title
Introduction to Domains

description
Info Level: Beginner Presenter: Eli the Computer Guy Date Created: April 2, 2010 Length of Class: 47 Minutes Tracks Servers Prerequisites Introduction to Servers Purpose of Class This class explains the benefits of using a domain structured network. Topics Covered What Domains Are Basic Concepts for Domains How Domains are Created Domain Controllers Trusts and using Multiple Domains Class Notes Introduction Domains provide an easier way for Administrators to manage Accounts, Permissions and Security for a large network. Domain Basics Domain controllers provide access keys to clients to allow or restrict access to network resources Single place to administer permissions and security Permissions and Security can be assigned to: Users, Groups, Organization Units Permissions mean access to shared resources such as files, folders and printers. Security means restrictions about changing desktop background, password policies, access to local drives. Ways to Have a doming Windows is the standard type of domain environment SAMBA -- Linux version of a PDC Novell -- Still exists... You need a business class Windows Operating System to join a domain. XP Pro, Vista Business / Ultimate, 7 Business / Ultimate Domain Controllers PDC/ BDC Structure. The PDC has a read and write copy of the security database. If the PDC fails a BDC will provide security information to the network. The BDC has a READ only copy of the database and so administrators cannot change user permissions on a BDC. A BDC can be promoted to a PDC. There is only one PDC in a domain at a time. Active Directory. All Domain Controllers have read and write access (Theoretically, this can be modified). Structure Trusts allow users from one Domain to log on to computer in another Domain. Small offices would never need this. This is for large corporations that own numerous companies. If the Geek from the parent company needs to do work on the computers at the child company a trust relationship between the domains would be created. There are multiple types of Trusts: One Way, Two Way, Transient Final Thoughts Domains are a great tool for large networks, but they require specialized computer technicians and equipment. Depending on the cost/ benefit analysis they may not be a good idea for small networks. Resources Novel Open Enterprise Server SAMBA Understanding Organizational Units

detail
{'title': 'Introduction to Domains', 'heatmap': [{'end': 1069.699, 'start': 999.641, 'weight': 1}, {'end': 1788.275, 'start': 1750.234, 'weight': 0.818}], 'summary': 'Provides an introduction to domain architecture, covering network security, domain management, domain controllers, network permissions, security, understanding domains, domain trust relationships, and network administration, emphasizing the importance of efficient management in large networks and the benefits of assigning permissions and security policies to groups, and outlining the setup and implementation of domain controllers in various operating systems and their usage in corporate environments.', 'chapters': [{'end': 151.196, 'segs': [{'end': 54.108, 'src': 'embed', 'start': 26.406, 'weight': 0, 'content': [{'end': 32.17, 'text': 'And the final way you can share resources on a network is through something called a domain architecture.', 'start': 26.406, 'duration': 5.764}, {'end': 42.657, 'text': 'Basically, a domain architecture is where you have one server or multiple servers that are responsible for dealing with the security and permissions on the network.', 'start': 32.71, 'duration': 9.947}, {'end': 54.108, 'text': "So we're going to go into all of this, but basically all a domain is for the security of the network.", 'start': 43.138, 'duration': 10.97}], 'summary': 'Domain architecture manages network security and permissions through servers.', 'duration': 27.702, 'max_score': 26.406, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY26406.jpg'}, {'end': 107.089, 'src': 'embed', 'start': 80.06, 'weight': 2, 'content': [{'end': 84.542, 'text': 'So there are multiple products available for creating domains.', 'start': 80.06, 'duration': 4.482}, {'end': 90.263, 'text': "And so this class is going to more describe what's going on in a domain,", 'start': 84.882, 'duration': 5.381}, {'end': 97.626, 'text': "why you would want a domain and what features you should look for when you decide on how you're going to create your domain,", 'start': 90.263, 'duration': 7.363}, {'end': 100.707, 'text': 'whether you use something like Windows or Novell or Samba.', 'start': 97.626, 'duration': 3.081}, {'end': 104.428, 'text': 'So this class is not specifically on Windows domains.', 'start': 101.187, 'duration': 3.241}, {'end': 107.089, 'text': "It's just on the overall concept of domains.", 'start': 104.448, 'duration': 2.641}], 'summary': 'This class discusses features and options for creating domains, not specific to windows.', 'duration': 27.029, 'max_score': 80.06, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY80060.jpg'}], 'start': 5.828, 'title': 'Domain architecture', 'summary': 'Introduces domain architecture for network security, covering windows, linux, and novell as options for creating domain networks and emphasizing the importance of understanding domain concepts and features.', 'chapters': [{'end': 151.196, 'start': 5.828, 'title': 'Introduction to domains', 'summary': 'Introduces the concept of domain architecture for network security, covering windows, linux, and novell as options for creating domain networks and emphasizing the importance of understanding domain concepts and features.', 'duration': 145.368, 'highlights': ['Domain architecture involves one or multiple servers responsible for network security and permissions, providing an overview of domains and their operation.', 'Multiple products are available for creating domains, including Windows with Active Directory, Linux with Samba, and Novell.', 'Emphasizing the importance of understanding domain concepts and features when deciding on the creation of a domain network.']}], 'duration': 145.368, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY5828.jpg', 'highlights': ['Emphasizing the importance of understanding domain concepts and features when deciding on the creation of a domain network.', 'Domain architecture involves one or multiple servers responsible for network security and permissions, providing an overview of domains and their operation.', 'Multiple products are available for creating domains, including Windows with Active Directory, Linux with Samba, and Novell.']}, {'end': 409.884, 'segs': [{'end': 269.788, 'src': 'embed', 'start': 226.147, 'weight': 3, 'content': [{'end': 236.012, 'text': 'every single computer has an inbuilt security mechanism that allows you to go into the individual computer and set up security permissions and file sharing permissions.', 'start': 226.147, 'duration': 9.865}, {'end': 240.599, 'text': 'So you could sit at each and every one of these computers and configure it by hand.', 'start': 236.372, 'duration': 4.227}, {'end': 249.977, 'text': "Again, as we talked about before, if you have 5 computers, 10 computers, maybe even 20 computers, That's not that big a deal.", 'start': 242.041, 'duration': 7.936}, {'end': 255.22, 'text': 'The cost-benefit analysis, you may not want to deal with a domain controller.', 'start': 249.997, 'duration': 5.223}, {'end': 258.882, 'text': 'It may not be that hard for you to deal with, with even up to 20 computers.', 'start': 255.4, 'duration': 3.482}, {'end': 262.524, 'text': 'But once you start dealing with 100 computers or 1, 000 computers,', 'start': 259.341, 'duration': 3.183}, {'end': 269.788, 'text': "having to sit down at each and every individual computer whenever you want to make a security policy change, It's just not going to happen.", 'start': 262.524, 'duration': 7.264}], 'summary': 'Inbuilt security mechanisms for individual computers can be manually configured, but becomes impractical for larger numbers.', 'duration': 43.641, 'max_score': 226.147, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY226147.jpg'}, {'end': 334.251, 'src': 'embed', 'start': 290.848, 'weight': 0, 'content': [{'end': 293.934, 'text': 'you add something called a domain controller.', 'start': 290.848, 'duration': 3.086}, {'end': 302.651, 'text': 'This domain controller is now responsible for the security and for sharing the resources and such on the entire network.', 'start': 294.435, 'duration': 8.216}, {'end': 312.295, 'text': "So if you want to add a user, if you want to change permissions, let's say you want people to no longer be able to install software.", 'start': 303.729, 'duration': 8.566}, {'end': 317.099, 'text': 'You have a lot of people trying to install Napster on their computers and you want them to stop.', 'start': 312.435, 'duration': 4.664}, {'end': 322.843, 'text': 'Well, instead of having to sit in every single computer and change the security policy on every single computer,', 'start': 317.299, 'duration': 5.544}, {'end': 332.51, 'text': 'you can go to this one single domain controller and you can basically type in and you can say I want no one other than administrators to have the right to install software onto their computers.', 'start': 322.843, 'duration': 9.667}, {'end': 334.251, 'text': 'And when you do that?', 'start': 333.01, 'duration': 1.241}], 'summary': 'Introducing a domain controller for centralized network security management and resource sharing.', 'duration': 43.403, 'max_score': 290.848, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY290848.jpg'}, {'end': 386.405, 'src': 'embed', 'start': 358.649, 'weight': 9, 'content': [{'end': 365.075, 'text': 'that a server is any computer on the network that provides services to other computers on the network right?', 'start': 358.649, 'duration': 6.426}, {'end': 372.002, 'text': 'Well, this domain controller function, this authentication or security function,', 'start': 366.116, 'duration': 5.886}, {'end': 380.671, 'text': 'is simply a piece of software that can be installed onto a computer or, in the Windows world, can be activated on the computer.', 'start': 372.002, 'duration': 8.669}, {'end': 386.405, 'text': "So this domain controller doesn't necessarily have to be a web server.", 'start': 382.702, 'duration': 3.703}], 'summary': 'A domain controller is software that provides authentication and security functions for a network, not limited to web servers.', 'duration': 27.756, 'max_score': 358.649, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY358649.jpg'}], 'start': 151.806, 'title': 'Domain management', 'summary': 'Explores domain basics, emphasizing their importance in managing large networks, and discusses the benefits of domain controllers for efficiently managing security permissions and file sharing for a significant number of computers, highlighting their effectiveness for managing 100 or 1,000 computers.', 'chapters': [{'end': 226.147, 'start': 151.806, 'title': 'Domain basics and network management', 'summary': 'Discusses the basics of a domain, emphasizing its importance for managing large networks to control access, security policies, and file sharing among a significant number of computers.', 'duration': 74.341, 'highlights': ['A domain is essential for managing large networks with numerous connected computers, allowing control over file sharing, printer access, and security policies.', 'The network may consist of 50, 100, or even 1,000 computers, necessitating the need for domain management.', 'Domain enables controlling access and security policies, such as restricting software installation on network computers.', 'The chapter emphasizes the importance of a domain in enabling control over file sharing, printer access, and security policies for a large network.']}, {'end': 289.703, 'start': 226.147, 'title': 'Domain controllers and domains', 'summary': 'Discusses the benefits of using domain controllers and domains to manage security permissions and file sharing for a large number of computers, highlighting the impracticality of individually configuring a large number of computers and the efficiency provided by domain controllers for managing 100 or 1,000 computers.', 'duration': 63.556, 'highlights': ['Domain controllers and domains provide an efficient way to manage security permissions and file sharing for a large number of computers, offering a practical solution for managing 100 or 1,000 computers at scale.', 'Individually configuring a large number of computers for security permissions and file sharing is impractical, especially when dealing with 100 or 1,000 computers, as it would be time-consuming and inefficient.', 'Every single computer has an inbuilt security mechanism allowing individual configuration for security permissions and file sharing, but the impracticality becomes evident at scale, such as managing 100 or 1,000 computers.']}, {'end': 409.884, 'start': 290.848, 'title': 'Domain controller: security and resource sharing', 'summary': 'Explains the role of a domain controller in managing network security and resource sharing, highlighting its ability to centralize security policies and replicate them across the entire network, thus preventing unauthorized software installations.', 'duration': 119.036, 'highlights': ['The domain controller is responsible for network security, resource sharing, and centralizing security policies, reducing the need to individually configure each computer, thus preventing unauthorized software installations.', 'By configuring security policies on the domain controller, such as allowing only administrators to install software, the changes are replicated across the entire network, effectively preventing unauthorized software installations.', "The domain controller is a piece of software that provides network security and authentication, and it doesn't have to serve other functions like web, file, or exchange server, making it particularly relevant for Microsoft environments."]}], 'duration': 258.078, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY151806.jpg', 'highlights': ['Domain controllers and domains provide an efficient way to manage security permissions and file sharing for a large number of computers, offering a practical solution for managing 100 or 1,000 computers at scale.', 'A domain is essential for managing large networks with numerous connected computers, allowing control over file sharing, printer access, and security policies.', 'The domain controller is responsible for network security, resource sharing, and centralizing security policies, reducing the need to individually configure each computer, thus preventing unauthorized software installations.', 'The network may consist of 50, 100, or even 1,000 computers, necessitating the need for domain management.', 'By configuring security policies on the domain controller, such as allowing only administrators to install software, the changes are replicated across the entire network, effectively preventing unauthorized software installations.', 'The chapter emphasizes the importance of a domain in enabling control over file sharing, printer access, and security policies for a large network.', 'Individually configuring a large number of computers for security permissions and file sharing is impractical, especially when dealing with 100 or 1,000 computers, as it would be time-consuming and inefficient.', 'Every single computer has an inbuilt security mechanism allowing individual configuration for security permissions and file sharing, but the impracticality becomes evident at scale, such as managing 100 or 1,000 computers.', 'Domain enables controlling access and security policies, such as restricting software installation on network computers.', "The domain controller is a piece of software that provides network security and authentication, and it doesn't have to serve other functions like web, file, or exchange server, making it particularly relevant for Microsoft environments."]}, {'end': 980.773, 'segs': [{'end': 480.336, 'src': 'embed', 'start': 455.21, 'weight': 1, 'content': [{'end': 460.292, 'text': 'So you as an administrator have to sit down at each and every computer and add them to the domain.', 'start': 455.21, 'duration': 5.082}, {'end': 465.495, 'text': "So you sit down, there's a little process and you say I want this computer to be part of the domain,", 'start': 460.793, 'duration': 4.702}, {'end': 470.933, 'text': "and then you put in your username and password and as long as it's right, that computer then becomes part of the domain.", 'start': 465.495, 'duration': 5.438}, {'end': 474.054, 'text': 'Once the computer is part of the domain,', 'start': 471.874, 'duration': 2.18}, {'end': 480.336, 'text': "then when you as a user whether you're as an administrator or a secretary or whatever when you sit down at the computer,", 'start': 474.054, 'duration': 6.282}], 'summary': 'Administrators manually add computers to the domain using username and password, allowing users to access the domain.', 'duration': 25.126, 'max_score': 455.21, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY455210.jpg'}, {'end': 605.702, 'src': 'embed', 'start': 576.701, 'weight': 3, 'content': [{'end': 581.685, 'text': 'Things are divided for permissions and security into different groupings.', 'start': 576.701, 'duration': 4.984}, {'end': 585.207, 'text': 'So the basic grouping is your users.', 'start': 582.745, 'duration': 2.462}, {'end': 590.071, 'text': 'Users is pretty simple.', 'start': 589.01, 'duration': 1.061}, {'end': 592.512, 'text': 'Users is every single user on the network.', 'start': 590.211, 'duration': 2.301}, {'end': 600.899, 'text': 'So you can give individual users permissions or security policies specifically to them.', 'start': 592.973, 'duration': 7.926}, {'end': 605.702, 'text': 'So you can say Bob is allowed to see this file and folder, but not this file and folder.', 'start': 600.999, 'duration': 4.703}], 'summary': 'Network users can be individually assigned permissions and security policies, such as allowing bob access to specific files and folders.', 'duration': 29.001, 'max_score': 576.701, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY576701.jpg'}, {'end': 758.252, 'src': 'embed', 'start': 726.614, 'weight': 6, 'content': [{'end': 737.681, 'text': 'OUs, organizational units, can have users, groups, and resources on the network inside of them.', 'start': 726.614, 'duration': 11.067}, {'end': 742.143, 'text': 'So you could put a computer into an organizational unit,', 'start': 738.541, 'duration': 3.602}, {'end': 750.148, 'text': 'or you could put a printer into an organizational unit and then assign permissions to that organizational unit.', 'start': 742.143, 'duration': 8.005}, {'end': 758.252, 'text': "Let's say you have you have kiosks kiosk computers that are outside your main building.", 'start': 752.209, 'duration': 6.043}], 'summary': 'Ous can contain users, groups, and resources, such as computers and printers, to assign permissions. for example, kiosk computers can be placed in ous outside the main building.', 'duration': 31.638, 'max_score': 726.614, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY726614.jpg'}, {'end': 856.653, 'src': 'embed', 'start': 823.906, 'weight': 5, 'content': [{'end': 826.148, 'text': 'So users, groups, and organization units.', 'start': 823.906, 'duration': 2.242}, {'end': 834.616, 'text': "Now, one of the things I've been, one of the, two of the terms, I suppose, that I've been tossing around are permissions and security.", 'start': 826.909, 'duration': 7.707}, {'end': 841.063, 'text': "And it's very important that you understand the difference between those two vocabulary words.", 'start': 835.377, 'duration': 5.686}, {'end': 847.044, 'text': 'Permissions are simply your access to network resources.', 'start': 842.059, 'duration': 4.985}, {'end': 856.653, 'text': 'So are you allowed to open a folder? Are you allowed to edit a file? Are you allowed to print to a printer? Those are permissions.', 'start': 847.564, 'duration': 9.089}], 'summary': 'Distinguishing between permissions and security in accessing network resources.', 'duration': 32.747, 'max_score': 823.906, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY823906.jpg'}, {'end': 980.773, 'src': 'embed', 'start': 919.92, 'weight': 0, 'content': [{'end': 922.381, 'text': "They're two entirely different critters.", 'start': 919.92, 'duration': 2.461}, {'end': 931.449, 'text': 'So, as we went over, a domain is simply a network where you have one server that acts as a domain controller.', 'start': 923.221, 'duration': 8.228}, {'end': 939.275, 'text': 'This domain controller has authentication and security software installed on it that allows you to sit at a computer.', 'start': 931.769, 'duration': 7.506}, {'end': 944.78, 'text': 'When you log in, your username and password are sent to that domain controller.', 'start': 939.796, 'duration': 4.984}, {'end': 948.323, 'text': 'That domain controller then makes sure your username and password are correct.', 'start': 945.1, 'duration': 3.223}, {'end': 952.805, 'text': 'If it is correct, it then gives you an access control key.', 'start': 948.503, 'duration': 4.302}, {'end': 960.567, 'text': "basically it sends that key back to your computer and based on that key, your computer now knows what files and folders you're allowed to get into,", 'start': 952.805, 'duration': 7.762}, {'end': 963.988, 'text': "whether you're able to install software, etc.", 'start': 960.567, 'duration': 3.421}, {'end': 973.031, 'text': 'again, these, these permissions and the security policies can either be assigned to the user, which can be done, but this is usually a bad idea.', 'start': 963.988, 'duration': 9.043}, {'end': 977.992, 'text': 'you usually want to assign security and permissions to entire groups, so users are are put into groups.', 'start': 973.031, 'duration': 4.961}, {'end': 980.773, 'text': 'You then also have organizational units.', 'start': 978.653, 'duration': 2.12}], 'summary': 'A domain controller authenticates users and assigns access keys based on security policies and permissions, usually assigned to groups rather than individual users.', 'duration': 60.853, 'max_score': 919.92, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY919920.jpg'}], 'start': 410.609, 'title': 'Domain controller, network permissions, and security', 'summary': 'Explains the concept of a domain controller, where a computer serves as an authentication and security server, allowing workstations to join the domain. it also details the importance of users, groups, and organizational units in managing access and security policies, emphasizing the need for efficient management in large networks and the benefits of assigning permissions and security policies to groups.', 'chapters': [{'end': 573.98, 'start': 410.609, 'title': 'Domain controller and authentication', 'summary': 'Explains the concept of a domain controller, where a computer on the network serves as an authentication and security server, allowing workstations to join the domain and access resources based on their permissions and security policies.', 'duration': 163.371, 'highlights': ['A domain controller serves as an authentication and security server for the network, allowing workstations to join the domain and access resources based on their permissions and security policies. The domain controller provides authentication and security services, allowing workstations to be added to the domain and access resources based on permissions and security policies.', 'Process of adding workstations to the domain involves an administrator sitting down at each computer and adding them to the domain, requiring username and password for authentication. The process of adding workstations to the domain involves an administrator manually adding each computer to the domain, requiring username and password authentication.', 'When a user logs in at a computer that is part of the domain, their credentials are sent to the domain controller, which then determines their permissions and sends back an access key to the computer. When a user logs in at a computer within the domain, their credentials are sent to the domain controller, which then provides access permissions by sending an access key back to the computer.']}, {'end': 980.773, 'start': 576.701, 'title': 'Network permissions and security', 'summary': 'Explains the concept of network permissions and security, detailing the importance of users, groups, and organizational units in managing access and security policies, emphasizing the need for efficient management in large networks and the distinction between permissions and security. it also highlights the benefits of assigning permissions and security policies to groups rather than individual users, and the role of organizational units in managing access to network resources.', 'duration': 404.072, 'highlights': ['The importance of managing permissions and security in large networks is emphasized, where assigning permissions to individual users becomes inefficient, and grouping users into manageable units is highlighted. large networks, thousands of employees', 'The distinction between permissions and security is explained, with permissions focusing on network resource access and security policies determining user actions on the computer, such as software installation and file access. permissions, security policies', 'The benefits of assigning permissions and security policies to groups rather than individual users are highlighted, with the ease of managing access for multiple users and the application of security policies to entire groups discussed. ease of management, multiple users', 'The role of organizational units in managing access to network resources is detailed, where permissions can be assigned to the organizational unit, controlling the access and actions of contained users, groups, and resources. organizational units, control access']}], 'duration': 570.164, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY410609.jpg', 'highlights': ['A domain controller serves as an authentication and security server for the network, allowing workstations to join the domain and access resources based on their permissions and security policies.', 'The process of adding workstations to the domain involves an administrator manually adding each computer to the domain, requiring username and password authentication.', 'When a user logs in at a computer within the domain, their credentials are sent to the domain controller, which then provides access permissions by sending an access key back to the computer.', 'The importance of managing permissions and security in large networks is emphasized, where assigning permissions to individual users becomes inefficient, and grouping users into manageable units is highlighted.', 'The benefits of assigning permissions and security policies to groups rather than individual users are highlighted, with the ease of managing access for multiple users and the application of security policies to entire groups discussed.', 'The distinction between permissions and security is explained, with permissions focusing on network resource access and security policies determining user actions on the computer, such as software installation and file access.', 'The role of organizational units in managing access to network resources is detailed, where permissions can be assigned to the organizational unit, controlling the access and actions of contained users, groups, and resources.']}, {'end': 1907.611, 'segs': [{'end': 1069.699, 'src': 'heatmap', 'start': 999.641, 'weight': 1, 'content': [{'end': 1009.545, 'text': 'And like I say, if you have 100, 200, 1, 000 users or more, I mean, this just makes life easy.', 'start': 999.641, 'duration': 9.904}, {'end': 1015.649, 'text': "So with that, we're going to take a minute and we're going to talk about how you can have a domain.", 'start': 1009.946, 'duration': 5.703}, {'end': 1029.798, 'text': "So now that we've discussed the basics of what a domain is and why you want it, we have to talk about how you actually get a domain.", 'start': 1022.033, 'duration': 7.765}, {'end': 1035.561, 'text': 'So the domains that everybody are most used to are the Windows domains.', 'start': 1030.439, 'duration': 5.122}, {'end': 1044.128, 'text': 'So, in a Windows domain you have a Windows.', 'start': 1039.547, 'duration': 4.581}, {'end': 1051.352, 'text': "they're now called Active Directory Server and you have a Windows client computer Windows XP Professional,", 'start': 1044.128, 'duration': 7.224}, {'end': 1056.435, 'text': 'Windows Vista Business Edition or Windows 7 Business Edition.', 'start': 1051.352, 'duration': 5.083}, {'end': 1067.177, 'text': 'All you need to do is you need to configure your Windows 2008 server with Active Directory and then with one of your business edition workstation computers.', 'start': 1057.95, 'duration': 9.227}, {'end': 1069.699, 'text': 'you can then add yourself to that domain.', 'start': 1067.177, 'duration': 2.522}], 'summary': 'Having a domain makes life easy for 100, 200, 1000+ users. discusses windows domain setup.', 'duration': 70.058, 'max_score': 999.641, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY999641.jpg'}, {'end': 1122.982, 'src': 'embed', 'start': 1096.373, 'weight': 8, 'content': [{'end': 1102.438, 'text': 'Almost all of the Windows Server software includes Active Directory, except for this is very, very,', 'start': 1096.373, 'duration': 6.065}, {'end': 1107.221, 'text': 'be very careful about this the web edition software.', 'start': 1102.438, 'duration': 4.783}, {'end': 1116.636, 'text': 'So, if you buy Server 2008 Standard Edition, 2003 Standard Edition, anything like that small business edition,', 'start': 1107.742, 'duration': 8.894}, {'end': 1122.982, 'text': "those all have Active Directory built in and included with the software, the service software that you're buying.", 'start': 1116.636, 'duration': 6.346}], 'summary': 'Most windows server software includes active directory, except for the web edition software.', 'duration': 26.609, 'max_score': 1096.373, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1096373.jpg'}, {'end': 1175.121, 'src': 'embed', 'start': 1146.324, 'weight': 7, 'content': [{'end': 1157.741, 'text': "So, if you have XP Home Edition, if you have Vista Home Premium Edition, if you have a Windows 7 Home Premium, or whatever it's called,", 'start': 1146.324, 'duration': 11.417}, {'end': 1163.027, 'text': 'those operating systems are not able to become a member of a domain.', 'start': 1157.741, 'duration': 5.286}, {'end': 1171.416, 'text': 'You have to have either Windows XP Professional, Windows Vista Business Edition or Windows Vista Ultimate Edition,', 'start': 1163.447, 'duration': 7.969}, {'end': 1175.121, 'text': 'Windows 7 Business Edition or Windows 7 Ultimate Edition.', 'start': 1171.416, 'duration': 3.705}], 'summary': 'Xp home, vista home premium, and windows 7 home premium cannot join a domain; need professional/business/ultimate editions.', 'duration': 28.797, 'max_score': 1146.324, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1146324.jpg'}, {'end': 1288.784, 'src': 'embed', 'start': 1242.472, 'weight': 3, 'content': [{'end': 1248.2, 'text': 'This is an open source Linux version of a Windows domain controller.', 'start': 1242.472, 'duration': 5.728}, {'end': 1250.623, 'text': "So it's completely open source and it's completely free.", 'start': 1248.24, 'duration': 2.383}, {'end': 1263.957, 'text': 'Again, you have to have business class, But as long as you do, you can set up a Linux Samba server and have a domain controller that way.', 'start': 1251.705, 'duration': 12.252}, {'end': 1268.258, 'text': 'The last way you can have a domain controller is with Novell.', 'start': 1264.657, 'duration': 3.601}, {'end': 1272.24, 'text': 'Novell was actually the one to really create and push out Active Directory.', 'start': 1268.579, 'duration': 3.661}, {'end': 1278.283, 'text': 'And way back when, back in the late 90s when I got into computers, Novell was.', 'start': 1272.66, 'duration': 5.623}, {'end': 1281.921, 'text': 'I mean, Novell was real competition for Microsoft.', 'start': 1279.48, 'duration': 2.441}, {'end': 1284.462, 'text': 'It was Microsoft and Novell going head to head.', 'start': 1281.961, 'duration': 2.501}, {'end': 1286.023, 'text': "I don't know what happened.", 'start': 1285.122, 'duration': 0.901}, {'end': 1288.784, 'text': 'Novell still exists.', 'start': 1287.543, 'duration': 1.241}], 'summary': 'Linux samba server can serve as a free domain controller, while novell used to be a strong competitor to microsoft in the late 90s.', 'duration': 46.312, 'max_score': 1242.472, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1242472.jpg'}, {'end': 1584.656, 'src': 'embed', 'start': 1556.488, 'weight': 5, 'content': [{'end': 1561.372, 'text': 'So the primary domain controller was king, then you had all these little replicant backup domain controllers.', 'start': 1556.488, 'duration': 4.884}, {'end': 1565.948, 'text': 'This is the way that Samba still works.', 'start': 1562.887, 'duration': 3.061}, {'end': 1575.352, 'text': 'So if you decide to install a Linux Samba server, S-A-M-B-A, it works off of the primary domain controller backup domain controller model.', 'start': 1566.008, 'duration': 9.344}, {'end': 1584.656, 'text': 'Well, Microsoft and Nobel went off and they decided this was a bad way to do business because it really is a pain in the butt.', 'start': 1576.513, 'duration': 8.143}], 'summary': 'Samba uses primary and backup domain controllers, but microsoft and nobel found it problematic.', 'duration': 28.168, 'max_score': 1556.488, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1556488.jpg'}, {'end': 1646.631, 'src': 'embed', 'start': 1617.454, 'weight': 0, 'content': [{'end': 1627.833, 'text': 'so if you had five, Whenever anybody logs in or whenever any changes are made,', 'start': 1617.454, 'duration': 10.379}, {'end': 1633.999, 'text': 'that information is replicated to all five or four other domain controllers.', 'start': 1627.833, 'duration': 6.166}, {'end': 1641.446, 'text': 'So if an administrator sits down on this domain controller and makes a change, then after that change is made,', 'start': 1634.139, 'duration': 7.307}, {'end': 1644.629, 'text': 'that change gets replicated to every other domain controller.', 'start': 1641.446, 'duration': 3.183}, {'end': 1646.631, 'text': "that's part of that Active Directory scheme.", 'start': 1644.629, 'duration': 2.002}], 'summary': 'Changes made on one domain controller are replicated to all five domain controllers in the active directory scheme.', 'duration': 29.177, 'max_score': 1617.454, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1617454.jpg'}, {'end': 1856.287, 'src': 'heatmap', 'start': 1750.234, 'weight': 1, 'content': [{'end': 1755.735, 'text': "So with that, we'll get into a little more complicated stuff of whole domain structures.", 'start': 1750.234, 'duration': 5.501}, {'end': 1769.052, 'text': "So, now that we've talked about the primary domain controllers and backup domain controllers and domain controllers in general,", 'start': 1762.406, 'duration': 6.646}, {'end': 1774.016, 'text': 'I want to give you a little idea of how domains get structured in the real world.', 'start': 1769.052, 'duration': 4.964}, {'end': 1780.81, 'text': 'If you have a little company, you have 100 people or you have 1, 000 people all in one building,', 'start': 1775.507, 'duration': 5.303}, {'end': 1788.275, 'text': "then your entire domain structure is going to be you're going to have your domain controller or controllers.", 'start': 1780.81, 'duration': 7.465}, {'end': 1794.739, 'text': "Let's say you'll have four domain controllers, in case anything bad happens, and then those connect to your network.", 'start': 1788.955, 'duration': 5.784}, {'end': 1798.142, 'text': 'with a thousand other thousand computers connected to it.', 'start': 1795.579, 'duration': 2.563}, {'end': 1799.744, 'text': "And that's your structure.", 'start': 1798.803, 'duration': 0.941}, {'end': 1801.246, 'text': "There's not a lot of the structure.", 'start': 1800.045, 'duration': 1.201}, {'end': 1807.434, 'text': 'You have the domain controllers that give permissions and security to the clients on the system.', 'start': 1801.266, 'duration': 6.168}, {'end': 1809.316, 'text': "And that's it.", 'start': 1808.555, 'duration': 0.761}, {'end': 1810.598, 'text': "That's no big deal.", 'start': 1809.597, 'duration': 1.001}, {'end': 1820.954, 'text': 'But once you start Getting into the really big role, you start getting these large domain structures.', 'start': 1812.3, 'duration': 8.654}, {'end': 1827.077, 'text': 'And when you start doing research on this, they will talk about the vocabulary.', 'start': 1821.075, 'duration': 6.002}, {'end': 1830.959, 'text': "It's called forests, trees, and domains.", 'start': 1827.118, 'duration': 3.841}, {'end': 1834.061, 'text': "I'm not going to get into the whole forest and trees and domains.", 'start': 1832.04, 'duration': 2.021}, {'end': 1841.163, 'text': "works. so let's imagine we have a very large company.", 'start': 1836.702, 'duration': 4.461}, {'end': 1844.724, 'text': "so a lot of times you'll hear about umbrella companies or parent companies.", 'start': 1841.163, 'duration': 3.561}, {'end': 1850.906, 'text': 'so you may have one company here that owns a company underneath of it, so it owns this company.', 'start': 1844.724, 'duration': 6.182}, {'end': 1856.287, 'text': 'then this company owns two or three companies and those companies own three or four companies.', 'start': 1850.906, 'duration': 5.381}], 'summary': 'Domain structures vary with company size. small firms may have 4 domain controllers, while large companies form complex structures with forests, trees, and domains.', 'duration': 75.477, 'max_score': 1750.234, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1750234.jpg'}], 'start': 980.853, 'title': 'Understanding domains and domain controllers', 'summary': "Covers the concept of domains, creating domains using windows server, system requirements, alternative methods using samba and novell, evolution of domain controllers, historical significance of novell, decline of novell's dominance, primary and backup domain controller model, samba's use of the model, evolution to domain controllers in active directory, automatic replication of changes, and domain structuring in larger organizations.", 'chapters': [{'end': 1268.258, 'start': 980.853, 'title': 'Understanding domains and creating them', 'summary': 'Discusses the concept of domains, the process of creating a domain using windows server software, the system requirements for domain membership, and alternative methods of creating a domain using samba and novell.', 'duration': 287.405, 'highlights': ['Windows Server software includes Active Directory, except for the web edition software. It is important to note that almost all Windows Server software includes Active Directory, except for the web edition software, which does not come with Active Directory.', 'Requirement of using business class workstation operating systems to become a member of a domain. Only specific editions of client software, such as Windows XP Professional, Windows Vista Business Edition, or Windows 7 Business Edition, allow membership in a domain, emphasizing the need for business class workstation operating systems.', 'Introduction of alternative methods for creating a domain using Samba, an open source Linux version of a Windows domain controller, and Novell. The chapter introduces alternative methods for domain creation, including using Samba, an open source Linux version of a Windows domain controller, as well as Novell, providing options beyond the traditional Windows domain model.']}, {'end': 1575.352, 'start': 1268.579, 'title': 'Evolution of domain controllers', 'summary': "Discusses the evolution of domain controllers, highlighting the historical significance of novell in competition with microsoft, the decline of novell's dominance, and the primary and backup domain controller model, with emphasis on samba's continued use of this model.", 'duration': 306.773, 'highlights': ["Novell's historical significance in competition with Microsoft Novell was a major competitor to Microsoft in the domain field in the late 90s, and was a tough alternative to Microsoft for certifications.", 'Evolution of domain controllers Explains the primary and backup domain controller model, where the primary domain controller was the center of all changes and access, while the backup domain controllers were inactive copies, with Samba continuing to use this model.', "Samba's utilization of primary and backup domain controller model Samba, an open source Linux version of a domain controller, still operates based on the primary and backup domain controller model, similar to the historical model used by Novell and Microsoft."]}, {'end': 1907.611, 'start': 1576.513, 'title': 'Domain controllers and active directory', 'summary': 'Discusses the evolution from primary and backup domain controllers to the use of domain controllers in active directory, highlighting the automatic replication of changes across multiple domain controllers to ensure network resilience and the structuring of domains in larger organizations.', 'duration': 331.098, 'highlights': ['The transition from primary and backup domain controllers to domain controllers in Active Directory ensures network resilience by replicating changes across multiple domain controllers, preventing network downtime. Automatic replication of changes to all five domain controllers in a large network.', 'In larger organizations, domain structures are established with multiple domain controllers to provide permissions and security to the connected clients, forming a vital part of the network infrastructure. Use of four domain controllers to provide permissions and security to a network of a thousand computers.', 'The concept of domains in the real world involves structuring domain controllers to accommodate the needs of individual companies within a larger umbrella or parent company, each maintaining its own domain for autonomy. Illustration of individual companies within a larger umbrella company establishing their own domain structures.']}], 'duration': 926.758, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY980853.jpg', 'highlights': ['Automatic replication of changes to all five domain controllers in a large network.', 'Use of four domain controllers to provide permissions and security to a network of a thousand computers.', 'Illustration of individual companies within a larger umbrella company establishing their own domain structures.', 'Introduction of alternative methods for creating a domain using Samba, an open source Linux version of a Windows domain controller, and Novell.', "Novell's historical significance in competition with Microsoft Novell was a major competitor to Microsoft in the domain field in the late 90s, and was a tough alternative to Microsoft for certifications.", 'Evolution of domain controllers Explains the primary and backup domain controller model, where the primary domain controller was the center of all changes and access, while the backup domain controllers were inactive copies, with Samba continuing to use this model.', 'In larger organizations, domain structures are established with multiple domain controllers to provide permissions and security to the connected clients, forming a vital part of the network infrastructure.', 'Requirement of using business class workstation operating systems to become a member of a domain. Only specific editions of client software, such as Windows XP Professional, Windows Vista Business Edition, or Windows 7 Business Edition, allow membership in a domain, emphasizing the need for business class workstation operating systems.', 'Windows Server software includes Active Directory, except for the web edition software. It is important to note that almost all Windows Server software includes Active Directory, except for the web edition software, which does not come with Active Directory.']}, {'end': 2513.245, 'segs': [{'end': 2012.7, 'src': 'embed', 'start': 1984.154, 'weight': 0, 'content': [{'end': 1989.876, 'text': 'Well, in the domain world, you can give trusts to other domains.', 'start': 1984.154, 'duration': 5.722}, {'end': 2000.019, 'text': 'So what would happen in this instance is the sales domain would trust the executive domain whatever the user accounts are up here.', 'start': 1990.196, 'duration': 9.823}, {'end': 2010.092, 'text': "So, since the executive domain says that I'm a geek that allows me to install software, If I go to a computer down at the sales domain and log in,", 'start': 2000.699, 'duration': 9.393}, {'end': 2012.7, 'text': 'My login credentials will go up.', 'start': 2010.939, 'duration': 1.761}], 'summary': 'Domains can give trusts to other domains, enabling cross-domain access for user accounts.', 'duration': 28.546, 'max_score': 1984.154, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1984154.jpg'}, {'end': 2194.856, 'src': 'embed', 'start': 2152.808, 'weight': 1, 'content': [{'end': 2163.842, 'text': 'but this gives you an idea of the larger concept of how domains work in the real world, because every single company needs to have, or should have,', 'start': 2152.808, 'duration': 11.034}, {'end': 2166.623, 'text': 'its own domain, because it should have its own security structure.', 'start': 2163.842, 'duration': 2.781}, {'end': 2175.366, 'text': 'But in the modern mega corporation global enterprise world, companies are owned by companies that own other companies.', 'start': 2167.243, 'duration': 8.123}, {'end': 2182.669, 'text': "And so, if you need to have, let's say like I say, a technician that needs to go and be able to deal with all these different companies,", 'start': 2175.807, 'duration': 6.862}, {'end': 2188.572, 'text': 'you need that technician to have the ability to log in and do whatever it needs to do to be done.', 'start': 2182.669, 'duration': 5.903}, {'end': 2194.856, 'text': 'The way you get that to happen is by creating what are called trust relationships between these domains.', 'start': 2189.292, 'duration': 5.564}], 'summary': 'Domains in real world: every company needs its own domain and security structure. trust relationships between domains are crucial for tech operations.', 'duration': 42.048, 'max_score': 2152.808, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2152808.jpg'}, {'end': 2285.459, 'src': 'embed', 'start': 2252.874, 'weight': 9, 'content': [{'end': 2258.978, 'text': "uh, that's why high-end server technicians or administrators make lots and lots and lots and lots of money.", 'start': 2252.874, 'duration': 6.104}, {'end': 2264.442, 'text': 'i mean that you know that those hold those trust relationships and active directory schemes.', 'start': 2258.978, 'duration': 5.464}, {'end': 2269.485, 'text': 'i mean this is how network administrators can make a quarter million dollars a year,', 'start': 2264.442, 'duration': 5.043}, {'end': 2285.459, 'text': 'because if they are the ones that are responsible for just this whole to be able to do.', 'start': 2269.485, 'duration': 15.974}], 'summary': 'High-end server technicians can make a quarter million dollars a year due to their responsibility for trust relationships and active directory schemes.', 'duration': 32.585, 'max_score': 2252.874, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2252874.jpg'}, {'end': 2341.943, 'src': 'embed', 'start': 2307.303, 'weight': 3, 'content': [{'end': 2311.524, 'text': 'So what happens is a client computer on the network.', 'start': 2307.303, 'duration': 4.221}, {'end': 2313.964, 'text': 'if you sit down, you log into that client computer.', 'start': 2311.524, 'duration': 2.44}, {'end': 2316.925, 'text': 'it sends your credentials to this authentication server.', 'start': 2313.964, 'duration': 2.961}, {'end': 2323.106, 'text': "The authentication server figures out what you're allowed to do and then sends an access key back to the client computer.", 'start': 2317.225, 'duration': 5.881}, {'end': 2332.758, 'text': 'do. the reason you like domains or domain controllers can be good is if you have large networks.', 'start': 2326.775, 'duration': 5.983}, {'end': 2341.943, 'text': "it means that administrators can sit down at a single computer on the network and change permissions and policies and the rest of that they don't have to go to all those you know 500 different.", 'start': 2332.758, 'duration': 9.185}], 'summary': 'Client computer sends credentials to authentication server for access key, useful for large networks.', 'duration': 34.64, 'max_score': 2307.303, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2307303.jpg'}, {'end': 2470.683, 'src': 'embed', 'start': 2410.976, 'weight': 4, 'content': [{'end': 2415.52, 'text': "You can do that, but again, that's a lot of maintenance and that's a lot of just pain in the butt.", 'start': 2410.976, 'duration': 4.544}, {'end': 2420.745, 'text': 'What normally happens is users are grouped into groups.', 'start': 2416.441, 'duration': 4.304}, {'end': 2426.057, 'text': 'permissions to the entire group.', 'start': 2424.517, 'duration': 1.54}, {'end': 2432.139, 'text': 'So, if you have lawyers, if you have geeks, if you have salespeople, you put all the salespeople into the sales group,', 'start': 2426.418, 'duration': 5.721}, {'end': 2438.001, 'text': 'all the lawyers into the lawyers group, all the geeks into the geek group, and then you just say geeks are allowed to do this,', 'start': 2432.139, 'duration': 5.862}, {'end': 2441.042, 'text': 'lawyers are allowed to do this and salespeople are allowed to do this.', 'start': 2438.001, 'duration': 3.041}, {'end': 2449.045, 'text': 'That is much easier and a lot less time consuming than literally saying okay, Bob can do this, Robert can do this, John can do this, Paul can do this,', 'start': 2441.242, 'duration': 7.803}, {'end': 2452.806, 'text': 'because you do have to sit down and actually type all this stuff into a computer.', 'start': 2449.045, 'duration': 3.761}, {'end': 2457.31, 'text': 'Then of course beyond groups is something called organizational units.', 'start': 2453.426, 'duration': 3.884}, {'end': 2463.056, 'text': 'You can put just about anything in the world or on a network into an organizational unit.', 'start': 2457.851, 'duration': 5.205}, {'end': 2470.683, 'text': 'So organizational units can contain user accounts, they can contain groups, they can contain computers,', 'start': 2463.136, 'duration': 7.547}], 'summary': 'Grouping users into groups for easier permissions management, reduces time and effort compared to individual user permissions.', 'duration': 59.707, 'max_score': 2410.976, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2410976.jpg'}], 'start': 1907.751, 'title': 'Domain trust relationships and network administration', 'summary': 'Explains domain trust relationships in a multi-company environment, emphasizing the need for trust relationships between domains. it also outlines the role of domain controllers in network administration, emphasizing the importance of trust relationships and active directory schemes. the potential for high earnings in network administration roles is also highlighted.', 'chapters': [{'end': 2252.874, 'start': 1907.751, 'title': 'Domain trust relationships', 'summary': 'Explains the concept of domain trust relationships in a multi-company environment, highlighting the need for trust relationships between domains to allow technicians to access and perform tasks across different company domains.', 'duration': 345.123, 'highlights': ['Trust relationships are essential for technicians to access and perform tasks across different company domains. The concept of trust relationships is crucial for technicians needing to work across different company domains, ensuring they have the necessary access and permissions to perform tasks.', 'Different domains can establish trust relationships to allow users to access resources and perform tasks in other domains. The establishment of trust relationships between different domains enables users to access resources and perform tasks in other domains, facilitating seamless operations across multiple company domains.', 'The need for trust relationships arises in the modern mega-corporation global enterprise world where companies are owned by companies that own other companies. In the modern global enterprise environment, where companies are owned by larger entities, the necessity for trust relationships between domains arises to enable technicians to work across different company domains.']}, {'end': 2513.245, 'start': 2252.874, 'title': 'Domain controllers and network administration', 'summary': 'Outlines the role of domain controllers in network administration, emphasizing the importance of trust relationships and active directory schemes. it also highlights the significance of permissions and security in user management, demonstrating the potential for high earnings in network administration roles.', 'duration': 260.371, 'highlights': ['Network administrators can earn up to a quarter million dollars a year due to their responsibility for trust relationships and active directory schemes. The high earning potential of network administrators is attributed to their responsibility for trust relationships and active directory schemes, which underscores the critical role of these administrators in managing network security.', 'Domain controllers enable administrators to efficiently manage permissions and policies for large networks, reducing the need to individually configure settings for numerous devices. Domain controllers streamline the management of permissions and policies for large networks, allowing administrators to make changes from a centralized location, thereby increasing efficiency and reducing the need for manual configuration across multiple devices.', 'Grouping users into distinct categories such as salespeople, lawyers, and geeks simplifies the assignment of permissions and security, minimizing administrative workload and enhancing network security. Categorizing users into groups such as salespeople, lawyers, and geeks simplifies the assignment of permissions and security, reducing administrative workload and strengthening network security by streamlining user management.', 'Organizational units play a crucial role in network security by facilitating the containment of user accounts, groups, and computers, as well as the application of permissions and security measures. Organizational units contribute to network security by enabling the containment of user accounts, groups, and computers, as well as the application of permissions and security measures, thereby enhancing the overall security posture of the network.']}], 'duration': 605.494, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY1907751.jpg', 'highlights': ['Different domains can establish trust relationships to allow users to access resources and perform tasks in other domains.', 'The establishment of trust relationships between different domains enables users to access resources and perform tasks in other domains, facilitating seamless operations across multiple company domains.', 'The need for trust relationships arises in the modern mega-corporation global enterprise world where companies are owned by companies that own other companies.', 'Domain controllers enable administrators to efficiently manage permissions and policies for large networks, reducing the need to individually configure settings for numerous devices.', 'Grouping users into distinct categories such as salespeople, lawyers, and geeks simplifies the assignment of permissions and security, minimizing administrative workload and enhancing network security.', 'Categorizing users into groups such as salespeople, lawyers, and geeks simplifies the assignment of permissions and security, reducing administrative workload and strengthening network security by streamlining user management.', 'Organizational units play a crucial role in network security by facilitating the containment of user accounts, groups, and computers, as well as the application of permissions and security measures.', 'Trust relationships are essential for technicians to access and perform tasks across different company domains.', 'The concept of trust relationships is crucial for technicians needing to work across different company domains, ensuring they have the necessary access and permissions to perform tasks.', 'The high earning potential of network administrators is attributed to their responsibility for trust relationships and active directory schemes, which underscores the critical role of these administrators in managing network security.']}, {'end': 2865.007, 'segs': [{'end': 2556.429, 'src': 'embed', 'start': 2531.771, 'weight': 1, 'content': [{'end': 2538.756, 'text': 'You need a Windows 2008 or 2003 server and you need client computers with a business edition operating system.', 'start': 2531.771, 'duration': 6.985}, {'end': 2549.244, 'text': 'Again, Windows XP Professional, Vista Business Edition or Ultimate Edition or Windows 7 Business or Ultimate Edition.', 'start': 2538.936, 'duration': 10.308}, {'end': 2554.527, 'text': 'You cannot make a home edition computer part of a domain.', 'start': 2549.444, 'duration': 5.083}, {'end': 2556.429, 'text': "It's just not part of the product.", 'start': 2554.888, 'duration': 1.541}], 'summary': 'Need windows server 2008/2003 and business edition os for client computers. home edition not compatible.', 'duration': 24.658, 'max_score': 2531.771, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2531771.jpg'}, {'end': 2630.418, 'src': 'embed', 'start': 2576.75, 'weight': 2, 'content': [{'end': 2580.311, 'text': 'That does not give you the ability to do domain controllers.', 'start': 2576.75, 'duration': 3.561}, {'end': 2582.646, 'text': 'We talked a little bit about Samba.', 'start': 2581.206, 'duration': 1.44}, {'end': 2588.267, 'text': "Samba is Linux's open source free way of creating a domain controller.", 'start': 2583.126, 'duration': 5.141}, {'end': 2596.549, 'text': "So you install that onto a Linux server and then that Linux server will act like what's called a PDC, a primary domain controller.", 'start': 2588.287, 'duration': 8.262}, {'end': 2598.309, 'text': 'You can also do Novell.', 'start': 2596.989, 'duration': 1.32}, {'end': 2601.79, 'text': "Again, I haven't run into Novell in years, to be honest with you.", 'start': 2599.029, 'duration': 2.761}, {'end': 2604.07, 'text': 'I mean, I did a little research for this class and they still exist.', 'start': 2601.81, 'duration': 2.26}, {'end': 2608.051, 'text': "They're still putting out servers, but I don't know anyone who uses them,", 'start': 2604.79, 'duration': 3.261}, {'end': 2616.817, 'text': 'but they do give you the ability to give permissions and give security to computers and users on the network.', 'start': 2608.051, 'duration': 8.766}, {'end': 2618.68, 'text': "So it's a possibility.", 'start': 2616.857, 'duration': 1.823}, {'end': 2630.418, 'text': 'controller is king of the hill.', 'start': 2628.837, 'duration': 1.581}], 'summary': 'Samba is a free way to create a domain controller on linux, while novell also provides server solutions for permissions and security on the network.', 'duration': 53.668, 'max_score': 2576.75, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2576750.jpg'}, {'end': 2700.727, 'src': 'embed', 'start': 2648.865, 'weight': 0, 'content': [{'end': 2654.427, 'text': 'people can still log in and do whatever they were doing based on the information of the backup domain controller,', 'start': 2648.865, 'duration': 5.562}, {'end': 2661.267, 'text': 'But administrators cannot make changes to the security scheme on a backup domain controller.', 'start': 2655.325, 'duration': 5.942}, {'end': 2668.329, 'text': 'They have to manually do something called promote the backup domain controller to be a primary domain controller.', 'start': 2661.667, 'duration': 6.662}, {'end': 2670.71, 'text': "And then once that happens, they're able to make changes.", 'start': 2668.409, 'duration': 2.301}, {'end': 2678.272, 'text': 'That, of course, it was just a tedious pain in the butt, which was harder to do than it was to say.', 'start': 2672.25, 'duration': 6.022}, {'end': 2684.754, 'text': 'And so in Windows 2000 servers and above, Windows implemented Active Directory.', 'start': 2678.572, 'duration': 6.182}, {'end': 2692.485, 'text': 'They have both read and write ability on the network.', 'start': 2689.224, 'duration': 3.261}, {'end': 2697.066, 'text': 'So you can cluster three or four or five or a hundred domain controllers together.', 'start': 2692.745, 'duration': 4.321}, {'end': 2700.727, 'text': 'When people log in, they just log into the closest domain controller.', 'start': 2697.446, 'duration': 3.281}], 'summary': 'In windows 2000 servers and above, administrators need to manually promote a backup domain controller to a primary one to make changes in the security scheme, while users can log into the closest domain controller.', 'duration': 51.862, 'max_score': 2648.865, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2648865.jpg'}, {'end': 2749.667, 'src': 'embed', 'start': 2722.444, 'weight': 3, 'content': [{'end': 2729.026, 'text': 'I mean, if you have multiple domains within one company or one organization.', 'start': 2722.444, 'duration': 6.582}, {'end': 2730.687, 'text': 'We talked about trusts.', 'start': 2729.426, 'duration': 1.261}, {'end': 2736.609, 'text': 'Again, this is a long, horrible, tedious class, but we gave you an overview of what trusts are.', 'start': 2730.907, 'duration': 5.702}, {'end': 2741.01, 'text': 'So if you have the parent company here and you have the child companies,', 'start': 2736.649, 'duration': 4.361}, {'end': 2749.667, 'text': "if I'm a geek from the computer in the child company and do whatever it is I need to do, and I have permissions to do that.", 'start': 2741.01, 'duration': 8.657}], 'summary': 'Overview of trusts in managing permissions across multiple domains within a company.', 'duration': 27.223, 'max_score': 2722.444, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2722444.jpg'}], 'start': 2513.505, 'title': 'Domain controllers and domains', 'summary': 'Covers setting up domain controllers, including requirements for windows server and client operating systems, alternative options like samba and novell, and the implementation of active directory in windows 2000 servers and above. it also explains the concept of primary and backup domain controllers, the structure of domains, including trusts and trees, and highlights the benefits and complexities of domain controllers and their usage in corporate environments.', 'chapters': [{'end': 2630.418, 'start': 2513.505, 'title': 'Setting up domain controllers', 'summary': 'Discusses setting up domain controllers, emphasizing the requirements for windows server and client operating systems, caution against using web edition server software, and alternative options like samba and novell for creating domain controllers.', 'duration': 116.913, 'highlights': ['Windows server software requires Windows 2008 or 2003 server and client computers with a business edition operating system, such as Windows XP Professional, Vista Business Edition, or Windows 7 Business Edition.', 'Web edition server software should not be purchased for setting up domain controllers, as it lacks the ability to be a domain controller.', 'Samba is an open source free tool that can be used to create a domain controller on a Linux server, functioning as a PDC (primary domain controller).', 'Novell servers, although less commonly used, provide the ability to grant permissions and security to computers and users on the network.']}, {'end': 2865.007, 'start': 2630.418, 'title': 'Introduction to domains', 'summary': 'Explains the concept of primary and backup domain controllers, the implementation of active directory in windows 2000 servers and above, and the structure of domains, including trusts and trees, highlighting the benefits and complexities of domain controllers and their usage in corporate environments.', 'duration': 234.589, 'highlights': ['Active Directory in Windows 2000 servers and above allows clustering of domain controllers and automatic replication of changes, simplifying the process and ensuring high availability. In Windows 2000 servers and above, Windows implemented Active Directory, allowing clustering of three or more domain controllers, automatic replication of changes, and simplifying the process.', 'Explanation of trusts and their significance in large corporate environments, illustrating the complexities and permissions associated with domains and their structures. The chapter explains trusts in the context of large corporate environments, highlighting the complexities and permissions associated with domains and their structures.', 'Overview of primary and backup domain controllers, including the process of promoting a backup domain controller to a primary role and the limitations of a backup controller in making security changes. The chapter provides an overview of primary and backup domain controllers, the process of promoting a backup domain controller to a primary role, and the limitations of a backup controller in making security changes.']}], 'duration': 351.502, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/ut_oLhMhJsY/pics/ut_oLhMhJsY2513505.jpg', 'highlights': ['Active Directory in Windows 2000 servers and above allows clustering of domain controllers and automatic replication of changes, ensuring high availability.', 'Windows server software requires Windows 2008 or 2003 server and client computers with a business edition operating system.', 'Samba is an open source free tool that can be used to create a domain controller on a Linux server, functioning as a PDC (primary domain controller).', 'Explanation of trusts and their significance in large corporate environments, illustrating the complexities and permissions associated with domains and their structures.', 'Overview of primary and backup domain controllers, including the process of promoting a backup domain controller to a primary role and the limitations of a backup controller in making security changes.', 'Novell servers provide the ability to grant permissions and security to computers and users on the network.']}], 'highlights': ['Domain architecture involves one or multiple servers responsible for network security and permissions, providing an overview of domains and their operation.', 'Emphasizing the importance of understanding domain concepts and features when deciding on the creation of a domain network.', 'Multiple products are available for creating domains, including Windows with Active Directory, Linux with Samba, and Novell.', 'A domain is essential for managing large networks with numerous connected computers, allowing control over file sharing, printer access, and security policies.', 'Domain controllers and domains provide an efficient way to manage security permissions and file sharing for a large number of computers, offering a practical solution for managing 100 or 1,000 computers at scale.', 'The importance of managing permissions and security in large networks is emphasized, where assigning permissions to individual users becomes inefficient, and grouping users into manageable units is highlighted.', 'The benefits of assigning permissions and security policies to groups rather than individual users are highlighted, with the ease of managing access for multiple users and the application of security policies to entire groups discussed.', 'The process of adding workstations to the domain involves an administrator manually adding each computer to the domain, requiring username and password authentication.', 'The distinction between permissions and security is explained, with permissions focusing on network resource access and security policies determining user actions on the computer, such as software installation and file access.', 'Automatic replication of changes to all five domain controllers in a large network.', 'Illustration of individual companies within a larger umbrella company establishing their own domain structures.', 'Different domains can establish trust relationships to allow users to access resources and perform tasks in other domains.', 'Active Directory in Windows 2000 servers and above allows clustering of domain controllers and automatic replication of changes, ensuring high availability.', 'Samba is an open source free tool that can be used to create a domain controller on a Linux server, functioning as a PDC (primary domain controller).', 'Novell servers provide the ability to grant permissions and security to computers and users on the network.']}