{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2022-05-17T12:31:15+00:00"},"categoryId":33582,"data":{"title":"Active Directory","slug":"active-directory-networking","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"parentCategory":{"categoryId":33581,"title":"Networking","slug":"networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"}},"childCategories":[],"description":"Active Directory Domain Controller roles? Check. Network administration tips? Check. These articles will get you up to speed on Active Directory.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33582&offset=0&size=5"}},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":2,"total":2,"items":[{"headers":{"creationTime":"2016-03-26T22:45:26+00:00","modifiedTime":"2016-03-26T22:45:26+00:00","timestamp":"2022-02-24T16:59:08+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Moving Objects in Active Directory","strippedTitle":"moving objects in active directory","slug":"moving-objects-in-active-directory","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"<p class=\"Tip\">Moving objects around in Active Directory may involve moving objects from one location to another within a domain, or you might have to move objects from one domain to another. You need to know the details associated with either operation for the MCSE Directory Services exam. Fortunately, you just need to remember some simple rules.</p>\n<h2 id=\"tab1\" >Moving objects within a domain</h2>\n<p>Moving objects within a domain is a simple process: Just right-click the object and choose Move. Windows 2000 displays a dialog box in which you simply choose the destination container object for the move. (In newer versions of Windows 2000, you can drag and drop Active Directory objects from one OU to another.)</p>\n<p>A real-world example of moving an object within a domain involves moving a user account from one OU to another when the user transfers from one department to another in your organization. Moving the user's account enables the user to receive the benefits and restrictions you have defined for the new OU.</p>\n<p class=\"Remember\">What is not as straightforward (and what you need to know for the exam) is the effect that moving objects has on permissions. Here are the rules you must know:</p>\n<ul><li>Permissions you assign directly to an Active Directory object remain with the object after you move the object.</li></ul>\n<ul><li>The object inherits the permissions assigned to the new OU and loses any previously inherited permissions.</li></ul>\n<p class=\"Tip\">You may have already figured this one out: An excellent strategy for administering Active Directory objects is to move objects that need similar permission settings into the same OU. By doing so, you can easily manage your network, assigning permissions and delegating authority effectively with just a few mouse clicks.</p>\n<h2 id=\"tab2\" >Moving objects between domains</h2>\n<p>In a multiple-domain Windows 2000 forest, you may need to move objects (users, organizational units, groups) between these multiple domains. You use the MOVETREE command line utility to perform many of these operations.</p>\n<!-- break -->\n<p class=\"Remember\">When you move users and groups to a new domain, they receive new security identifiers (SIDs). Fortunately, Windows 2000 running in native mode supports an attribute called SIDHistory. As you move a user from domain to domain, Windows 2000 populates SIDHistory so you do not have to reset permissions to objects each time you perform the move operation.</p>\n<p>MOVETREE assists you with most move operations between domains. And in those cases for which MOVETREE cannot do the job, you can turn to another utility called NETDOM. MOVETREE can</p>\n<ul><li>Move most Active Directory objects (including nonempty containers) from one domain to another in the same forest.</li></ul>\n<ul><li>Move domain local and global groups between domains. These groups cannot contain members, however. The domains must exist within the same forest.</li></ul>\n<ul><li>Move universal groups and their members between domains of the same forest.</li></ul>\n<p class=\"Remember\">MOVETREE can move <i>most </i>Active Directory objects. Those that it cannot move when you try to relocate groups of objects become <i>orphaned</i>. Windows 2000 places these orphaned objects in a special container called LostAndFound. You can view this container by using the Advanced View feature of Active Directory Users and Computers.</p>\n<p>You must have the appropriate administrative permissions to use MOVETREE from the command prompt. This command uses the following syntax:</p>\n<p class=\"article-list\">MOVETREE {/start | /startnocheck | /continue | /check} /s <i>SrcDSA</i> /d <i>DstDSA</i> /sdn <i>SrcDN</i> /ddn <i>DstDN</i> [/u [<i>Domain</i>]<i>Username</i> /p <i>Password</i>] [/verbose] [{/? | /help}]</p>\n<p>The italicized entries in this syntax represent information you must provide. Table 1 describes the switches you can use with the MOVETREE command.</p>\n<p><b>Table 1\tMOVETREE Command Switches</b></p>\n<table class=\"article-table\" cellpadding=\"7\"><tr class=\"article-table-row\"><td valign=\"top\"><p><b><i>Switch</i></b></p>\n</td><td valign=\"top\"><p><b><i>What It Does</i></b></p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/start</p>\n</td><td valign=\"top\"><p>Initiates the move operation.</p>\n<!-- break -->\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/startnocheck</p>\n</td><td valign=\"top\"><p>Starts a MOVETREE operation with no /check.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/continue</p>\n</td><td valign=\"top\"><p>Continues the execution of a previously paused or failed MOVETREE operation.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/check</p>\n</td><td valign=\"top\"><p>Performs a test run of the MOVETREE operation.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/s SrcDSA</p>\n</td><td valign=\"top\"><p>Specifies the source server's fully qualified domain name (FQDN).</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/d DstDSA</p>\n</td><td valign=\"top\"><p>Specifies the destination server's FQDN.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/sdn SrcDN</p>\n</td><td valign=\"top\"><p>Specifies the distinguished name of the object you are moving from the source.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/ddn DstDN</p>\n</td><td valign=\"top\"><p>Specifies the distinguished name of the object you are moving to the destination.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/u</p>\n</td><td valign=\"top\"><p>Runs MOVETREE under the credentials of the username and password provided.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/verbose</p>\n</td><td valign=\"top\"><p>Causes MOVETREE to display more details as it runs.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/?</p>\n</td><td valign=\"top\"><p>Displays help about MOVETREE.</p>\n</td></tr>\n</table>\n<p>MOVETREE creates log files when operations are performed. You can check these log files for information regarding the success or failure of MOVETREE events:</p>\n<ul><li>MOVETREE.ERR: Lists any errors encountered.</li></ul>\n<ul><li>MOVETREE.LOG: Lists statistical results of the operation.</li></ul>\n<ul><li>MOVETREE.CHK: Lists any errors detected from MOVETREE being executed in check mode.</li></ul>\n<p class=\"Tip\">MOVETREE moves computer objects from one domain to another for you, but it cannot disjoin the computer from the source domain and join it to the target domain. This limitation makes NETDOM a much better utility for moving computers between domains in a Windows 2000 Active Directory setting.</p>\n<p>NETDOM uses the following syntax to move computer accounts:</p>\n<p class=\"article-list\">MOVETREE {/NETDOM move /D:<i>domain</i> [/OU:<i>ou_path</i>] [/Ud:<i>User</i> /Pd:{<i>Password</i>|*}] [/Uo:<i>User</i> /Po:{<i>Password</i>|*}] [/Reboot:[<i>time_in_seconds</i>]]</p>\n<p>Table 2 describes the switches you use with the NETDOM command.</p>\n<p><b>Table 2\tNETDOM Command Switches</b></p>\n<table class=\"article-table\" cellpadding=\"7\"><tr class=\"article-table-row\"><td valign=\"top\"><p><b><i>Switch</i></b></p>\n</td><td valign=\"top\"><p><b><i>What It Does</i></b></p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/domain</p>\n</td><td valign=\"top\"><p>Identifies the target domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/OU:ou_path</p>\n</td><td valign=\"top\"><p>Specifies the target OU.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Ud:User</p>\n</td><td valign=\"top\"><p>Indicates the user account used to make the connection with the target domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>Pd:{Password|*}</p>\n</td><td valign=\"top\"><p>Enters the password for the user account used to connect to the destination domain; if you use *, NETDOM prompts for the password.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Uo:User</p>\n</td><td valign=\"top\"><p>Identifies the user account used to make the connection to the source domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Po:{Password|*}</p>\n</td><td valign=\"top\"><p>Enters the password for the user account used to connect to the original domain; if you use *, NETDOM prompts for the password.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Reboot:[time_in_seconds]</p>\n</td><td valign=\"top\"><p>Specifies that the computer being moved should shut down and reboot automatically in the given number of seconds after the move operation.</p>\n</td></tr>\n</table>\n<h1 class=\"article-h1\"></h1>","description":"<p class=\"Tip\">Moving objects around in Active Directory may involve moving objects from one location to another within a domain, or you might have to move objects from one domain to another. You need to know the details associated with either operation for the MCSE Directory Services exam. Fortunately, you just need to remember some simple rules.</p>\n<h2 id=\"tab1\" >Moving objects within a domain</h2>\n<p>Moving objects within a domain is a simple process: Just right-click the object and choose Move. Windows 2000 displays a dialog box in which you simply choose the destination container object for the move. (In newer versions of Windows 2000, you can drag and drop Active Directory objects from one OU to another.)</p>\n<p>A real-world example of moving an object within a domain involves moving a user account from one OU to another when the user transfers from one department to another in your organization. Moving the user's account enables the user to receive the benefits and restrictions you have defined for the new OU.</p>\n<p class=\"Remember\">What is not as straightforward (and what you need to know for the exam) is the effect that moving objects has on permissions. Here are the rules you must know:</p>\n<ul><li>Permissions you assign directly to an Active Directory object remain with the object after you move the object.</li></ul>\n<ul><li>The object inherits the permissions assigned to the new OU and loses any previously inherited permissions.</li></ul>\n<p class=\"Tip\">You may have already figured this one out: An excellent strategy for administering Active Directory objects is to move objects that need similar permission settings into the same OU. By doing so, you can easily manage your network, assigning permissions and delegating authority effectively with just a few mouse clicks.</p>\n<h2 id=\"tab2\" >Moving objects between domains</h2>\n<p>In a multiple-domain Windows 2000 forest, you may need to move objects (users, organizational units, groups) between these multiple domains. You use the MOVETREE command line utility to perform many of these operations.</p>\n<!-- break -->\n<p class=\"Remember\">When you move users and groups to a new domain, they receive new security identifiers (SIDs). Fortunately, Windows 2000 running in native mode supports an attribute called SIDHistory. As you move a user from domain to domain, Windows 2000 populates SIDHistory so you do not have to reset permissions to objects each time you perform the move operation.</p>\n<p>MOVETREE assists you with most move operations between domains. And in those cases for which MOVETREE cannot do the job, you can turn to another utility called NETDOM. MOVETREE can</p>\n<ul><li>Move most Active Directory objects (including nonempty containers) from one domain to another in the same forest.</li></ul>\n<ul><li>Move domain local and global groups between domains. These groups cannot contain members, however. The domains must exist within the same forest.</li></ul>\n<ul><li>Move universal groups and their members between domains of the same forest.</li></ul>\n<p class=\"Remember\">MOVETREE can move <i>most </i>Active Directory objects. Those that it cannot move when you try to relocate groups of objects become <i>orphaned</i>. Windows 2000 places these orphaned objects in a special container called LostAndFound. You can view this container by using the Advanced View feature of Active Directory Users and Computers.</p>\n<p>You must have the appropriate administrative permissions to use MOVETREE from the command prompt. This command uses the following syntax:</p>\n<p class=\"article-list\">MOVETREE {/start | /startnocheck | /continue | /check} /s <i>SrcDSA</i> /d <i>DstDSA</i> /sdn <i>SrcDN</i> /ddn <i>DstDN</i> [/u [<i>Domain</i>]<i>Username</i> /p <i>Password</i>] [/verbose] [{/? | /help}]</p>\n<p>The italicized entries in this syntax represent information you must provide. Table 1 describes the switches you can use with the MOVETREE command.</p>\n<p><b>Table 1\tMOVETREE Command Switches</b></p>\n<table class=\"article-table\" cellpadding=\"7\"><tr class=\"article-table-row\"><td valign=\"top\"><p><b><i>Switch</i></b></p>\n</td><td valign=\"top\"><p><b><i>What It Does</i></b></p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/start</p>\n</td><td valign=\"top\"><p>Initiates the move operation.</p>\n<!-- break -->\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/startnocheck</p>\n</td><td valign=\"top\"><p>Starts a MOVETREE operation with no /check.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/continue</p>\n</td><td valign=\"top\"><p>Continues the execution of a previously paused or failed MOVETREE operation.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/check</p>\n</td><td valign=\"top\"><p>Performs a test run of the MOVETREE operation.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/s SrcDSA</p>\n</td><td valign=\"top\"><p>Specifies the source server's fully qualified domain name (FQDN).</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/d DstDSA</p>\n</td><td valign=\"top\"><p>Specifies the destination server's FQDN.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/sdn SrcDN</p>\n</td><td valign=\"top\"><p>Specifies the distinguished name of the object you are moving from the source.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/ddn DstDN</p>\n</td><td valign=\"top\"><p>Specifies the distinguished name of the object you are moving to the destination.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/u</p>\n</td><td valign=\"top\"><p>Runs MOVETREE under the credentials of the username and password provided.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/verbose</p>\n</td><td valign=\"top\"><p>Causes MOVETREE to display more details as it runs.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/?</p>\n</td><td valign=\"top\"><p>Displays help about MOVETREE.</p>\n</td></tr>\n</table>\n<p>MOVETREE creates log files when operations are performed. You can check these log files for information regarding the success or failure of MOVETREE events:</p>\n<ul><li>MOVETREE.ERR: Lists any errors encountered.</li></ul>\n<ul><li>MOVETREE.LOG: Lists statistical results of the operation.</li></ul>\n<ul><li>MOVETREE.CHK: Lists any errors detected from MOVETREE being executed in check mode.</li></ul>\n<p class=\"Tip\">MOVETREE moves computer objects from one domain to another for you, but it cannot disjoin the computer from the source domain and join it to the target domain. This limitation makes NETDOM a much better utility for moving computers between domains in a Windows 2000 Active Directory setting.</p>\n<p>NETDOM uses the following syntax to move computer accounts:</p>\n<p class=\"article-list\">MOVETREE {/NETDOM move /D:<i>domain</i> [/OU:<i>ou_path</i>] [/Ud:<i>User</i> /Pd:{<i>Password</i>|*}] [/Uo:<i>User</i> /Po:{<i>Password</i>|*}] [/Reboot:[<i>time_in_seconds</i>]]</p>\n<p>Table 2 describes the switches you use with the NETDOM command.</p>\n<p><b>Table 2\tNETDOM Command Switches</b></p>\n<table class=\"article-table\" cellpadding=\"7\"><tr class=\"article-table-row\"><td valign=\"top\"><p><b><i>Switch</i></b></p>\n</td><td valign=\"top\"><p><b><i>What It Does</i></b></p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/domain</p>\n</td><td valign=\"top\"><p>Identifies the target domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/OU:ou_path</p>\n</td><td valign=\"top\"><p>Specifies the target OU.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Ud:User</p>\n</td><td valign=\"top\"><p>Indicates the user account used to make the connection with the target domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>Pd:{Password|*}</p>\n</td><td valign=\"top\"><p>Enters the password for the user account used to connect to the destination domain; if you use *, NETDOM prompts for the password.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Uo:User</p>\n</td><td valign=\"top\"><p>Identifies the user account used to make the connection to the source domain.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Po:{Password|*}</p>\n</td><td valign=\"top\"><p>Enters the password for the user account used to connect to the original domain; if you use *, NETDOM prompts for the password.</p>\n</td></tr>\n<tr class=\"article-table-row\"><td valign=\"top\"><p>/Reboot:[time_in_seconds]</p>\n</td><td valign=\"top\"><p>Specifies that the computer being moved should shut down and reboot automatically in the given number of seconds after the move operation.</p>\n</td></tr>\n</table>\n<h1 class=\"article-h1\"></h1>","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Moving objects within a domain","target":"#tab1"},{"label":"Moving objects between domains","target":"#tab2"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":184140,"title":"Network Administration: Structure of Active Directory","slug":"network-administration-structure-of-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/184140"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-6217b95c30005\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-6217b95c30983\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":null,"lifeExpectancySetFrom":null,"dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":199818},{"headers":{"creationTime":"2016-03-26T19:41:58+00:00","modifiedTime":"2016-03-26T19:41:58+00:00","timestamp":"2022-02-24T16:55:39+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Network Administration: Structure of Active Directory","strippedTitle":"network administration: structure of active directory","slug":"network-administration-structure-of-active-directory","canonicalUrl":"","seo":{"metaDescription":"","noIndex":0,"noFollow":0},"content":"<p>The terms <i>object, organizational unit, domain, tree, </i>and <i>forest </i>are used to describe the way Active Directory organizes its directory data. Like all directories, Active Directory is essentially a database management system. The Active Directory database is where the individual objects tracked by the directory are stored. Active Directory uses a <i>hierarchical </i>database model, which groups items in a tree-like structure.</p>\n<p>The following sections explain the meaning of these important Active Directory terms.</p>\n<h2 id=\"tab1\" >Objects</h2>\n<p>The basic unit of data in Active Directory is called an <i>object</i><i>.</i> Active Directory can store information about many different kinds of objects. The objects you work with most are users, groups, computers, and printers.</p>\n<p>The figure below shows the Active Directory Manager displaying a list of built-in objects that come preconfigured with Windows Server 2008 R2. To get to this management tool, choose Start→Administrative Tools→Active Directory Users and Computers. Then click the Builtin node to show the built-in objects.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292746.image0.jpg\" width=\"535\" height=\"343\" alt=\"image0.jpg\"/>\n<p>Objects have descriptive characteristics called <i>properties </i>or <i>attributes</i><i>.</i> You can call up the properties of an object by double-clicking the object in the management console.</p>\n<h2 id=\"tab2\" >Domains</h2>\n<p>A <i>domain </i>is the basic unit for grouping related objects in Active Directory. Typically, domains correspond to departments in a company. For example, a company with separate Accounting, Manufacturing, and Sales departments might have domains named (you guessed it) <i>Accounting</i>, <i>Manufacturing</i>, and <i>Sales</i>. Or the domains correspond to geographical locations. For example, a company with offices in Detroit, Dallas, and Denver might have domains named <i>det</i>, <i>dal</i>, and <i>den</i>.</p>\n<p>Note that because Active Directory domains use DNS naming conventions, you can create subdomains that are considered to be child domains. You should always create the top-level domain for your entire network before you create any other domain.</p>\n<p>For example, if your company is named Nimbus Brooms and you’ve registered <i>NimbusBroom.com</i> as your domain name, you should create a top-level domain named <i>NimbusBroom.com</i> before you create any other domains. Then, you can create subdomains such as <i>Accounting.NimbusBroom.com</i>, <i>Manufacturing.NimbusBroom.com</i>, and <i>Sales.NimbusBroom.com</i>.</p>\n<p class=\"Tip\">If you have Microsoft Visio, you can use it to draw diagrams for your Active Directory domain structure. Visio includes several templates that provide cool icons for various types of Active Directory objects. For example, the following figure shows a diagram that shows an Active Directory with four domains created with Visio.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292747.image1.jpg\" width=\"535\" height=\"341\" alt=\"image1.jpg\"/>\n<p>Note that these domains have little to do with the physical structure of your network. In Windows NT, domains usually are related to the network’s physical structure.</p>\n<p>Every domain must have at least one <i>domain controller, </i>which is a server that’s responsible for the domain. However, unlike a Windows NT PDC, an Active Directory domain controller doesn’t have unique authority over its domain. In fact, a domain can have two or more domain controllers that share administrative duties. A feature called <i>replication </i>works hard at keeping all the domain controllers in sync with each other.</p>\n<h2 id=\"tab3\" >Organizational units</h2>\n<p>Many domains have too many objects to manage all together in a single group. Fortunately, Active Directory lets you create one or more <i>organizational units, </i>also known as OUs. OUs let you organize objects within a domain, without the extra work and inefficiency of creating additional domains.</p>\n<p>One reason to create OUs within a domain is so that you can assign administrative rights to each OU of different users. Then, these users can perform routine administrative tasks such as creating new user accounts or resetting passwords.</p>\n<p>For example, suppose the domain for the Denver office, named <i>den</i>, houses the Accounting and Legal departments. Rather than create separate domains for these departments, you could create organizational units for the departments.</p>\n<h2 id=\"tab4\" >Trees</h2>\n<p>A <i>tree </i>is a set of Active Directory names that share a common namespace. For example, the domains <i>NimbusBroom.com</i>, <i>Accounting.NimbusBroom.com</i>, <i>Manufacturing.NimbusBroom.com</i>, and <i>Sales.NimbusBroom.com</i> make up a tree that is derived from a common root domain, <i>NimbusBroom.com</i>.</p>\n<p>The domains that make up a tree are related to each other through <i>transitive trusts.</i> In a transitive trust, if DomainA trusts DomainB and DomainB trusts DomainC, then DomainA automatically trusts DomainC.</p>\n<p class=\"Tip\">Note that a single domain all by itself is still considered to be a tree.</p>\n<h2 id=\"tab5\" >Forests</h2>\n<p>As its name suggests, a <i>forest </i>is a collection of trees. In other words, a forest is a collection of one or more domain trees that do <i>not </i>share a common parent domain.</p>\n<p>For example, suppose Nimbus Brooms acquires Tracorum Technical Enterprises, which already has its own root domain named <i>TracorumTech.com</i>, with several subdomains of its own. Then, you can create a forest from these two domain trees so the domains can trust each other.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292748.image2.jpg\" width=\"535\" height=\"300\" alt=\"image2.jpg\"/>\n<p>The key to Active Directory forests is a database called the global catalog. The <i>global catalog </i>is sort of a super-directory that contains information about all of the objects in a forest, regardless of the domain. Then, if a user account can’t be found in the current domain, the global catalog is searched for the account. The global catalog provides a reference to the domain in which the account is defined.</p>","description":"<p>The terms <i>object, organizational unit, domain, tree, </i>and <i>forest </i>are used to describe the way Active Directory organizes its directory data. Like all directories, Active Directory is essentially a database management system. The Active Directory database is where the individual objects tracked by the directory are stored. Active Directory uses a <i>hierarchical </i>database model, which groups items in a tree-like structure.</p>\n<p>The following sections explain the meaning of these important Active Directory terms.</p>\n<h2 id=\"tab1\" >Objects</h2>\n<p>The basic unit of data in Active Directory is called an <i>object</i><i>.</i> Active Directory can store information about many different kinds of objects. The objects you work with most are users, groups, computers, and printers.</p>\n<p>The figure below shows the Active Directory Manager displaying a list of built-in objects that come preconfigured with Windows Server 2008 R2. To get to this management tool, choose Start→Administrative Tools→Active Directory Users and Computers. Then click the Builtin node to show the built-in objects.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292746.image0.jpg\" width=\"535\" height=\"343\" alt=\"image0.jpg\"/>\n<p>Objects have descriptive characteristics called <i>properties </i>or <i>attributes</i><i>.</i> You can call up the properties of an object by double-clicking the object in the management console.</p>\n<h2 id=\"tab2\" >Domains</h2>\n<p>A <i>domain </i>is the basic unit for grouping related objects in Active Directory. Typically, domains correspond to departments in a company. For example, a company with separate Accounting, Manufacturing, and Sales departments might have domains named (you guessed it) <i>Accounting</i>, <i>Manufacturing</i>, and <i>Sales</i>. Or the domains correspond to geographical locations. For example, a company with offices in Detroit, Dallas, and Denver might have domains named <i>det</i>, <i>dal</i>, and <i>den</i>.</p>\n<p>Note that because Active Directory domains use DNS naming conventions, you can create subdomains that are considered to be child domains. You should always create the top-level domain for your entire network before you create any other domain.</p>\n<p>For example, if your company is named Nimbus Brooms and you’ve registered <i>NimbusBroom.com</i> as your domain name, you should create a top-level domain named <i>NimbusBroom.com</i> before you create any other domains. Then, you can create subdomains such as <i>Accounting.NimbusBroom.com</i>, <i>Manufacturing.NimbusBroom.com</i>, and <i>Sales.NimbusBroom.com</i>.</p>\n<p class=\"Tip\">If you have Microsoft Visio, you can use it to draw diagrams for your Active Directory domain structure. Visio includes several templates that provide cool icons for various types of Active Directory objects. For example, the following figure shows a diagram that shows an Active Directory with four domains created with Visio.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292747.image1.jpg\" width=\"535\" height=\"341\" alt=\"image1.jpg\"/>\n<p>Note that these domains have little to do with the physical structure of your network. In Windows NT, domains usually are related to the network’s physical structure.</p>\n<p>Every domain must have at least one <i>domain controller, </i>which is a server that’s responsible for the domain. However, unlike a Windows NT PDC, an Active Directory domain controller doesn’t have unique authority over its domain. In fact, a domain can have two or more domain controllers that share administrative duties. A feature called <i>replication </i>works hard at keeping all the domain controllers in sync with each other.</p>\n<h2 id=\"tab3\" >Organizational units</h2>\n<p>Many domains have too many objects to manage all together in a single group. Fortunately, Active Directory lets you create one or more <i>organizational units, </i>also known as OUs. OUs let you organize objects within a domain, without the extra work and inefficiency of creating additional domains.</p>\n<p>One reason to create OUs within a domain is so that you can assign administrative rights to each OU of different users. Then, these users can perform routine administrative tasks such as creating new user accounts or resetting passwords.</p>\n<p>For example, suppose the domain for the Denver office, named <i>den</i>, houses the Accounting and Legal departments. Rather than create separate domains for these departments, you could create organizational units for the departments.</p>\n<h2 id=\"tab4\" >Trees</h2>\n<p>A <i>tree </i>is a set of Active Directory names that share a common namespace. For example, the domains <i>NimbusBroom.com</i>, <i>Accounting.NimbusBroom.com</i>, <i>Manufacturing.NimbusBroom.com</i>, and <i>Sales.NimbusBroom.com</i> make up a tree that is derived from a common root domain, <i>NimbusBroom.com</i>.</p>\n<p>The domains that make up a tree are related to each other through <i>transitive trusts.</i> In a transitive trust, if DomainA trusts DomainB and DomainB trusts DomainC, then DomainA automatically trusts DomainC.</p>\n<p class=\"Tip\">Note that a single domain all by itself is still considered to be a tree.</p>\n<h2 id=\"tab5\" >Forests</h2>\n<p>As its name suggests, a <i>forest </i>is a collection of trees. In other words, a forest is a collection of one or more domain trees that do <i>not </i>share a common parent domain.</p>\n<p>For example, suppose Nimbus Brooms acquires Tracorum Technical Enterprises, which already has its own root domain named <i>TracorumTech.com</i>, with several subdomains of its own. Then, you can create a forest from these two domain trees so the domains can trust each other.</p>\n<img src=\"https://www.dummies.com/wp-content/uploads/292748.image2.jpg\" width=\"535\" height=\"300\" alt=\"image2.jpg\"/>\n<p>The key to Active Directory forests is a database called the global catalog. The <i>global catalog </i>is sort of a super-directory that contains information about all of the objects in a forest, regardless of the domain. Then, if a user account can’t be found in the current domain, the global catalog is searched for the account. The global catalog provides a reference to the domain in which the account is defined.</p>","blurb":"","authors":[],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":null,"inThisArticle":[{"label":"Objects","target":"#tab1"},{"label":"Domains","target":"#tab2"},{"label":"Organizational units","target":"#tab3"},{"label":"Trees","target":"#tab4"},{"label":"Forests","target":"#tab5"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-6217b88bcb24e\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-6217b88bcbc0e\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":null,"lifeExpectancySetFrom":null,"dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":184140}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33582/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33582","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":2}],"articleTypeFilter":[{"articleType":"All Types","count":2},{"articleType":"Articles","count":2}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2022-05-16T12:59:10+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/active-directory-networking-33582/","hash":"","query":{},"params":{"category":"active-directory-networking-33582"},"fullPath":"/category/articles/active-directory-networking-33582/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"sfmcState":{"newsletterSignupStatus":"initial"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions
  • Home
  • Technology Articles
  • Information Technology Articles
  • Networking Articles
  • Active Directory Articles

Active Directory Articles

Active Directory Domain Controller roles? Check. Network administration tips? Check. These articles will get you up to speed on Active Directory.

Articles From Active Directory

Filter Results

2 results
2 results
Active Directory Moving Objects in Active Directory

Article / Updated 03-26-2016

Moving objects around in Active Directory may involve moving objects from one location to another within a domain, or you might have to move objects from one domain to another. You need to know the details associated with either operation for the MCSE Directory Services exam. Fortunately, you just need to remember some simple rules. Moving objects within a domain Moving objects within a domain is a simple process: Just right-click the object and choose Move. Windows 2000 displays a dialog box in which you simply choose the destination container object for the move. (In newer versions of Windows 2000, you can drag and drop Active Directory objects from one OU to another.) A real-world example of moving an object within a domain involves moving a user account from one OU to another when the user transfers from one department to another in your organization. Moving the user's account enables the user to receive the benefits and restrictions you have defined for the new OU. What is not as straightforward (and what you need to know for the exam) is the effect that moving objects has on permissions. Here are the rules you must know: Permissions you assign directly to an Active Directory object remain with the object after you move the object. The object inherits the permissions assigned to the new OU and loses any previously inherited permissions. You may have already figured this one out: An excellent strategy for administering Active Directory objects is to move objects that need similar permission settings into the same OU. By doing so, you can easily manage your network, assigning permissions and delegating authority effectively with just a few mouse clicks. Moving objects between domains In a multiple-domain Windows 2000 forest, you may need to move objects (users, organizational units, groups) between these multiple domains. You use the MOVETREE command line utility to perform many of these operations. When you move users and groups to a new domain, they receive new security identifiers (SIDs). Fortunately, Windows 2000 running in native mode supports an attribute called SIDHistory. As you move a user from domain to domain, Windows 2000 populates SIDHistory so you do not have to reset permissions to objects each time you perform the move operation. MOVETREE assists you with most move operations between domains. And in those cases for which MOVETREE cannot do the job, you can turn to another utility called NETDOM. MOVETREE can Move most Active Directory objects (including nonempty containers) from one domain to another in the same forest. Move domain local and global groups between domains. These groups cannot contain members, however. The domains must exist within the same forest. Move universal groups and their members between domains of the same forest. MOVETREE can move most Active Directory objects. Those that it cannot move when you try to relocate groups of objects become orphaned. Windows 2000 places these orphaned objects in a special container called LostAndFound. You can view this container by using the Advanced View feature of Active Directory Users and Computers. You must have the appropriate administrative permissions to use MOVETREE from the command prompt. This command uses the following syntax: MOVETREE {/start | /startnocheck | /continue | /check} /s SrcDSA /d DstDSA /sdn SrcDN /ddn DstDN [/u [Domain]Username /p Password] [/verbose] [{/? | /help}] The italicized entries in this syntax represent information you must provide. Table 1 describes the switches you can use with the MOVETREE command. Table 1 MOVETREE Command Switches Switch What It Does /start Initiates the move operation. /startnocheck Starts a MOVETREE operation with no /check. /continue Continues the execution of a previously paused or failed MOVETREE operation. /check Performs a test run of the MOVETREE operation. /s SrcDSA Specifies the source server's fully qualified domain name (FQDN). /d DstDSA Specifies the destination server's FQDN. /sdn SrcDN Specifies the distinguished name of the object you are moving from the source. /ddn DstDN Specifies the distinguished name of the object you are moving to the destination. /u Runs MOVETREE under the credentials of the username and password provided. /verbose Causes MOVETREE to display more details as it runs. /? Displays help about MOVETREE. MOVETREE creates log files when operations are performed. You can check these log files for information regarding the success or failure of MOVETREE events: MOVETREE.ERR: Lists any errors encountered. MOVETREE.LOG: Lists statistical results of the operation. MOVETREE.CHK: Lists any errors detected from MOVETREE being executed in check mode. MOVETREE moves computer objects from one domain to another for you, but it cannot disjoin the computer from the source domain and join it to the target domain. This limitation makes NETDOM a much better utility for moving computers between domains in a Windows 2000 Active Directory setting. NETDOM uses the following syntax to move computer accounts: MOVETREE {/NETDOM move /D:domain [/OU:ou_path] [/Ud:User /Pd:{Password|*}] [/Uo:User /Po:{Password|*}] [/Reboot:[time_in_seconds]] Table 2 describes the switches you use with the NETDOM command. Table 2 NETDOM Command Switches Switch What It Does /domain Identifies the target domain. /OU:ou_path Specifies the target OU. /Ud:User Indicates the user account used to make the connection with the target domain. Pd:{Password|*} Enters the password for the user account used to connect to the destination domain; if you use *, NETDOM prompts for the password. /Uo:User Identifies the user account used to make the connection to the source domain. /Po:{Password|*} Enters the password for the user account used to connect to the original domain; if you use *, NETDOM prompts for the password. /Reboot:[time_in_seconds] Specifies that the computer being moved should shut down and reboot automatically in the given number of seconds after the move operation.

View Article
Active Directory Network Administration: Structure of Active Directory

Article / Updated 03-26-2016

The terms object, organizational unit, domain, tree, and forest are used to describe the way Active Directory organizes its directory data. Like all directories, Active Directory is essentially a database management system. The Active Directory database is where the individual objects tracked by the directory are stored. Active Directory uses a hierarchical database model, which groups items in a tree-like structure. The following sections explain the meaning of these important Active Directory terms. Objects The basic unit of data in Active Directory is called an object. Active Directory can store information about many different kinds of objects. The objects you work with most are users, groups, computers, and printers. The figure below shows the Active Directory Manager displaying a list of built-in objects that come preconfigured with Windows Server 2008 R2. To get to this management tool, choose Start→Administrative Tools→Active Directory Users and Computers. Then click the Builtin node to show the built-in objects. Objects have descriptive characteristics called properties or attributes. You can call up the properties of an object by double-clicking the object in the management console. Domains A domain is the basic unit for grouping related objects in Active Directory. Typically, domains correspond to departments in a company. For example, a company with separate Accounting, Manufacturing, and Sales departments might have domains named (you guessed it) Accounting, Manufacturing, and Sales. Or the domains correspond to geographical locations. For example, a company with offices in Detroit, Dallas, and Denver might have domains named det, dal, and den. Note that because Active Directory domains use DNS naming conventions, you can create subdomains that are considered to be child domains. You should always create the top-level domain for your entire network before you create any other domain. For example, if your company is named Nimbus Brooms and you’ve registered NimbusBroom.com as your domain name, you should create a top-level domain named NimbusBroom.com before you create any other domains. Then, you can create subdomains such as Accounting.NimbusBroom.com, Manufacturing.NimbusBroom.com, and Sales.NimbusBroom.com. If you have Microsoft Visio, you can use it to draw diagrams for your Active Directory domain structure. Visio includes several templates that provide cool icons for various types of Active Directory objects. For example, the following figure shows a diagram that shows an Active Directory with four domains created with Visio. Note that these domains have little to do with the physical structure of your network. In Windows NT, domains usually are related to the network’s physical structure. Every domain must have at least one domain controller, which is a server that’s responsible for the domain. However, unlike a Windows NT PDC, an Active Directory domain controller doesn’t have unique authority over its domain. In fact, a domain can have two or more domain controllers that share administrative duties. A feature called replication works hard at keeping all the domain controllers in sync with each other. Organizational units Many domains have too many objects to manage all together in a single group. Fortunately, Active Directory lets you create one or more organizational units, also known as OUs. OUs let you organize objects within a domain, without the extra work and inefficiency of creating additional domains. One reason to create OUs within a domain is so that you can assign administrative rights to each OU of different users. Then, these users can perform routine administrative tasks such as creating new user accounts or resetting passwords. For example, suppose the domain for the Denver office, named den, houses the Accounting and Legal departments. Rather than create separate domains for these departments, you could create organizational units for the departments. Trees A tree is a set of Active Directory names that share a common namespace. For example, the domains NimbusBroom.com, Accounting.NimbusBroom.com, Manufacturing.NimbusBroom.com, and Sales.NimbusBroom.com make up a tree that is derived from a common root domain, NimbusBroom.com. The domains that make up a tree are related to each other through transitive trusts. In a transitive trust, if DomainA trusts DomainB and DomainB trusts DomainC, then DomainA automatically trusts DomainC. Note that a single domain all by itself is still considered to be a tree. Forests As its name suggests, a forest is a collection of trees. In other words, a forest is a collection of one or more domain trees that do not share a common parent domain. For example, suppose Nimbus Brooms acquires Tracorum Technical Enterprises, which already has its own root domain named TracorumTech.com, with several subdomains of its own. Then, you can create a forest from these two domain trees so the domains can trust each other. The key to Active Directory forests is a database called the global catalog. The global catalog is sort of a super-directory that contains information about all of the objects in a forest, regardless of the domain. Then, if a user account can’t be found in the current domain, the global catalog is searched for the account. The global catalog provides a reference to the domain in which the account is defined.

View Article

Quick Links

  • About For Dummies
  • Contact Us
  • Activate A Book Pin

Connect

Opt in to our newsletter!

By entering your email address and clicking the “Submit” button, you agree to the Terms of Use and Privacy Policy & to receive electronic communications from Dummies.com, which may include marketing promotions, news and updates.

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only