DNS server, Netlogon does not register the correct records for Active Directory,
and errors are generated in Event Viewer. In Windows Server 2003, the recommended DNS configuration is to
configure the DNS client settings on all DNS servers to use themselves as their own primary DNS server, and to use a
different domain controller in the same domain as their alternative DNS server, preferably another domain controller
in the same site. This process also works around the DNS "Island" problem in Windows 2000. You must always
configure the DNS client settings on each domain controller's network interface to use the alternative DNS server
addresses in addition to the primary DNS server address.
For more information about the Windows 2000 DNS "Island" problem, see "Chapter 2 - Structural Planning for Branch
Office Environments" in the "Planning" section of the Windows 2000 Server Active Directory Branch Office Planning
Guide at the following Microsoft Web site:
http://www.microsoft.com/windows2000/techinfo/planning/activedirectory/branchoffice/default.asp (http://www.microso
ft.com/windows2000/techinfo/planning/activedirectory/branchoffice/default.asp)
Question: What does a domain controller register in DNS?
Answer: The Netlogon service registers all the SRV records for that domain controller. These records are displayed as
the _msdcs, _sites, _tcp, and _udp folders in the forward lookup zone that matches your domain name. Other
computers look for these records to find Active Directory-related information.
Question: Why can't I use WINS for name resolution like it is used in Microsoft Windows NT 4.0?
Answer: A Windows 2000 or Windows Server 2003 domain controller does not register Active Directory-related
information with a WINS server; it only registers this information with a DNS server that supports dynamic updates
such as a Windows 2000 or Windows Server 2003 DNS server. Other Windows 2000-based and Windows Server 2003based computers do not query WINS to find Active Directory-related information.
http://support.microsoft.com/kb/291382
1/11/2007
Frequently asked questions about Windows 2000 DNS and Windows Server 2003 DNS
Page 2 of 3
Question: If I remove the ISP's DNS server settings from the domain controller, how does it resolve names such as
Microsoft.com on the Internet?
Answer: As long as the "." zone does not exist under forward lookup zones in DNS, the DNS service uses the root
hint servers. The root hint servers are well-known servers on the Internet that help all DNS servers resolve name
queries.
Question: What is the "." zone in my forward lookup zone?
Answer: This setting designates the Windows 2000 or Windows Server 2003 DNS server to be a root hint server and
is usually deleted. If you do not delete this setting, you may not be able to perform external name resolution to the
root hint servers on the Internet.
For more information, click the following article number to view the article in the Microsoft Knowledge Base:
229840 (http://support.microsoft.com/kb/229840/) DNS server's root hints and forwarder pages are unavailable
Question: Do I need to configure forwarders in DNS?
Answer: No. By default, Windows 2000 DNS uses the root hint servers on the Internet; however, you can configure
forwarders to send DNS queries directly to your ISP's DNS server or other DNS servers. Most of the time, when you
configure forwarders, DNS performance and efficiency increases, but this configuration can also introduce a point of
failure if the forwarding DNS server is experiencing problems. The root hint server can provide a level of redundancy
in exchange for slightly increased DNS traffic on your Internet connection. Windows Server 2003 DNS will query root
hints servers if it cannot query the forwarders.
Question: Should I point the other Windows 2000-based and Windows Server 2003-based computers on my LAN to
my ISP's DNS servers?
Answer: No. If a Windows 2000-based or Windows Server 2003-based server or workstation does not find the
domain controller in DNS, you may experience issues joining the domain or logging on to the domain. A Windows
2000-based or Windows Server 2003-based computer's preferred DNS setting should point to the Windows 2000 or
Windows Server 2003 domain controller running DNS. If you are using DHCP, make sure that you view scope option
#15 for the correct DNS server settings for your LAN.
Question: Do I need to point computers that are running Windows NT 4.0 or Microsoft Windows 95, Microsoft
Windows 98, or Microsoft Windows 98 Second Edition to the Windows 2000 or Windows Server 2003 DNS server?
Answer: Legacy operating systems continue to use NetBIOS for name resolution to find a domain controller; however
it is recommended that you point all computers to the Windows 2000 or Windows Server 2003 DNS server for name
resolution.
Question: What if my Windows 2000 or Windows Server 2003 DNS server is behind a proxy server or firewall?
Answer: If you are able to query the ISP's DNS servers from behind the proxy server or firewall, Windows 2000 and
Windows Server 2003 DNS server is able to query the root hint servers. UDP and TCP Port 53 should be open on the
proxy server or firewall.
Question: What should I do if the domain controller points to itself for DNS, but the SRV records still do not appear in
the zone?
Answer: Check for a disjointed namespace, and then run Netdiag.exe /fix. You must install Support Tools from the
Windows 2000 Server or Windows Server 2003 CD-ROM to run Netdiag.exe.
For more information about how to check for a disjointed namespace, click the following article number to view the
article in the Microsoft Knowledge Base:
257623 (http://support.microsoft.com/kb/257623/) The DNS suffix of the computer name of a new domain controller
may not match the name of the domain after you install upgrade a Windows NT 4.0 Primary domain controller
to Windows 2000
Question: How do I set up DNS for a child domain?
Answer: To set up DNS for a child domain, create a delegation record on the parent DNS server for the child DNS
server. Create a secondary zone on the child DNS server that transfers the parent zone from the parent DNS server.
Note Windows Server 2003 has additional types of zones, such as Stub Zones and forest-level integrated Active
http://support.microsoft.com/kb/291382
1/11/2007
Frequently asked questions about Windows 2000 DNS and Windows Server 2003 DNS
Page 3 of 3
Directory zones, that may be a better fit for your environment.
Set the child domain controller to point to itself first. As soon as an additional domain controller is available, set the
child domain controller to point to this domain controller in the child domain as its secondary.
For more information, click the following article number to view the article in the Microsoft Knowledge Base:
255248 (http://support.microsoft.com/kb/255248/) How to create a child domain in Active Directory and delegate the
DNS namespace to the child domain
Additional Resources
241505 (http://support.microsoft.com/kb/241505/) SRV records missing after implementing Active Directory and
Domain Name System
247811 (http://support.microsoft.com/kb/247811/) How domain controllers are located in Windows
249868 (http://support.microsoft.com/kb/249868/) Replacing root hints with the Cache.dns file
http://support.microsoft.com/kb/291382
1/11/2007
Creating User and Group Accounts in Windows 2000
Page 1 of 9
Creating User and Group Accounts
from Chapter 8, Microsoft Windows 2000 Administrator's Pocket Consultant by William R. Stanek.
A key part of your job as an administrator is to create user accounts, and this chapter will show you how to do
that.
User accounts allow Microsoft Windows 2000 to track and manage information about users, including
permissions and privileges. When you create user accounts, the primary account administration tools you use
are
•
Active Directory Users And Computers, which is designed to administer accounts throughout an Active
Directory domain.
•
Local Users And Groups, which is designed to administer accounts on a local computer.
Creating domain accounts as well as local users and groups is covered in this chapter.
User Account Setup and Organization
The most important aspects of account creation are account setup and organization. Without the appropriate
policies, you could quickly find that you need to rework all your user accounts. So before you create accounts,
determine the policies you'll use for setup and organization.
Account Naming Policies
A key policy you'll need to set is the naming scheme for accounts. User accounts have display names and logon
names. The display name (or full name) is the name displayed to users and the name referenced in user
sessions. The logon name is the name used to log on to the domain. Logon names were discussed briefly in the
section of Chapter 7 entitled "Logon Names, Passwords, and Public Certificates."
Rules for Display Names
In Windows 2000, the display name is normally the concatenation of the user's first name and last name, but
you can set it to any string value. The display names must follow these rules:
•
•
•
•
Local display names must be unique on a workstation.
Display names must be unique throughout a domain.
Display names must be no more than 64 characters long.
Display names can contain alphanumeric characters and special characters.
Rules for Logon Names
Logon names must follow these rules:
•
Local logon names must be unique on a workstation and global logon names must be unique throughout a
domain.
•
Logon names can be up to 104 characters. However, it isn't practical to use logon names that are longer than
64 characters.
•
A Microsoft Windows NT version 4.0 or earlier logon name is given to all accounts, which by default is set to
the first 20 characters of the Windows 2000 logon name. The Windows NT version 4.0 or earlier logon name
must be unique throughout a domain.
•
Users logging on to the domain from Windows 2000 computers can use their Windows 2000 logon name or
their Windows NT version 4.0 or earlier logon name, regardless of the domain operations mode.
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
•
Page 2 of 9
Logon names can't contain certain characters. Invalid characters are
" / \ [ ] : ; | = , + * ? < >
•
Logon names can contain all other special characters, including spaces, periods, dashes, and underscores.
But it's generally not a good idea to use spaces in account names.
Note: Although Windows 2000 stores user names in the case that you enter, user names aren't case sensitive.
For example, you can access the Administrator account with the user name Administrator or administrator.
Thus, user names are case aware but not case sensitive.
Naming Schemes
You'll find that most small organizations tend to assign logon names that use the user's first or last name. But
you can have several Toms, Dicks, and Harrys in an organization of any size. So rather than having to rework
your logon naming scheme when you run into problems, select a good naming scheme now and make sure
other administrators use it. For naming accounts, you should use a consistent procedure that allows your user
base to grow and limits the possibility of name conflicts and ensures that your accounts have secure names that
aren't easily exploited. If you follow these guidelines, the types of naming schemes you may want to use
include:
•
User's first name and last initial You take the user's first name and combine it with the first letter of the
last name to create the logon name. For William Stanek, you would use williams or bills. This naming scheme
isn't practical for large organizations.
•
User's first initial and last name You take the user's first initial and combine it with the last name to
create the logon name. For William Stanek, you would use wstanek. This naming scheme isn't practical for
large organizations, either.
•
User's first initial, middle initial, and last name You combine the user's first initial, middle initial, and
last name to create the logon name. For William R. Stanek, you would use wrstanek.
•
User's first initial, middle initial, and first five characters of the last name You combine the user's
first initial, middle initial, and the first five characters of the last name to create the logon name. For William
R. Stanek, you would use wrstane.
•
User's first name and last name You combine the user's first and last name. To separate the names, you
could use the underscore character ( _ ) or hyphen (-). For William Stanek, you could use william_ stanek or
william-stanek.
Tip In tight security environments, you can assign a numeric code for the logon name. This numeric code
should be at least 20 characters long. Combine this strict naming method with smart cards and smart card
readers to allow users to quickly log on to the domain. Don't worry, users can still have a display name that
humans can read.
Password and Account Policies
Windows 2000 accounts use passwords and public certificates to authenticate access to network resources. This
section focuses on passwords.
Secure Passwords
A password is a case-sensitive string that can contain up to 104 characters with Active Directory directory
service and up to 14 characters with Windows NT Security Manager. Valid characters for passwords are letters,
numbers, and symbols. When you set a password for an account, Windows 2000 stores the password in an
encrypted format in the account database.
But simply having a password isn't enough. The key to preventing unauthorized access to network resources is
to use secure passwords. The difference between an average password and a secure password is that secure
passwords are difficult to guess and crack. You make passwords difficult to crack by using combinations of all
the available character types—including lowercase letters, uppercase letters, numbers, and symbols. For
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 3 of 9
example, instead of using happydays for a password you would use haPPy2Days&, Ha**y!dayS, or even
h*PPY%d*ys.
Unfortunately, no matter how secure you initially make a user's password, eventually the user usually chooses
the password. Because of this, you'll want to set account policies. Account policies are a subset of the policies
configurable as a group policy.
Setting Account Policies
As you know from previous discussions, you can apply group policies at various levels within the network
structure. You manage local group policies in the manner discussed in the section of Chapter 4 entitled
"Managing Local Group Policies." You manage global group policies as explained in the section of Chapter 4
entitled "Managing Site, Domain, and Unit Policies."
Once you access the group policy container you want to work with, you can set account policies by completing
the following steps:
1.
As shown in Figure 8-1, access the Account Policies node by working your way down the console tree.
Expand Computer Configuration, then Windows Settings, and then Security Settings.
2.
You can now manage account policies through the Password Policy, Account Lockout Policy, and Kerberos
Policy nodes.
Note: Kerberos policies aren't used with local computers. Kerberos policies are only available with group
policies that affect sites, domains, and organizational units.
Figure 8-1: Use entries in the Account Policies
node to set policies for passwords and general
account use. The console tree shows the name of
the computer or domain you're configuring. Be
sure this is the appropriate network resource to
configure.
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 4 of 9
Figure 8-2: With local policies,
you'll see the effective policy as
well as the local policy.
3.
To configure a policy, double-click its entry or right-click on it and select Security. This opens a
Properties dialog box for the policy.
4.
For a local policy, the Properties dialog box is similar to the one shown in Figure 8-2. The effective policy
for the computer is displayed but you can't change it. You can change the local policy settings, however.
Use the fields provided to configure the local policy. For a local policy, skip the remaining steps; those
steps apply to global group policies.
Note: Site, domain, and organizational unit policies have precedence over local policies.
5.
For a site, domain, or organizational unit, the Properties dialog box is similar to the one shown in Figure
8-3.
Figure 8-3: Define and configure
global group policies using their
Properties dialog box.
6.
All policies are either defined or not defined. That is, they are either configured for use or not configured
for use. A policy that isn't defined in the current container could be inherited from another container.
7.
Select or clear the Define This Policy Setting check box to determine whether a policy is defined.
Tip Policies can have additional fields for configuring the policy. Often, these fields are option buttons labeled
Enabled and Disabled. Enabled turns on the policy restriction. Disabled turns off the policy restriction.
Specific procedures for working with account policies are discussed in the sections of the chapter entitled
"Configuring Password Policies," "Configuring Account Lockout Policies," and "Configuring Kerberos Policies."
This chapter's next section, "Viewing Effective Policies," will teach you more about viewing the effective policy
on a local computer.
Viewing Effective Policies
When working with account policies and user rights assignment, you'll often want to view the effective policy on
a local system. The effective policy is the policy being enforced and, as discussed in Chapter 4 under "Group
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 5 of 9
Policy Management," the effective policy depends on the order in which you apply the policies.
To view the effective policy on a local system, complete the following steps:
1.
Access the local policy for the system you want to work with, as explained in the section of Chapter 4
entitled "Managing Local Group Policies." Or select Local Policy Settings on the Administrative Tools
menu (if these tools are installed and you're currently logged on to the computer you want to examine).
2.
Access the policy node that you want to examine. Figure 8-4 shows the Password Policy node.
3.
With local policies, the Computer Setting column is replaced by a Local Setting column and an Effective
Setting column. The Local Setting column shows the local policy settings. The Effective Setting column
shows the policy settings that are being enforced on the local computer.
4.
If there are policy conflicts that you want to track down, review the sections of Chapter 4 entitled "In
What Order Are Multiple Policies Applied?" and "When Are Group Policies Applied?"
Configuring Account Policies
As you learned in the previous section, there are three types of account policies: password policies, account
lockout policies, and Kerberos policies. The sections that follow show you how to configure each one of these
policies.
Figure 8-4: Local policies show the effective
setting as well as the local setting.
Configuring Password Policies
Password policies control security for passwords and they include
•
•
•
•
•
•
Enforce Password History
Maximum Password Age
Minimum Password Age
Minimum Password Length
Passwords Must Meet Complexity Requirements
Store Password Using Reversible Encryption For All Users In The Domain
The uses of these policies are discussed in the following sections.
Enforce Password History
Enforce Password History sets how frequently old passwords can be reused. You can use this policy to
discourage users from changing back and forth between a set of common passwords. Windows 2000 can store
up to 24 passwords for each user in the password history. By default, Windows 2000 stores one password in the
password history.
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 6 of 9
To disable this feature, set the size of the password history to zero. To enable this feature, set the size of the
password history using the Passwords Remember field. Windows 2000 will then track old passwords using a
password history that is unique for each user, and users won't be allowed to reuse any of the stored passwords.
Note: To discourage users from cheating Enforce Password History, you shouldn't allow them to change
passwords immediately. This will prevent users from changing their passwords several times to get back to their
old passwords.
Maximum Password Age
Maximum Password Age determines how long users can keep a password before they have to change it. The
aim is to periodically force users to change their passwords. When you use this feature, set a value that makes
sense for your network. Generally, you use a shorter period when security is very important and a longer period
when security is less important.
The default expiration date is 42 days, but set it to any value from 0 to 999. A value of zero specifies that
passwords don't expire. Although you may be tempted to set no expiration date, users should change
passwords regularly to ensure the network's security. Where security is a concern, good values are 30, 60, or
90 days. Where security is less important, good values are 120, 150, or 180 days.
Note: Windows 2000 notifies users when they're getting close to the password expiration date. Anytime the
expiration date is less than 30 days away, users see a warning when they log on that they have to change their
password within so many days.
Minimum Password Age
Minimum Password Age determines how long users must keep a password before they can change it. You can
use this field to prevent users from cheating the password system by entering a new password and then
changing it right back to the old one.
By default, Windows 2000 lets users change their passwords immediately. To prevent this, set a specific
minimum age. Reasonable settings are from three to seven days. In this way, you make sure that users are less
inclined to switch back to an old password but are able to change their passwords in a reasonable amount of
time if they want to.
Minimum Password Length
Minimum Password Length sets the minimum number of characters for a password. If you haven't changed the
default setting, you'll want to do so immediately. The default is to allow empty passwords (passwords with zero
characters), which is definitely not a good idea.
For security reasons, you'll generally want passwords of at least eight characters. The reason for this is that
long passwords are usually harder to crack than short ones. If you want greater security, set the minimum
password length to 14 characters.
Passwords Must Meet Complexity Requirements
Beyond the basic password and account policies, Windows 2000 includes facilities for creating additional
password controls. These facilities are available in the password filters, which can be installed on a domain
controller. If you've installed a password filter, enable Passwords Must Meet Complexity Requirements.
Passwords are then required to meet the filter's security requirement.
For example, the standard Windows NT filter (PASSFILT.DLL) enforces the use of secure passwords that follow
these guidelines:
•
•
•
Passwords must be at least six characters long.
Passwords can't contain the user name, such as stevew, or parts of the user's full name, such as Steve.
Passwords must use three of the four available character types: lowercase letters, uppercase letters,
numbers, and symbols.
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 7 of 9
Store Password Using Reversible Encryption
Passwords in the password database are encrypted. This encryption can't normally be reversed. If you want to
allow the encryption to be reversed, enable Store Password Using Reversible Encryption For All Users In The
Domain. Passwords are then stored with reversible encryption and can be recovered in case of emergency.
Forgetting a password in not an emergency situation. Any administrator can change user passwords.
Configuring Account Lockout Policies
Account lockout policies control how and when accounts are locked out of the domain or the local system. These
policies are
•
•
•
Account Lockout Threshold
Account Lockout Duration
Reset Account Lockout Threshold After
Account Lockout Threshold
Account Lockout Threshold sets the number of logon attempts that are allowed before an account is locked out.
If you decide to use lockout controls, you should set this field to a value that balances the need to prevent
account cracking against the needs of users who are having difficulty accessing their accounts.
The main reason users may not be able to access their accounts properly the first time is that they forgot their
passwords. If this is the case, it may take them several attempts to log on properly. Workgroup users could also
have problems accessing a remote system where their current passwords don't match the passwords the
remote system expects. If this happens, several bad logon attempts may be recorded by the remote system
before the user ever gets a prompt to enter the correct password. The reason is that Windows 2000 may
attempt to automatically log on to the remote system. In a domain environment, this normally doesn't happen
because of the Single Log-On feature.
You can set the lockout threshold to any value from 0 to 999. The lockout threshold is set to zero by default,
which means that accounts won't be locked out because of invalid logon attempts. Any other value sets a
specific lockout threshold. Keep in mind that the higher the lockout value, the higher the risk that a hacker may
be able to break into your system. A reasonable range of values for this threshold is between 7 and 15. This is
high enough to rule out user error and low enough to deter hackers.
Account Lockout Duration
If someone violates the lockout controls, Account Lockout Duration sets the length of time the account is locked.
You can set the lockout duration to a specific length of time using a value between 1 and 99,999 minutes or to
an indefinite length of time by setting the lockout duration to zero.
The best security policy is to lock the account indefinitely. When you do, only an administrator can unlock the
account. This will prevent hackers from trying to access the system again and will force users who are locked
out to seek help from an administrator, which is usually a good idea. By talking to the user, you can determine
what the user is doing wrong and help the user avoid problems.
Tip When an account is locked out, access the Properties dialog box for the account in Active Directory Users
And Computers. Then click the Account tab and clear the Account Is Locked Out check box. This unlocks the
account.
Reset Account Lockout Threshold After
Every time a logon attempt fails, Windows 2000 raises the value of a threshold that tracks the number of bad
logon attempts. Reset Account Lockout Threshold After determines how long the lockout threshold is
maintained. This threshold is reset in one of two ways. If a user logs on successfully, the threshold is reset. If
the waiting period for Reset Account Lockout Threshold After has elapsed since the last bad logon attempt, the
threshold is also reset.
By default, the lockout threshold is maintained for one minute, but you can set any value from 1 to 99,999
minutes. As with Account Lockout Threshold, you need to select a value that balances security needs against
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 8 of 9
user access needs. A good value is from one to two hours. This waiting period should be long enough to force
hackers to wait longer than they want to before trying to access the account again.
Note: Bad logon attempts to a workstation against a password-protected screen saver don't increase the
lockout threshold. Similarly, if you lock a server or workstation using Ctrl+Alt+Delete, bad logon attempts
against the Unlock dialog box don't count.
Configuring Kerberos Policies
Kerberos version 5 is the primary authentication mechanism used in an Active Directory domain. To verify the
identification of users and network services, Kerberos uses service tickets and user tickets. As you might
expect, service tickets are used by Windows 2000 service processes and user tickets are used by user
processes. Tickets contain encrypted data that confirm the identity of the user or service.
You can control ticket duration, renewal, and enforcement through the following policies:
•
•
•
•
•
Enforce User Logon Restrictions
Maximum Lifetime For Service Ticket
Maximum Lifetime For User Ticket
Maximum Lifetime For User Ticket Renewal
Maximum Tolerance For Computer Clock Synchronization
These policies are discussed in the sections that follow.
Caution: Only administrators with an intimate understanding of Kerberos security should change these policies.
If you change these policies to inefficient settings, you may cause serious problems on the network. In most
cases the default Kerberos policy settings work just fine.
Enforce User Logon Restrictions
Enforce User Logon Restrictions ensures that any restrictions placed on a user account are enforced. For
example, if the user's logon hours are restricted, this policy is what enforces the restriction. By default, the
policy is enabled and should only be disabled in rare circumstances.
Maximum Lifetime
Maximum Lifetime For Service Ticket and Maximum Lifetime For User Ticket set the maximum duration for
which a service or user ticket is valid. By default, service tickets have a maximum duration of 41,760 minutes
and user tickets have a maximum duration of 720 hours.
You can change the duration of tickets. For service tickets, the valid range is from 0 to 99,999 minutes. For user
tickets, the valid range is from 0 to 99,999 hours. A value of zero effectively turns off expiration. Any other
value sets a specific ticket lifetime.
A ticket that expires can be renewed, provided the renewal takes place within the time set for Maximum
Lifetime For User Ticket Renewal. By default, the maximum renewal period is 60 days. You can change the
renewal period to any value from 0 to 99,999 days. A value of zero effectively turns off the maximum renewal
period and any other value sets a specific renewal period.
Maximum Tolerance
Maximum Tolerance For Computer Clock Synchronization is one of the few Kerberos policies that you may need
to change. By default, computers in the domain must be synchronized within five minutes of each other. If they
aren't, authentication fails.
If you have remote users that log on to the domain without synchronizing their clock to the network timeserver,
you may need to adjust this value. You can set any value from 0 to 99,999.
from Microsoft Windows 2000 Administrator's Pocket Consultant by William R. Stanek. Copyright © 1999
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
Creating User and Group Accounts in Windows 2000
Page 9 of 9
Microsoft Corporation.
Click to order
http://thesource.ofallevil.com/technet/prodtechnol/windows2000serv/deploy/confeat/08w2... 1/10/2007
NAP offers a network access control solution for SMBs
Page 1 of 2
NAP offers a network access control solution for
SMBs
by Deb Shinder | More from Deb Shinder | 1/5/07
Tags: Hardware servers | Windows Vista | Microsoft Windows | Network security
Article
Comments: 1 | 1 NEW | View all
Save to my Workspace
E-mail Article
Rating: Not yet rated Rate it
Print Article
Takeaway: SMBs are increasingly faced with security threats posed by the computers
that connect to their networks. Microsoft's new NAP technology can give you control over
the health status of both remote access and on-site clients as your organization grows.
Protecting the network is an important goal of any IT security strategy, and there are a
number of sophisticated mechanisms that can give you better control of who accesses
the network and how they do it. Unfortunately, small and medium businesses often
perceive the available third-party products as too complex and/or expensive to be
feasible. For example, Cisco's Network Admission Control (NAC) appliance can cost
several thousand dollars. That may be more than small businesses on a budget can
afford.
But if you plan to upgrade your network operating systems to the next generation of
Windows Server (currently called Longhorn), the Network Access Protection (NAP)
platform is already built in and can be used with Windows Vista or with XP clients running
the NAP Client add-on software for XP that’s scheduled to be released at the same time
as the new server OS (the XP NAP client is currently in beta testing). Windows Server
2003 will also be able to be a NAP client.
SMBs can take advantage of this core component of Longhorn Server and Vista to
ensure that clients connecting to their networks meet their health and security criteria.
The importance of protecting network access
Every computer that connects to your local area network poses a potential threat. If it’s
infected with a virus or spyware, if it doesn’t have adequate firewall protection, has had
the latest security updates and patches installed, etc., the entire network can be placed at
risk. You have some control over the on-site computers, but what about those that
connect to the LAN via remote access, or the laptops that employees bring to work with
them after having connected them to home or public networks?
To protect your network, you should set policies requiring that before it can connect to
your LAN, a computer has to meet minimum "health" standards. But you can’t always
trust users to comply voluntarily, so you need an enforcement mechanism that can
determine whether a system meets the standards and prevent it from connecting, or
restrict its access, if it doesn’t. That’s where NAP comes in; it’s Microsoft’s health policy
compliance platform.
At first glance, NAP may sound a lot like Windows Server 2003’s Network Access
Quarantine Control (NAQC), which can be used to enforce policies for remote access
dialup and VPN connections to a Server 2003 system, but it’s a different technology and
does much more. NAQC is only for remote access clients, whereas NAP is designed to
protect the health of all systems that connect to your network.
http://articles.techrepublic.com.com/5100-1009_11-6147167.html
1/9/2007
NAP offers a network access control solution for SMBs
Page 2 of 2
For example, with NAP you can enforce IPsec policies to specify requirements for secure
communications, enforce 802.1x policies for wireless clients, along with enforcement of
health policies on VPN clients. You can also use the DHCP enforcement feature to
enforce the health policy whenever a computer tries to renew or obtain a new IP address
via DHCP. NAP also has the ability to interoperate with Cisco’s NAC.
With NAQC, you have to write custom scripts and use command line tools to manually
configure the behavior. It is possible to use NAQC and NAP at the same time, but in most
cases NAP with replace NAQC.
Page: 1 | 2 | Next Page
http://articles.techrepublic.com.com/5100-1009_11-6147167.html
1/9/2007
NAP offers a network access control solution for SMBs
Page 1 of 2
NAP offers a network access control solution for
SMBs
Page 2 of 2
How NAP works
NAP allows you to define the policies you want to apply to computers that connect to the
network and check each connecting computer against that set of policies. You also have
options as to what happens if a computer is non-compliant. For example:
You can allow it to access the network anyway, with information noted in the log so you
can follow up and see that the computer is brought into compliance.
You can allow it to only access a restricted network, rather than the entire LAN. This is
useful so you can provide resources on the restricted network that the user can use to
bring the computer into compliance (for example, required security updates or antivirus software and updates). You can also restrict the amount of time that a noncompliant computer can access the network.
It can be automatically updated to bring it into compliance, using SMS or other systems
management programs.
Components of NAP
The components in Windows Vista and Longhorn Server that verify a computer's health
are called system health agents (SHAs) and system health validators (SHVs). Third-party
software vendors can provide SHAs and SHVs in their software for interoperability with
NAP.
The SHA runs on the NAP clients and provides information about the client’s health
status. The SHV runs on the server and validates whether the health information provided
by the SHA complies with your policies. The health policy is configured on the NPS
server. The NPS server components include both a NAP Administration Server and a
NAP Enforcement Server. User and computer account information, including network
access properties, is stored in Active Directory.
You can also use health certificates obtained from a certification authority to prove
compliance. In that case, you need a Longhorn Server acting as a Health Registration
Authority (HRA) that runs IIS to obtain these certificates.
The server(s) that a non-compliant computer can access on the restricted network, which
contain resources that can be used to bring the computer into compliance, are called
remediation servers.
For more detailed technical information about what occurs in each step of the NAP
validation process, download the whitepaper titled Introduction to Network Access
Protection from the Microsoft TechNet web site.
Summary
NAP is a robust solution for controlling network access based on computers’ health status
and takes up where NAQC left off. It's a built-in component of Windows Longhorn Server
and Windows Vista, so SMBs that use these operating systems will be able to take
advantage of its benefits without the need to buy and deploy additional third party
solutions. NAP provides for scalability and interoperability with other technologies such as
Cisco NAC, so that as your network grows, you can continue to provide the level of
http://articles.techrepublic.com.com/5100-1009_11-6147167-2.html
1/9/2007
NAP offers a network access control solution for SMBs
Page 2 of 2
protection your organization needs.
Page: 1 | 2 | Previous Page
http://articles.techrepublic.com.com/5100-1009_11-6147167-2.html
1/9/2007