{"appState":{"pageLoadApiCallsStatus":true},"categoryState":{"relatedCategories":{"headers":{"timestamp":"2025-04-17T16:01:06+00:00"},"categoryId":33581,"data":{"title":"Networking","slug":"networking","image":{"src":null,"width":0,"height":0},"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581}],"parentCategory":{"categoryId":33572,"title":"Information Technology","slug":"information-technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"}},"childCategories":[{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":8,"bookCount":1},{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"image":{"src":"/img/background-image-1.daf74cf0.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":101,"bookCount":6},{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"image":{"src":"/img/background-image-2.fabfbd5c.png","width":0,"height":0},"hasArticle":true,"hasBook":true,"articleCount":155,"bookCount":15}],"description":"All those computers out there in the world? Well, they've gotta talk to one another somehow. We explain how.","relatedArticles":{"self":"https://dummies-api.dummies.com/v2/articles?category=33581&offset=0&size=5"},"hasArticle":true,"hasBook":true,"articleCount":266,"bookCount":23},"_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"}},"relatedCategoriesLoadedStatus":"success"},"listState":{"list":{"count":10,"total":269,"items":[{"headers":{"creationTime":"2016-08-18T14:13:09+00:00","modifiedTime":"2024-10-28T13:48:38+00:00","timestamp":"2024-10-28T15:01:13+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Configuring Network Connections for Windows 10","strippedTitle":"configuring network connections for windows 10","slug":"configuring-network-connections-windows-10","canonicalUrl":"","seo":{"metaDescription":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Wind","noIndex":0,"noFollow":0},"content":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show you how to configure your network adapter on a Windows 10 system:\r\n\r\n ","description":"Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however.\r\n\r\nThe following steps show you how to configure your network adapter on a Windows 10 system:\r\n\r\n ","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253759,"title":"The 2 Pillars of Cybersecurity","slug":"2-pillars-cybersecurity","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253759"}},{"articleId":253756,"title":"Securing the Human Firewall","slug":"securing-human-firewall","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253756"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-671fa739c15f1\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]}]\" id=\"du-slot-671fa739c1e99\"></div></div>"},"articleType":{"articleType":"Step by Step","articleList":null,"content":[{"title":"Click the Start icon (or press the Start button on the keyboard), and then tap or click Settings.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>The Settings page appears.</p>\n"},{"title":"Click Network & Internet.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Network-Internet-page.jpg","width":220,"height":173},"image":{"src":"https://www.dummies.com/wp-content/uploads/Network-Internet-page.jpg","width":535,"height":422},"content":"<p>The Network &amp; Internet page appears.</p>\n"},{"title":"Click Ethernet.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-settings-page.jpg","width":220,"height":173},"image":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-settings-page.jpg","width":535,"height":422},"content":"<p>The Ethernet settings page appears.</p>\n"},{"title":"Click Change Adapter Options.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Network-Connections-page.jpg","width":220,"height":165},"image":{"src":"https://www.dummies.com/wp-content/uploads/Network-Connections-page.jpg","width":535,"height":403},"content":"<p>The Network Connections page appears. This page lists each of your network adapters. In this case, only a single wired Ethernet adapter is shown. If the device has more than one adapter, additional adapters will appear on this page.</p>\n"},{"title":"Right-click the connection that you want to configure and then choose Properties from the contextual menu that appears.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-Properties-198x255.jpg","width":198,"height":255},"image":{"src":"https://www.dummies.com/wp-content/uploads/Ethernet-Properties2.jpg","width":535,"height":689},"content":"<p>This action opens the Ethernet Properties dialog box.</p>\n"},{"title":"To configure the network adapter card settings, click Configure.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Properties-220x255.jpg","width":220,"height":255},"image":{"src":"https://www.dummies.com/wp-content/uploads/Properties2.jpg","width":535,"height":620},"content":"<p>The Properties dialog box for your network adapter appears. This dialog box has seven tabs that let you configure the adapter:</p>\n<ul>\n<li><em>General:</em> Shows basic information about the adapter, such as the device type and status.</li>\n<li><em>Advanced:</em> Lets you set a variety of device-specific parameters that affect the operation of the adapter.</li>\n<li><em>About:</em> Displays information about the device’s patent protection.</li>\n<li><em>Driver</em>: Displays information about the device driver that’s bound to the NIC and lets you update the driver to a newer version, roll back the driver to a previously working version, or uninstall the driver.</li>\n<li><em>Details:</em> With this tab, you can inspect various properties of the adapter such as the date and version of the device driver. To view the setting of a particular property, select the property name from the drop-down list.</li>\n<li><em>Events:</em> Lists recent events that have been logged for the device.</li>\n<li><em>Power Management:</em> Lets you configure power management options for the device.</li>\n</ul>\n<p>When you click OK to dismiss the dialog box, the network connection’s Properties dialog box closes and you’re returned to the Network Connections page. Right-click the network adapter and choose Properties again to continue the procedure.</p>\n"},{"title":"Review the list of connection items listed in the Properties dialog box.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<ul>\n<li><em>Client for Microsoft Networks:</em> This item is required if you want to access a Microsoft Windows network. It should always be present.</li>\n<li><em>File and Printer Sharing for Microsoft Networks:</em> This item allows your computer to share its files or printers with other computers on the network.This option is usually used with peer-to-peer networks, but you can use it even if your network has dedicated servers. If you don’t plan to share files or printers on the client computer, however, you should disable this item.</li>\n<li><em>Internet Protocol Version 4 (TCP/IPv4):</em> This item enables the client computer to communicate by using the version 4 standard TCP/IP protocol.</li>\n<li><em>Internet Protocol Version 6 (TCP/IPv6):</em> This item enables version 6 of the standard TCP/IP protocol. Typically, both IP4 and IP6 are enabled, even though most networks rely primarily on IP4.</li>\n</ul>\n"},{"title":"If a protocol that you need isn’t listed, click the Install button to add the needed protocol.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>A dialog box appears, asking whether you want to add a network client, protocol, or service. Click Protocol and then click Add. A list of available protocols appears. Select the one you want to add; then click OK.</p>\n"},{"title":"To remove a network item that you don’t need (such as File and Printer Sharing for Microsoft Networks), select the item, and click the Uninstall button.","thumb":{"src":null,"width":0,"height":0},"image":{"src":null,"width":0,"height":0},"content":"<p>For security reasons, you should make it a point to remove any clients, protocols, or services that you don’t need.</p>\n"},{"title":"To configure TCP/IP settings, click Internet Protocol (TCP/IP); click Properties to display the TCP/IP Properties dialog box; adjust the settings; and then click OK.","thumb":{"src":"https://www.dummies.com/wp-content/uploads/Configuring-TCP-IP.jpg","width":220,"height":250},"image":{"src":"https://www.dummies.com/wp-content/uploads/Configuring-TCP-IP2.jpg","width":535,"height":609},"content":"<p>The TCP/IP Properties dialog box lets you choose among these options:</p>\n<ul>\n<li><em>Obtain an IP Address Automatically:</em> Choose this option if your network has a DHCP server that assigns IP addresses automatically. Choosing this option dramatically simplifies administering TCP/IP on your network.</li>\n<li><em>Use the Following IP Address:</em> If your computer must have a specific IP address, choose this option and then type the computer’s IP address, subnet mask, and default gateway address.</li>\n<li><em>Obtain DNS Server Address Automatically:</em> The DHCP server can also provide the address of the Domain Name System (DNS) server that the computer should use. Choose this option if your network has a DHCP server.</li>\n<li><em>Use the Following DNS Server Addresses:</em> Choose this option if a DNS server isn’t available. Then type the IP addresses of the primary and secondary DNS servers.</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2024-08-27T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":221858},{"headers":{"creationTime":"2023-01-04T20:39:35+00:00","modifiedTime":"2024-01-26T15:39:36+00:00","timestamp":"2024-01-26T18:01:12+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Cloud Computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"slug":"cloud-computing","categoryId":33584}],"title":"Your Business Performance Can Soar with Enterprise Automation","strippedTitle":"your business performance can soar with enterprise automation","slug":"watch-your-business-performance-soar-with-enterprise-automation","canonicalUrl":"","seo":{"metaDescription":"Enterprise Automation For Dummies is your guide to understanding how modern enterprise automation enables companies to empower people at unheard-of scale to create their own app and data integrations.","noIndex":0,"noFollow":0},"content":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#what\">What enterprise automation is</a></li>\r\n \t<li><a href=\"#why\">Why you should implement enterprise automation</a></li>\r\n \t<li><a href=\"#how\">How enterprise automation will impact businesses in the future</a></li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab1\" >What is enterprise automation?</h2>\r\nEnterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations.\r\n\r\nWith enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise.\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why enterprise automation?</h2>\r\nThink about the IT and organizational challenges you face today.\r\n\r\nYou’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be.\r\n\r\n[caption id=\"attachment_296577\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296577\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-data-silos-getty-157192883.jpg\" alt=\"\" width=\"535\" height=\"399\" /> © Andrey Prokhorov/Getty Images[/caption]\r\n\r\nNot only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient.\r\n\r\nCompetitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level.\r\n\r\n[caption id=\"attachment_296578\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296578\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-illustration-business-agility.png\" alt=\"\" width=\"535\" height=\"159\" /> Embracing the new normal means boosting business agility to respond and execute quickly and empowering large numbers of people to perform their jobs most effectively and efficiently.[/caption]\r\n\r\nYou recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end.\r\n\r\nThat is what enterprise automation is all about and the inspiration behind <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a>, sponsored by SnapLogic.\r\n<div id=\"how\"></div>\r\n<h2 id=\"tab3\" >The future is enterprise automation</h2>\r\nEnterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes.\r\n\r\n<img class=\"aligncenter size-full wp-image-296863\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-illustration-application-integration-2.png\" alt=\"Application integration is sharing record-level, operational data between two or more applications.\" width=\"535\" height=\"363\" />\r\n\r\nTo learn more, download <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. <em>Enterprise Automation For Dummies</em> includes case studies with summaries and achieved success metrics.\r\n\r\nDownload <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> today and chart your future.","description":"In this article you will learn:\r\n<ul>\r\n \t<li><a href=\"#what\">What enterprise automation is</a></li>\r\n \t<li><a href=\"#why\">Why you should implement enterprise automation</a></li>\r\n \t<li><a href=\"#how\">How enterprise automation will impact businesses in the future</a></li>\r\n</ul>\r\n<div id=\"what\"></div>\r\n<h2 id=\"tab1\" >What is enterprise automation?</h2>\r\nEnterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations.\r\n\r\nWith enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise.\r\n<div id=\"why\"></div>\r\n<h2 id=\"tab2\" >Why enterprise automation?</h2>\r\nThink about the IT and organizational challenges you face today.\r\n\r\nYou’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be.\r\n\r\n[caption id=\"attachment_296577\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296577\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-data-silos-getty-157192883.jpg\" alt=\"\" width=\"535\" height=\"399\" /> © Andrey Prokhorov/Getty Images[/caption]\r\n\r\nNot only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient.\r\n\r\nCompetitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level.\r\n\r\n[caption id=\"attachment_296578\" align=\"aligncenter\" width=\"535\"]<img class=\"size-full wp-image-296578\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-illustration-business-agility.png\" alt=\"\" width=\"535\" height=\"159\" /> Embracing the new normal means boosting business agility to respond and execute quickly and empowering large numbers of people to perform their jobs most effectively and efficiently.[/caption]\r\n\r\nYou recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end.\r\n\r\nThat is what enterprise automation is all about and the inspiration behind <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a>, sponsored by SnapLogic.\r\n<div id=\"how\"></div>\r\n<h2 id=\"tab3\" >The future is enterprise automation</h2>\r\nEnterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes.\r\n\r\n<img class=\"aligncenter size-full wp-image-296863\" src=\"https://www.dummies.com/wp-content/uploads/snaplogic-illustration-application-integration-2.png\" alt=\"Application integration is sharing record-level, operational data between two or more applications.\" width=\"535\" height=\"363\" />\r\n\r\nTo learn more, download <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. <em>Enterprise Automation For Dummies</em> includes case studies with summaries and achieved success metrics.\r\n\r\nDownload <a class=\"bookSponsor-btn\" href=\"https://www.snaplogic.com/lp/enterprise-automation-for-dummies\" target=\"_blank\" rel=\"noopener\" data-testid=\"bookSponsorDownloadButton\"><em>Enterprise Automation For Dummies</em></a> today and chart your future.","blurb":"","authors":[{"authorId":35233,"name":"Michael Nixon","slug":"michael-nixon","description":"Michael Nixon is vice president of product marketing with SnapLogic and an enlightened professional in the cloud data solutions industry. He has authored or contributed to three For Dummies books.","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/35233"}}],"primaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[{"label":"What is enterprise automation?","target":"#tab1"},{"label":"Why enterprise automation?","target":"#tab2"},{"label":"The future is enterprise automation","target":"#tab3"}],"relatedArticles":{"fromBook":[],"fromCategory":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271379"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":0,"slug":null,"isbn":null,"categoryList":null,"amazon":null,"image":null,"title":null,"testBankPinActivationLink":null,"bookOutOfPrint":false,"authorsInfo":null,"authors":null,"_links":null},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65b3f368f29be\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[null]},{&quot;key&quot;:&quot;sponsored&quot;,&quot;values&quot;:[&quot;customsolutions&quot;]}]\" id=\"du-slot-65b3f368f3253\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":true,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"Brought to you by SnapLogic","brandingLink":"https://www.snaplogic.com/","brandingLogo":{"src":"https://www.dummies.com/wp-content/uploads/snaplogic-logo-280x73-1-270x70.png","width":270,"height":70},"sponsorAd":"","sponsorEbookTitle":"Enterprise Automation For Dummies, SnapLogic Special Edition","sponsorEbookLink":"https://www.snaplogic.com/lp/enterprise-automation-for-dummies","sponsorEbookImage":{"src":"https://www.dummies.com/wp-content/uploads/enterprise-automation-for-dummies-snaplogic-special-edition-cover-9781119797944.jpg","width":113,"height":175}},"primaryLearningPath":"Solve","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-01-05T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"yes","adInfo":"","adPairKey":[{"adPairKey":"sponsored","adPairValue":"customsolutions"}]},"status":"publish","visibility":"public","articleId":296572},{"headers":{"creationTime":"2018-06-28T19:14:30+00:00","modifiedTime":"2023-08-31T15:24:34+00:00","timestamp":"2023-08-31T18:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"The 2 Pillars of Cybersecurity","strippedTitle":"the 2 pillars of cybersecurity","slug":"2-pillars-cybersecurity","canonicalUrl":"","seo":{"metaDescription":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity pla","noIndex":0,"noFollow":0},"content":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"https://www.dummies.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","description":"As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan:\r\n<ul>\r\n \t<li><strong>Prevention:</strong> The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes.</li>\r\n</ul>\r\n<p class=\"article-tips tip\">The most important part of the prevention pillar is the <a href=\"https://www.dummies.com/article/technology/information-technology/networking/general-networking/securing-human-firewall-253756/\">human firewall</a>. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links.</p>\r\n\r\n<ul>\r\n \t<li><strong>Recovery:</strong> The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253756,"title":"Securing the Human Firewall","slug":"securing-human-firewall","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253756"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1a457\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55f1abef\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253759},{"headers":{"creationTime":"2018-06-28T19:11:30+00:00","modifiedTime":"2023-08-31T15:24:17+00:00","timestamp":"2023-08-31T18:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"General Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"},"slug":"general-networking","categoryId":33585}],"title":"Securing the Human Firewall","strippedTitle":"securing the human firewall","slug":"securing-human-firewall","canonicalUrl":"","seo":{"metaDescription":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with t","noIndex":0,"noFollow":0},"content":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","description":"Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email.\r\n\r\nThe key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall.\r\n\r\nThis necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring.\r\n\r\nIf training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses.\r\n\r\nYou’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur.\r\n\r\nHere are some suggestions for some basic security rules you can incorporate into your security policy:\r\n<ul>\r\n \t<li>Never write down your password or give it to someone else.</li>\r\n \t<li>Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account.</li>\r\n \t<li>Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account.</li>\r\n \t<li>Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission.</li>\r\n \t<li>Don’t enable file and printer sharing on workstations without first getting permission.</li>\r\n \t<li>Never attempt to disable or bypass the network’s security features.</li>\r\n</ul>","blurb":"","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"primaryCategoryTaxonomy":{"categoryId":33585,"title":"General Networking","slug":"general-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33585"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":253902,"title":"The Many Types of Mobile Devices on Your Network","slug":"many-types-mobile-devices-network","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253902"}},{"articleId":253889,"title":"How to Install Fedora 26","slug":"install-fedora-26","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253889"}},{"articleId":253886,"title":"Virtual Consoles and the Installation Program","slug":"virtual-consoles-installation-program","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253886"}},{"articleId":253881,"title":"How to Get to a Linux Command Shell","slug":"get-linux-command-shell","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253881"}},{"articleId":253870,"title":"How to Configure Remote Desktop Options","slug":"configure-remote-desktop-options","categoryList":["technology","computers","macs","general-macs"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253870"}}],"fromCategory":[{"articleId":290654,"title":"Windows Server 2022 and PowerShell All-in-One For Dummies Cheat Sheet","slug":"windows-server-2022-and-powershell-all-in-one-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/290654"}},{"articleId":271553,"title":"What Is a Network: An Overview of Necessary Networking Components","slug":"what-is-a-network-an-overview-of-necessary-networking-components","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271553"}},{"articleId":253759,"title":"The 2 Pillars of Cybersecurity","slug":"2-pillars-cybersecurity","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/253759"}},{"articleId":222508,"title":"Network Administration: How to Create a New User in Active Directory","slug":"network-administration-create-new-user-windows-server-2016","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/222508"}},{"articleId":221858,"title":"Configuring Network Connections for Windows 10","slug":"configuring-network-connections-windows-10","categoryList":["technology","information-technology","networking","general-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/221858"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281780,"slug":"networking-all-in-one-for-dummies","isbn":"9781119689010","categoryList":["technology","information-technology","networking","general-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119689015-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119689015/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/networking-all-in-one-for-dummies-8e-cover-9781119689010-203x255.jpg","width":203,"height":255},"title":"Networking All-in-One For Dummies","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b><b data-author-id=\"8946\">Doug Lowe</b> </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p>","authors":[{"authorId":8946,"name":"Doug Lowe","slug":"doug-lowe","description":" <p><b>Doug Lowe </b>is the information technology director at Blair, Church & Flynn Consulting Engineers, a civil engineering firm. He has written more than 50 <i>For Dummies</i> books on topics ranging from Java to electronics to PowerPoint.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/8946"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec77fd\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;general-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119689010&quot;]}]\" id=\"du-slot-64f0d55ec853c\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2023-08-31T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":253756},{"headers":{"creationTime":"2016-03-26T20:27:02+00:00","modifiedTime":"2023-05-03T18:24:35+00:00","timestamp":"2023-05-03T21:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Common Domain Name Service Resource Records","strippedTitle":"common domain name service resource records","slug":"common-types-of-domain-name-service-resource-records","canonicalUrl":"","seo":{"metaDescription":"A resource record is the basic data component in the Domain Name Service (DNS). DNS resource records define not only names and IP addresses but domains, servers","noIndex":0,"noFollow":0},"content":"A resource record is the basic data component in the Domain Name Service (DNS). DNS resource records define not only names and IP addresses but domains, servers, zone, and services as well. This list shows you the most common types of resource records:\r\n<table>\r\n<tbody>\r\n<tr>\r\n<th>Type</th>\r\n<th>Purpose</th>\r\n</tr>\r\n<tr>\r\n<td><b>A</b></td>\r\n<td><i>Address</i> resource records match an IP address to a host\r\nname.</td>\r\n</tr>\r\n<tr>\r\n<td><b>CNAME</b></td>\r\n<td><i>Canonical name</i> resource records associate a nickname to\r\na host name.</td>\r\n</tr>\r\n<tr>\r\n<td><b>MX</b></td>\r\n<td><i>Mail exchange</i> resource records identify mail servers for\r\nthe specified domain.</td>\r\n</tr>\r\n<tr>\r\n<td><b>NS</b> <b></b></td>\r\n<td><i>Name server</i> resource records identify servers (other\r\nthan the SOA server) that contain zone information files.</td>\r\n</tr>\r\n<tr>\r\n<td><b>PTR</b></td>\r\n<td><i>Pointer resource</i> records match a host name to a given IP\r\naddress. This is the opposite of an Address record, which matches\r\nan IP address to the supplied host name.</td>\r\n</tr>\r\n<tr>\r\n<td><b>SOA</b></td>\r\n<td><i>Start of authority</i> resource records specify which server\r\ncontains the zone file for a domain.</td>\r\n</tr>\r\n<tr>\r\n<td><b>SRV</b></td>\r\n<td><i>Service</i> resource records identify servers that provide\r\nspecial services to the domain.</td>\r\n</tr>\r\n</tbody>\r\n</table>","description":"A resource record is the basic data component in the Domain Name Service (DNS). DNS resource records define not only names and IP addresses but domains, servers, zone, and services as well. This list shows you the most common types of resource records:\r\n<table>\r\n<tbody>\r\n<tr>\r\n<th>Type</th>\r\n<th>Purpose</th>\r\n</tr>\r\n<tr>\r\n<td><b>A</b></td>\r\n<td><i>Address</i> resource records match an IP address to a host\r\nname.</td>\r\n</tr>\r\n<tr>\r\n<td><b>CNAME</b></td>\r\n<td><i>Canonical name</i> resource records associate a nickname to\r\na host name.</td>\r\n</tr>\r\n<tr>\r\n<td><b>MX</b></td>\r\n<td><i>Mail exchange</i> resource records identify mail servers for\r\nthe specified domain.</td>\r\n</tr>\r\n<tr>\r\n<td><b>NS</b> <b></b></td>\r\n<td><i>Name server</i> resource records identify servers (other\r\nthan the SOA server) that contain zone information files.</td>\r\n</tr>\r\n<tr>\r\n<td><b>PTR</b></td>\r\n<td><i>Pointer resource</i> records match a host name to a given IP\r\naddress. This is the opposite of an Address record, which matches\r\nan IP address to the supplied host name.</td>\r\n</tr>\r\n<tr>\r\n<td><b>SOA</b></td>\r\n<td><i>Start of authority</i> resource records specify which server\r\ncontains the zone file for a domain.</td>\r\n</tr>\r\n<tr>\r\n<td><b>SRV</b></td>\r\n<td><i>Service</i> resource records identify servers that provide\r\nspecial services to the domain.</td>\r\n</tr>\r\n</tbody>\r\n</table>","blurb":"","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}},{"articleId":187714,"title":"Active Directory Logical Design Checklist","slug":"active-directory-logical-design-checklist","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187714"}}],"fromCategory":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281618,"slug":"active-directory-for-dummies-2nd-edition","isbn":"9780470287200","categoryList":["technology","information-technology","networking","active-directory-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470287209-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/active-directory-for-dummies-2nd-edition-cover-9780470287200-202x255.jpg","width":202,"height":255},"title":"Active Directory For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10173\">Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b data-author-id=\"10174\">Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6452cb8f00db4\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6452cb8f01509\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-11-07T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":187716},{"headers":{"creationTime":"2020-03-11T17:25:57+00:00","modifiedTime":"2022-12-12T19:33:49+00:00","timestamp":"2022-12-12T21:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Cloud Computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"},"slug":"cloud-computing","categoryId":33584}],"title":"Microsoft Azure For Dummies Cheat Sheet","strippedTitle":"microsoft azure for dummies cheat sheet","slug":"microsoft-azure-for-dummies-cheat-sheet","canonicalUrl":"","seo":{"metaDescription":"This Cheat Sheet provides some reminders of some essential ingredients in Azure automation. Remember to work actively to stay current.","noIndex":0,"noFollow":0},"content":"The best approach to working with Microsoft Azure can be summarized in three words: “always be learning.” The Azure product development teams release new features every workday, so if you aren’t actively working to stay current, you’ll fall behind, and your career will suffer.\r\n\r\nThis Cheat Sheet offers some essential ingredients in Azure automation. Remember that the Azure portal is all well and good until you’re tasked with deploying 50 virtual machines!","description":"The best approach to working with Microsoft Azure can be summarized in three words: “always be learning.” The Azure product development teams release new features every workday, so if you aren’t actively working to stay current, you’ll fall behind, and your career will suffer.\r\n\r\nThis Cheat Sheet offers some essential ingredients in Azure automation. Remember that the Azure portal is all well and good until you’re tasked with deploying 50 virtual machines!","blurb":"","authors":[{"authorId":34674,"name":"Jack A. Hyman","slug":"jack-a-hyman","description":" <p><b>Jack Hyman</b> is Chief Executive Officer of HyerTek, an IT consulting firm specializing in Microsoft&#8217;s business platforms. He is Associate Professor in the Computer Information Sciences department at the University of the Cumberlands. He has written several books in the <i>For Dummies</i> series, as well as certification study guides for the Microsoft Azure technology.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/34674"}}],"primaryCategoryTaxonomy":{"categoryId":33584,"title":"Cloud Computing","slug":"cloud-computing","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33584"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":269788,"title":"How to Use Azure Log Analytics","slug":"how-to-use-azure-log-analytics","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/269788"}},{"articleId":269773,"title":"Deploying Azure VMs from the Microsoft Azure Marketplace","slug":"deploying-azure-vms-from-the-microsoft-azure-marketplace","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/269773"}},{"articleId":269767,"title":"A Quick Tour of Microsoft Azure App Service","slug":"a-quick-tour-of-microsoft-azure-app-service","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/269767"}},{"articleId":269761,"title":"Top 10 Azure Educational Resources","slug":"top-10-azure-educational-resources","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/269761"}},{"articleId":269705,"title":"Implementing Azure Cosmos DB","slug":"implementing-azure-cosmos-db","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/269705"}}],"fromCategory":[{"articleId":271400,"title":"Planning Your Cloud Computing Strategy","slug":"planning-your-cloud-computing-strategy","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271400"}},{"articleId":271395,"title":"10 Cloud Do’s and Don’ts","slug":"10-cloud-dos-and-donts","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271395"}},{"articleId":271389,"title":"How SaaS Fits into the Multicloud World","slug":"how-saas-fits-into-the-multicloud-world","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271389"}},{"articleId":271384,"title":"Cloud Computing as the Engine of Adaptive Change","slug":"cloud-computing-as-the-engine-of-adaptive-change","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271384"}},{"articleId":271379,"title":"Cloud Computing Elements: Resource Pools/Cloud Models and Services","slug":"cloud-computing-elements-resource-pools-cloud-models-and-services","categoryList":["technology","information-technology","networking","cloud-computing"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/271379"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281774,"slug":"microsoft-azure-for-dummies","isbn":"9781119898061","categoryList":["technology","information-technology","networking","cloud-computing"],"amazon":{"default":"https://www.amazon.com/gp/product/1119898064/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/1119898064/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/1119898064-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/1119898064/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/1119898064/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/microsoft-azure-for-dummies-2nd-edition-cover-9781119898061-203x255.jpg","width":203,"height":255},"title":"Microsoft Azure For Dummies, 2nd Edition","testBankPinActivationLink":"","bookOutOfPrint":true,"authorsInfo":"<p><b>Jack Hyman</b> is Chief Executive Officer of HyerTek, an IT consulting firm specializing in Microsoft&#8217;s business platforms. He is Associate Professor in the Computer Information Sciences department at the University of the Cumberlands. He has written several books in the <i>For Dummies</i> series, as well as certification study guides for the Microsoft Azure technology.</p>","authors":[{"authorId":34674,"name":"Jack A. Hyman","slug":"jack-a-hyman","description":" <p><b>Jack Hyman</b> is Chief Executive Officer of HyerTek, an IT consulting firm specializing in Microsoft&#8217;s business platforms. He is Associate Professor in the Computer Information Sciences department at the University of the Cumberlands. He has written several books in the <i>For Dummies</i> series, as well as certification study guides for the Microsoft Azure technology.</p> ","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/34674"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119898061&quot;]}]\" id=\"du-slot-6397968ee583b\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;cloud-computing&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9781119898061&quot;]}]\" id=\"du-slot-6397968ee5d8b\"></div></div>"},"articleType":{"articleType":"Cheat Sheet","articleList":[{"articleId":0,"title":"","slug":null,"categoryList":[],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/"}}],"content":[{"title":"Core ingredients of cloud computing","thumb":null,"image":null,"content":"<p>If you ask 100 people what cloud computing is and you’ll likely get 100 different answers. And for good reason! While the big vendors all tout specific features that make their cloud solution shine, the truth is that everyone is trying to sell you the same four features: compute capacity, storage, network, and analytics. Let’s dive into those key ingredients:</p>\n<p><strong>Compute capacity:</strong> <em>Compute</em> is raw computing power — the central processing unit (CPU) and random-access memory (RAM) that form the platform for applications and data.</p>\n<p><strong>Storage:</strong> Persistent storage means you have a place on a cloud server to store your files and other data. When you save a file to a cloud-hosted storage account, it should remain in place forever, or at least until you move or delete it.</p>\n<p><strong>Network:</strong> Cloud platforms such as Azure provide a software-defined network infrastructure on which you can host your virtual machines and other Azure services. Because the cloud almost always involves an Internet connection, online and cloud are essentially synonymous.</p>\n<p><strong>Analytics:</strong> You’ll never get to touch the cloud providers’ computing, storage, or network resources. The closest you’ll get to viewing anything about the cloud environment is the vendor’s telemetry data in your web browser or a management app.</p>\n<p>With Azure and other public cloud providers, you are given tools to see how much of their services you consume each minute. Cloud analytics also gives you valuable troubleshooting and performance-tuning advice for your cloud infrastructure.</p>\n"},{"title":"The difference between cloud deployment and delivery models","thumb":null,"image":null,"content":"<p>You’ve finally been convinced to part ways with the data center. Congratulations! Now what? Your mission is to pick the most secure yet affordable approach to deployment and delivery. But what’s the difference? Even the IT folks in the room get a bit confused. Let’s break it down here.</p>\n<p><em>Deployment</em> explores how you provision resources in the cloud. In contrast, <em>service delivery</em> defines the application creation and management approaches for those provisioned resources.</p>\n<p>The three deployment models are public, private, and hybrid:</p>\n<ul>\n<li><strong>Public cloud deployment:</strong> Resources in Azure are generally considered public because the services, storage, and network capacity are shared among many parties and delivered over the Internet.The infrastructure (hardware, software) and costs incurred to manage resources are shared among many customers, not just one or two. The advantages touted by vendors such as Microsoft include lower costs, no infrastructure maintenance, near-unlimited scalability, and high reliability.</li>\n<li><strong>Private cloud deployment:</strong> Private clouds are maintained in a data center or hosted by a third-party service provider. The difference is that all infrastructure resources are maintained on a private network, which means that the hardware and software are dedicated to your organization.</li>\n<li><strong>Hybrid cloud deployment:</strong> If you are looking for the best of both worlds, then hybrid is your preferred choice. Suppose you still have resources that must remain on-premises (private cloud), and desire resources to be shared and publicly accessible (public cloud). In that case, you’ll want to implement a hybrid deployment.The benefit of hybrid is simple: it allows you and your organization to share data and apps between the two environments.</li>\n</ul>\n<p>Within these deployment models, organizations may use commercial off-the-shelf software (COTS), custom applications, data solutions, and fully working virtualized environments.</p>\n<p>Depending on the business need, the service delivery model varies. Let’s recap the three main service delivery models:</p>\n<ul>\n<li><strong>Software as a Service (SaaS): </strong>Web-based software such as Microsoft 365, Microsoft Power Platform (Power Apps and Power BI), and Microsoft Dynamics all fall into the category of SaaS. These are applications that require no development by the organization.\n<p>Sure, there are always configurations, but you and your team are not responsible for the code or infrastructure. The responsibility falls 100 percent on the vendor.</li>\n<li><strong>Infrastructure as a Service (IaaS): </strong>Instead of running applications in that big data center server cluster, you can shift your workloads to the cloud. How so? You can create contained server environments using virtual machines to complete specific activities that were formerly completed in-house.\n<p>The big difference is that you are responsible for configuring the environment and managing the applications running in that environment. Those activities include data protection, security, and performance tuning.</p>\n<p>Vendors such as Microsoft are responsible for ensuring the servers (infrastructure) that you used to make sure work 24/7 in-house are always on and available for users to consume the environments.</li>\n<li><strong>Platform as a Service (PaaS): </strong>Perhaps you have a three-tier application leveraging a specific operating system and database. Previously this would have been hosted in the data center, likely using a virtual machine.\n<p>But is the virtual machine the best option to migrate from the data center to the cloud? Highly unlikely! It’s possible to build the application in the cloud, assuming pre-configured operating systems and database solutions are available that can be containerized.</p>\n<p>The custom application code found as part of an app service points to the shared platform resources, which has numerous benefits related to maintainability. You are not responsible for operating system and database maintenance, including configuration, security, and performance tuning.</p>\n<p>The application can scale as desired without you having to intervene. There is only one thing you do in a PaaS deployment: create custom, innovative code that connects to these hosted resources.</li>\n</ul>\n"},{"title":"Essential Azure PowerShell Commands","thumb":null,"image":null,"content":"<p>Not every one of the following PowerShell commands is an Azure command. PowerShell is a universal task automation language, however, so once you get the hang of its basic syntax and use, you’ll be productive in Azure, Amazon Web Services (AWS), and beyond.</p>\n<p>On Windows 10, you can install the Azure PowerShell modules by running the following command from an administrative command prompt or PowerShell session:</p>\n<p><code>Install-Module -Name Az</code></p>\n<p>Following are some general commands you may commonly use when working with Azure. Of course, you can use the following three commands in any context, Azure- or non-Azure-related:</p>\n<ul>\n<li><code>Get-Command</code>: Discover useful PowerShell commands.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>Get-Command -Module Az.Compute -Verb Get -Noun *disk*</code></p>\n<ul>\n<li><code>Get-Help</code>: Read syntax help and view example use.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>Get-Help -Name New-AzVM -Examples</code></p>\n<ul>\n<li><code>Connect-AzAccount</code>: Authenticate to Azure.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>$credential = Get-Credential</code></p>\n<p style=\"padding-left: 40px;\"><code>Connect-AzAccount -Credential $credential</code></p>\n<ul>\n<li><code>Set-AzContext</code>: Set your active subscription context.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>Set-AzContext -SubscriptionName 'Corporate Subscription'</code></p>\n<ul>\n<li><code>New-AzResourceGroupDeployment</code>: Deploy an ARM template and, optionally, a parameter file.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>New-AzResourceGroupDeployment -ResourceGroupName 'Engineering'</code></p>\n<p style=\"padding-left: 120px;\"><code>-TemplateFile 'D:\\templates\\env-deploy.json'</code></p>\n<p style=\"padding-left: 120px;\"><code>-TemplateParameterFile 'D:\\templates\\</code></p>\n<p style=\"padding-left: 120px;\"><code>env-deploy-params.json'</code></p>\n"},{"title":"Essential Azure CLI Commands","thumb":null,"image":null,"content":"<p>Most beginners prefer the Azure Command-Line Interface (CLI) interface to Azure PowerShell because the CLI is so newcomer-friendly, especially when run in interactive mode.</p>\n<p>The Azure CLI runs on Windows, macOS, and Linux; get installation details from the <a href=\"https://timw.info/cli\" target=\"_blank\" rel=\"noopener\">Azure documentation</a>.</p>\n<ul>\n<li><code>az interactive</code>: Starts the Azure CLI interactive command shell.</li>\n<li><code>az login</code>: Authenticate to your Azure AD tenant and subscriptions.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>az login --tenant corp1.onmicrosoft.com</code></p>\n<ul>\n<li><code>az account</code>: Set your active subscription context.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>az account set --subscription 'Corporate Subscription'</code></p>\n<ul>\n<li><code>az configure</code>: Specify your default output type (among other options).</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>az configure --defaults group=myRG web=myweb vm=myvm</code></p>\n<ul>\n<li><code>az group deployment create</code>: Deploy an Azure Resource Manager (ARM) template.</li>\n</ul>\n<p style=\"padding-left: 40px;\"><code>az group deployment create --resource-group 'Engineering'</code></p>\n<p style=\"padding-left: 120px;\"><code>--template-file 'D:\\templates\\env-deploy.json'</code></p>\n<p style=\"padding-left: 120px;\"><code>--parameters '{\"location\": {\"value\": \"eastus2\"}}'</code></p>\n"},{"title":"ARM Template Elements","thumb":null,"image":null,"content":"<p>Every ARM template contains at least some of the following JavaScript Object Notation (JSON) elements. Here’s a good roll-up of them, along with brief descriptions:</p>\n<ul>\n<li><strong>$schema:</strong> Required; the JSON schema file against which your template is validated</li>\n<li><strong>contentVersion:</strong> Required; for your team’s use (Azure simply requires some value.)</li>\n<li><strong>apiProfile:</strong> Optional; API version collection for particular resource types</li>\n<li><strong>parameters:</strong> Optional; values passed in to the deployment at run time</li>\n<li><strong>variables:</strong> Optional; JSON fragments that simplify template language expressions (generating unique resource names, for example)</li>\n<li><strong>functions:</strong> Optional; user-defined functions that are made available within the template</li>\n<li><strong>resources:</strong> Required; the resources that Azure will deploy in to a resource group or subscription</li>\n<li><strong>outputs:</strong> Optional; values returned postdeployment</li>\n</ul>\n"},{"title":"Well-Known Azure Domains","thumb":null,"image":null,"content":"<p>Until you stand up a site-to-site virtual private network or an ExpressRoute circuit between your local network and Azure, you’ll probably have to create some firewall rules to allow traffic from well-known Azure services.</p>\n<p>Following, is a nonexhaustive list of Azure service URLs and a brief description of the service(s) each hosts:</p>\n<ul>\n<li><strong>azure.com:</strong> The public Azure website</li>\n<li><strong>azureedge.net:</strong> Azure Content Delivery Network</li>\n<li><strong>azurewebsites.net:</strong> Azure App Service</li>\n<li><strong>cloudapp.net:</strong> Azure Virtual Machines (among other services)</li>\n<li><strong>core.windows.net:</strong> Azure storage</li>\n<li><strong>database.windows.net:</strong> Azure SQL Database product family</li>\n<li><strong>documents.azure.com:</strong> Azure Cosmos DB</li>\n<li><strong>graph.windows.net:</strong> Microsoft Graph API used in Azure AD</li>\n<li><strong>logic.azure.com:</strong> Azure Logic Apps</li>\n<li><strong>login.microsoftonline.com:</strong> Azure authentication endpoint</li>\n<li><strong>onmicrosoft.com:</strong> Azure AD</li>\n<li><strong>trafficmanager.net:</strong> Azure Traffic Manager</li>\n<li><strong>vault.azure.net:</strong> Azure Key Vault</li>\n<li><strong>windowsazure.com</strong><strong>:</strong> The legacy (original) Azure domain, still seen from time to time (Azure MFA, Azure Account Center)</li>\n</ul>\n"}],"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"Two years","lifeExpectancySetFrom":"2022-12-09T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":268984},{"headers":{"creationTime":"2016-03-26T20:27:01+00:00","modifiedTime":"2022-11-07T19:41:52+00:00","timestamp":"2022-11-07T21:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Active Directory Logical Design Checklist","strippedTitle":"active directory logical design checklist","slug":"active-directory-logical-design-checklist","canonicalUrl":"","seo":{"metaDescription":"Active Directory is part of a storage structure you design that provides organization of objects — like users, computers, groups, and an assortment of other obj","noIndex":0,"noFollow":0},"content":"<p>Active Directory is part of a storage structure you design that provides organization of objects — like users, computers, groups, and an assortment of other objects — in your IT environment. Before you can implement Active Directory, you have to do some planning. Be sure to complete the following steps before creating domains and organizational units (OUs):</p>\r\n<ol class=\"level-one\">\r\n<li>\r\n<p class=\"first-para\">Using the DNS namespace, identify and name the root domain.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine whether a tree or a forest is appropriate for your organization.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine whether you need additional domains.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Consult your requirements and environment to decide which domain model is best for your needs and to decide whether you need additional child domains.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Analyze business models and processes to determine which OU model is best for your needs.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine who will administer each OU and the administrative rights they'll need.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Delegate the administrative privileges that the OU administrators need.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Diagram the logical Active Directory structure.</p>\r\n</li>\r\n</ol>","description":"<p>Active Directory is part of a storage structure you design that provides organization of objects — like users, computers, groups, and an assortment of other objects — in your IT environment. Before you can implement Active Directory, you have to do some planning. Be sure to complete the following steps before creating domains and organizational units (OUs):</p>\r\n<ol class=\"level-one\">\r\n<li>\r\n<p class=\"first-para\">Using the DNS namespace, identify and name the root domain.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine whether a tree or a forest is appropriate for your organization.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine whether you need additional domains.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Consult your requirements and environment to decide which domain model is best for your needs and to decide whether you need additional child domains.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Analyze business models and processes to determine which OU model is best for your needs.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Determine who will administer each OU and the administrative rights they'll need.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Delegate the administrative privileges that the OU administrators need.</p>\r\n</li>\r\n<li>\r\n<p class=\"first-para\">Diagram the logical Active Directory structure.</p>\r\n</li>\r\n</ol>","blurb":"","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}}],"fromCategory":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281618,"slug":"active-directory-for-dummies-2nd-edition","isbn":"9780470287200","categoryList":["technology","information-technology","networking","active-directory-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470287209-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/active-directory-for-dummies-2nd-edition-cover-9780470287200-202x255.jpg","width":202,"height":255},"title":"Active Directory For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10173\">Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b data-author-id=\"10174\">Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720f56206\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720f569c0\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-11-07T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":187714},{"headers":{"creationTime":"2016-03-26T20:27:01+00:00","modifiedTime":"2022-11-07T19:41:35+00:00","timestamp":"2022-11-07T21:01:03+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Roles of the Active Directory Domain Controllers","strippedTitle":"roles of the active directory domain controllers","slug":"roles-of-the-active-directory-domain-controllers","canonicalUrl":"","seo":{"metaDescription":"Active Directory uses a multiple-master model, and usually, domain controllers (DCs) are equal with each other in reading and writing directory information. How","noIndex":0,"noFollow":0},"content":"<p>Active Directory uses a multiple-master model, and usually, domain controllers (DCs) are equal with each other in reading and writing directory information. However, certain roles cannot be distributed across all the DCs, meaning that changes can't take place on more than one domain controller at a time. Some domain controllers, therefore, do assume a single-master operations role — known as operations masters in Active Directory.</p>\r\n<p>The five categories of operations master roles are:</p>\r\n<ul class=\"level-one\">\r\n <li><p class=\"first-para\"><b>Schema master</b> (one per forest): Maintains the master copy of the schema.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>PDC emulator</b> (one per domain): Emulates a primary domain controller for backward compatibility with Windows NT.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Domain naming master</b> (one per forest): Tracks object names throughout a forest to ensure that they're unique. Also tracks cross-references to objects in other directories.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Infrastructure master</b> (one per domain): Tracks object references among domains and maintains a list of deleted child objects.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Relative identifier (RID) master</b> (one per domain): Tracks the assignment of SIDs (security identifiers) throughout the domain.</p>\r\n </li>\r\n</ul>\r\n<p>Usually, the first domain controller that you create in the first domain assumes the operations master roles. You can assign these roles to other domain controllers in the domain or forest, but only one domain controller at a time can hold each operation's master role.</p>","description":"<p>Active Directory uses a multiple-master model, and usually, domain controllers (DCs) are equal with each other in reading and writing directory information. However, certain roles cannot be distributed across all the DCs, meaning that changes can't take place on more than one domain controller at a time. Some domain controllers, therefore, do assume a single-master operations role — known as operations masters in Active Directory.</p>\r\n<p>The five categories of operations master roles are:</p>\r\n<ul class=\"level-one\">\r\n <li><p class=\"first-para\"><b>Schema master</b> (one per forest): Maintains the master copy of the schema.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>PDC emulator</b> (one per domain): Emulates a primary domain controller for backward compatibility with Windows NT.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Domain naming master</b> (one per forest): Tracks object names throughout a forest to ensure that they're unique. Also tracks cross-references to objects in other directories.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Infrastructure master</b> (one per domain): Tracks object references among domains and maintains a list of deleted child objects.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Relative identifier (RID) master</b> (one per domain): Tracks the assignment of SIDs (security identifiers) throughout the domain.</p>\r\n </li>\r\n</ul>\r\n<p>Usually, the first domain controller that you create in the first domain assumes the operations master roles. You can assign these roles to other domain controllers in the domain or forest, but only one domain controller at a time can hold each operation's master role.</p>","blurb":"","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187714,"title":"Active Directory Logical Design Checklist","slug":"active-directory-logical-design-checklist","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187714"}}],"fromCategory":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281618,"slug":"active-directory-for-dummies-2nd-edition","isbn":"9780470287200","categoryList":["technology","information-technology","networking","active-directory-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470287209-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/active-directory-for-dummies-2nd-edition-cover-9780470287200-202x255.jpg","width":202,"height":255},"title":"Active Directory For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10173\">Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b data-author-id=\"10174\">Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720f4cc51\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720f4d4bd\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-11-07T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":187712},{"headers":{"creationTime":"2016-03-26T20:27:02+00:00","modifiedTime":"2022-11-07T19:40:34+00:00","timestamp":"2022-11-07T21:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Hardware Requirements for Windows Server 2008","strippedTitle":"hardware requirements for windows server 2008","slug":"hardware-requirements-for-windows-server-2008","canonicalUrl":"","seo":{"metaDescription":"Before you arrange and use Active Directory, you need to install the operating system Windows Server 2008. Start by making certain the hardware you plan to use ","noIndex":0,"noFollow":0},"content":"<p>Before you arrange and use Active Directory, you need to install the operating system Windows Server 2008. Start by making certain the hardware you plan to use as domain controllers is able to run the operating system. This list shows you the minimum and recommended hardware levels for Windows Server 2008:</p>\r\n<table border=\"0\">\r\n<tbody>\r\n<tr>\r\n<th>Component</th> <th>Requirement</th>\r\n</tr>\r\n<tr>\r\n<td>Processor</td>\r\n<td>1 GHz (x86 CPU) or 1.4 GHz (x64 CPU)</td>\r\n</tr>\r\n<tr>\r\n<td>Memory</td>\r\n<td>512MB required; 2GB or higher recommended.</td>\r\n</tr>\r\n<tr>\r\n<td>Hard Disk</td>\r\n<td>10 GB required. 40 GB or more recommended.</td>\r\n</tr>\r\n<tr>\r\n<td>Video</td>\r\n<td>Super VGA or higher video card and monitor.</td>\r\n</tr>\r\n<tr>\r\n<td>Hardware</td>\r\n<td>Must be on the Windows 2008 Hardware Compatibility List.</td>\r\n</tr>\r\n</tbody>\r\n</table>","description":"<p>Before you arrange and use Active Directory, you need to install the operating system Windows Server 2008. Start by making certain the hardware you plan to use as domain controllers is able to run the operating system. This list shows you the minimum and recommended hardware levels for Windows Server 2008:</p>\r\n<table border=\"0\">\r\n<tbody>\r\n<tr>\r\n<th>Component</th> <th>Requirement</th>\r\n</tr>\r\n<tr>\r\n<td>Processor</td>\r\n<td>1 GHz (x86 CPU) or 1.4 GHz (x64 CPU)</td>\r\n</tr>\r\n<tr>\r\n<td>Memory</td>\r\n<td>512MB required; 2GB or higher recommended.</td>\r\n</tr>\r\n<tr>\r\n<td>Hard Disk</td>\r\n<td>10 GB required. 40 GB or more recommended.</td>\r\n</tr>\r\n<tr>\r\n<td>Video</td>\r\n<td>Super VGA or higher video card and monitor.</td>\r\n</tr>\r\n<tr>\r\n<td>Hardware</td>\r\n<td>Must be on the Windows 2008 Hardware Compatibility List.</td>\r\n</tr>\r\n</tbody>\r\n</table>","blurb":"","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}},{"articleId":187714,"title":"Active Directory Logical Design Checklist","slug":"active-directory-logical-design-checklist","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187714"}}],"fromCategory":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}},{"articleId":187717,"title":"Active Directory Components in Windows Server 2008","slug":"active-directory-components-in-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187717"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281618,"slug":"active-directory-for-dummies-2nd-edition","isbn":"9780470287200","categoryList":["technology","information-technology","networking","active-directory-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470287209-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/active-directory-for-dummies-2nd-edition-cover-9780470287200-202x255.jpg","width":202,"height":255},"title":"Active Directory For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10173\">Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b data-author-id=\"10174\">Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720eb1023\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720eb1811\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-11-07T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":187715},{"headers":{"creationTime":"2016-03-26T20:27:03+00:00","modifiedTime":"2022-11-07T19:40:11+00:00","timestamp":"2022-11-07T21:01:02+00:00"},"data":{"breadcrumbs":[{"name":"Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33512"},"slug":"technology","categoryId":33512},{"name":"Information Technology","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33572"},"slug":"information-technology","categoryId":33572},{"name":"Networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33581"},"slug":"networking","categoryId":33581},{"name":"Active Directory","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"},"slug":"active-directory-networking","categoryId":33582}],"title":"Active Directory Components in Windows Server 2008","strippedTitle":"active directory components in windows server 2008","slug":"active-directory-components-in-windows-server-2008","canonicalUrl":"","seo":{"metaDescription":"The range of Active Directory (AD) has expanded in Windows Server 2008 and has become an essential part of many information technology (IT) environments. Active","noIndex":0,"noFollow":0},"content":"<p>The range of Active Directory (AD) has expanded in Windows Server 2008 and has become an essential part of many information technology (IT) environments. Active Directory has become an umbrella for a multitude of technologies surpassing what AD was in Windows Server 2000 and 2003. Check out the new uses for Active Directory:</p>\r\n<ul class=\"level-one\">\r\n <li><p class=\"first-para\"><b>Active Directory Domain Services:</b> An X.500-based directory service that provides integrated authentication and authorization services for a Windows computing environment.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Lightweight Directory Services:</b> A stripped down version of Active Directory Domain Services that focuses on providing just the directory services functionality.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Federation Services:</b> A Web Services–based technology for providing Web single sign-on authentication services between different organizations.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Certificate Services:</b> Provides digital certification enrollment and revocation services in the support of a public key infrastructure (PKI).</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Rights Management Services:</b> Provides a solution for managing how users can use documents that they're authorized to access.</p>\r\n </li>\r\n</ul>","description":"<p>The range of Active Directory (AD) has expanded in Windows Server 2008 and has become an essential part of many information technology (IT) environments. Active Directory has become an umbrella for a multitude of technologies surpassing what AD was in Windows Server 2000 and 2003. Check out the new uses for Active Directory:</p>\r\n<ul class=\"level-one\">\r\n <li><p class=\"first-para\"><b>Active Directory Domain Services:</b> An X.500-based directory service that provides integrated authentication and authorization services for a Windows computing environment.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Lightweight Directory Services:</b> A stripped down version of Active Directory Domain Services that focuses on providing just the directory services functionality.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Federation Services:</b> A Web Services–based technology for providing Web single sign-on authentication services between different organizations.</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Certificate Services:</b> Provides digital certification enrollment and revocation services in the support of a public key infrastructure (PKI).</p>\r\n </li>\r\n <li><p class=\"first-para\"><b>Active Directory Rights Management Services:</b> Provides a solution for managing how users can use documents that they're authorized to access.</p>\r\n </li>\r\n</ul>","blurb":"","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"primaryCategoryTaxonomy":{"categoryId":33582,"title":"Active Directory","slug":"active-directory-networking","_links":{"self":"https://dummies-api.dummies.com/v2/categories/33582"}},"secondaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"tertiaryCategoryTaxonomy":{"categoryId":0,"title":null,"slug":null,"_links":null},"trendingArticles":[{"articleId":192609,"title":"How to Pray the Rosary: A Comprehensive Guide","slug":"how-to-pray-the-rosary","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/192609"}},{"articleId":208741,"title":"Kabbalah For Dummies Cheat Sheet","slug":"kabbalah-for-dummies-cheat-sheet","categoryList":["body-mind-spirit","religion-spirituality","kabbalah"],"_links":{"self":"/articles/208741"}},{"articleId":230957,"title":"Nikon D3400 For Dummies Cheat Sheet","slug":"nikon-d3400-dummies-cheat-sheet","categoryList":["home-auto-hobbies","photography"],"_links":{"self":"/articles/230957"}},{"articleId":235851,"title":"Praying the Rosary and Meditating on the Mysteries","slug":"praying-rosary-meditating-mysteries","categoryList":["body-mind-spirit","religion-spirituality","christianity","catholicism"],"_links":{"self":"/articles/235851"}},{"articleId":284787,"title":"What Your Society Says About You","slug":"what-your-society-says-about-you","categoryList":["academics-the-arts","humanities"],"_links":{"self":"/articles/284787"}}],"inThisArticle":[],"relatedArticles":{"fromBook":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}},{"articleId":187714,"title":"Active Directory Logical Design Checklist","slug":"active-directory-logical-design-checklist","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187714"}}],"fromCategory":[{"articleId":208620,"title":"Active Directory For Dummies Cheat Sheet","slug":"active-directory-for-dummies-cheat-sheet","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/208620"}},{"articleId":199818,"title":"Moving Objects in Active Directory","slug":"moving-objects-in-active-directory","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/199818"}},{"articleId":187715,"title":"Hardware Requirements for Windows Server 2008","slug":"hardware-requirements-for-windows-server-2008","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187715"}},{"articleId":187716,"title":"Common Types of Domain Name Service Resource Records","slug":"common-types-of-domain-name-service-resource-records","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187716"}},{"articleId":187712,"title":"Roles of the Active Directory Domain Controllers","slug":"roles-of-the-active-directory-domain-controllers","categoryList":["technology","information-technology","networking","active-directory-networking"],"_links":{"self":"https://dummies-api.dummies.com/v2/articles/187712"}}]},"hasRelatedBookFromSearch":false,"relatedBook":{"bookId":281618,"slug":"active-directory-for-dummies-2nd-edition","isbn":"9780470287200","categoryList":["technology","information-technology","networking","active-directory-networking"],"amazon":{"default":"https://www.amazon.com/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","ca":"https://www.amazon.ca/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","indigo_ca":"http://www.tkqlhce.com/click-9208661-13710633?url=https://www.chapters.indigo.ca/en-ca/books/product/0470287209-item.html&cjsku=978111945484","gb":"https://www.amazon.co.uk/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20","de":"https://www.amazon.de/gp/product/0470287209/ref=as_li_tl?ie=UTF8&tag=wiley01-20"},"image":{"src":"https://www.dummies.com/wp-content/uploads/active-directory-for-dummies-2nd-edition-cover-9780470287200-202x255.jpg","width":202,"height":255},"title":"Active Directory For Dummies","testBankPinActivationLink":"","bookOutOfPrint":false,"authorsInfo":"<b data-author-id=\"10173\">Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b data-author-id=\"10174\">Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm’s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","authors":[{"authorId":10173,"name":"Steve Clines","slug":"steve-clines","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10173"}},{"authorId":10174,"name":"Marcia Loughry","slug":"marcia-loughry","description":" <b>Steve Clines,</b> MCSE, MCT, has worked as an IT architect and engineer at EDS for over 18 years. He has worked on deployments of more than 100,000 seats for both Active Directory and Microsoft Exchange Server. Steve is the author of <i>MCSE Designing a Windows 2000 Directory Services Infrastructure For Dummies,</i> which is a study guide for the 70-219 MCP exam. He also maintains the Confessions of an IT Geek blog at http://itgeek.steveco.net. <p><b>Marcia Loughry,</b> MCSE and MCP+I, is a Senior Infrastructure Specialist with a large IT firm in Dallas, Texas. She is president of the Plano, Texas BackOffice User Group (PBUG) and a member of Women in Technology International. Marcia received her MCSE in NT 3.51 in 1997 and completed requirements for the NT 4.0 track in 1998.<br /> Marcia has extensive experience working with Windows NT 3.51 and 4.0 in enterprises of all sizes. She is assigned to some of her firm&#8217;s largest customers in designing NT solutions and integrating UNIX and NetWare environments with NT.</p>","hasArticle":false,"_links":{"self":"https://dummies-api.dummies.com/v2/authors/10174"}}],"_links":{"self":"https://dummies-api.dummies.com/v2/books/"}},"collections":[],"articleAds":{"footerAd":"<div class=\"du-ad-region row\" id=\"article_page_adhesion_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_adhesion_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720ea9e65\"></div></div>","rightAd":"<div class=\"du-ad-region row\" id=\"article_page_right_ad\"><div class=\"du-ad-unit col-md-12\" data-slot-id=\"article_page_right_ad\" data-refreshed=\"false\" \r\n data-target = \"[{&quot;key&quot;:&quot;cat&quot;,&quot;values&quot;:[&quot;technology&quot;,&quot;information-technology&quot;,&quot;networking&quot;,&quot;active-directory-networking&quot;]},{&quot;key&quot;:&quot;isbn&quot;,&quot;values&quot;:[&quot;9780470287200&quot;]}]\" id=\"du-slot-6369720eaa63d\"></div></div>"},"articleType":{"articleType":"Articles","articleList":null,"content":null,"videoInfo":{"videoId":null,"name":null,"accountId":null,"playerId":null,"thumbnailUrl":null,"description":null,"uploadDate":null}},"sponsorship":{"sponsorshipPage":false,"backgroundImage":{"src":null,"width":0,"height":0},"brandingLine":"","brandingLink":"","brandingLogo":{"src":null,"width":0,"height":0},"sponsorAd":"","sponsorEbookTitle":"","sponsorEbookLink":"","sponsorEbookImage":{"src":null,"width":0,"height":0}},"primaryLearningPath":"Advance","lifeExpectancy":"One year","lifeExpectancySetFrom":"2022-11-07T00:00:00+00:00","dummiesForKids":"no","sponsoredContent":"no","adInfo":"","adPairKey":[]},"status":"publish","visibility":"public","articleId":187717}],"_links":{"self":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=0"},"next":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=10"},"last":{"self":"https://dummies-api.dummies.com/v2/categories/33581/categoryArticles?sortField=time&sortOrder=1&size=10&offset=259"}}},"objectTitle":"","status":"success","pageType":"article-category","objectId":"33581","page":1,"sortField":"time","sortOrder":1,"categoriesIds":[],"articleTypes":[],"filterData":{"categoriesFilter":[{"itemId":0,"itemName":"All Categories","count":266},{"itemId":33582,"itemName":"Active Directory","count":8},{"itemId":33584,"itemName":"Cloud Computing","count":101},{"itemId":33585,"itemName":"General Networking","count":155},{"itemId":33581,"itemName":"Networking","count":2}],"articleTypeFilter":[{"articleType":"All Types","count":266},{"articleType":"Articles","count":240},{"articleType":"Cheat Sheet","count":9},{"articleType":"Step by Step","count":16},{"articleType":"Videos","count":1}]},"filterDataLoadedStatus":"success","pageSize":10},"adsState":{"pageScripts":{"headers":{"timestamp":"2025-04-17T15:50:01+00:00"},"adsId":0,"data":{"scripts":[{"pages":["all"],"location":"header","script":"<!--Optimizely Script-->\r\n<script src=\"https://cdn.optimizely.com/js/10563184655.js\"></script>","enabled":false},{"pages":["all"],"location":"header","script":"<!-- comScore Tag -->\r\n<script>var _comscore = _comscore || [];_comscore.push({ c1: \"2\", c2: \"15097263\" });(function() {var s = document.createElement(\"script\"), el = document.getElementsByTagName(\"script\")[0]; s.async = true;s.src = (document.location.protocol == \"https:\" ? \"https://sb\" : \"http://b\") + \".scorecardresearch.com/beacon.js\";el.parentNode.insertBefore(s, el);})();</script><noscript><img src=\"https://sb.scorecardresearch.com/p?c1=2&c2=15097263&cv=2.0&cj=1\" /></noscript>\r\n<!-- / comScore Tag -->","enabled":true},{"pages":["all"],"location":"footer","script":"<!--BEGIN QUALTRICS WEBSITE FEEDBACK SNIPPET-->\r\n<script type='text/javascript'>\r\n(function(){var g=function(e,h,f,g){\r\nthis.get=function(a){for(var a=a+\"=\",c=document.cookie.split(\";\"),b=0,e=c.length;b<e;b++){for(var d=c[b];\" \"==d.charAt(0);)d=d.substring(1,d.length);if(0==d.indexOf(a))return d.substring(a.length,d.length)}return null};\r\nthis.set=function(a,c){var b=\"\",b=new Date;b.setTime(b.getTime()+6048E5);b=\"; expires=\"+b.toGMTString();document.cookie=a+\"=\"+c+b+\"; path=/; \"};\r\nthis.check=function(){var a=this.get(f);if(a)a=a.split(\":\");else if(100!=e)\"v\"==h&&(e=Math.random()>=e/100?0:100),a=[h,e,0],this.set(f,a.join(\":\"));else return!0;var c=a[1];if(100==c)return!0;switch(a[0]){case \"v\":return!1;case \"r\":return c=a[2]%Math.floor(100/c),a[2]++,this.set(f,a.join(\":\")),!c}return!0};\r\nthis.go=function(){if(this.check()){var a=document.createElement(\"script\");a.type=\"text/javascript\";a.src=g;document.body&&document.body.appendChild(a)}};\r\nthis.start=function(){var t=this;\"complete\"!==document.readyState?window.addEventListener?window.addEventListener(\"load\",function(){t.go()},!1):window.attachEvent&&window.attachEvent(\"onload\",function(){t.go()}):t.go()};};\r\ntry{(new g(100,\"r\",\"QSI_S_ZN_5o5yqpvMVjgDOuN\",\"https://zn5o5yqpvmvjgdoun-wiley.siteintercept.qualtrics.com/SIE/?Q_ZID=ZN_5o5yqpvMVjgDOuN\")).start()}catch(i){}})();\r\n</script><div id='ZN_5o5yqpvMVjgDOuN'><!--DO NOT REMOVE-CONTENTS PLACED HERE--></div>\r\n<!--END WEBSITE FEEDBACK SNIPPET-->","enabled":false},{"pages":["all"],"location":"header","script":"<!-- Hotjar Tracking Code for http://www.dummies.com -->\r\n<script>\r\n (function(h,o,t,j,a,r){\r\n h.hj=h.hj||function(){(h.hj.q=h.hj.q||[]).push(arguments)};\r\n h._hjSettings={hjid:257151,hjsv:6};\r\n a=o.getElementsByTagName('head')[0];\r\n r=o.createElement('script');r.async=1;\r\n r.src=t+h._hjSettings.hjid+j+h._hjSettings.hjsv;\r\n a.appendChild(r);\r\n })(window,document,'https://static.hotjar.com/c/hotjar-','.js?sv=');\r\n</script>","enabled":false},{"pages":["article"],"location":"header","script":"<!-- //Connect Container: dummies --> <script src=\"//get.s-onetag.com/bffe21a1-6bb8-4928-9449-7beadb468dae/tag.min.js\" async defer></script>","enabled":true},{"pages":["homepage"],"location":"header","script":"<meta name=\"facebook-domain-verification\" content=\"irk8y0irxf718trg3uwwuexg6xpva0\" />","enabled":true},{"pages":["homepage","article","category","search"],"location":"footer","script":"<!-- Facebook Pixel Code -->\r\n<noscript>\r\n<img height=\"1\" width=\"1\" src=\"https://www.facebook.com/tr?id=256338321977984&ev=PageView&noscript=1\"/>\r\n</noscript>\r\n<!-- End Facebook Pixel Code -->","enabled":true}]}},"pageScriptsLoadedStatus":"success"},"navigationState":{"navigationCollections":[{"collectionId":287568,"title":"BYOB (Be Your Own Boss)","hasSubCategories":false,"url":"/collection/for-the-entry-level-entrepreneur-287568"},{"collectionId":293237,"title":"Be a Rad Dad","hasSubCategories":false,"url":"/collection/be-the-best-dad-293237"},{"collectionId":295890,"title":"Career Shifting","hasSubCategories":false,"url":"/collection/career-shifting-295890"},{"collectionId":294090,"title":"Contemplating the Cosmos","hasSubCategories":false,"url":"/collection/theres-something-about-space-294090"},{"collectionId":287563,"title":"For Those Seeking Peace of Mind","hasSubCategories":false,"url":"/collection/for-those-seeking-peace-of-mind-287563"},{"collectionId":287570,"title":"For the Aspiring Aficionado","hasSubCategories":false,"url":"/collection/for-the-bougielicious-287570"},{"collectionId":291903,"title":"For the Budding Cannabis Enthusiast","hasSubCategories":false,"url":"/collection/for-the-budding-cannabis-enthusiast-291903"},{"collectionId":299891,"title":"For the College Bound","hasSubCategories":false,"url":"/collection/for-the-college-bound-299891"},{"collectionId":291934,"title":"For the Exam-Season Crammer","hasSubCategories":false,"url":"/collection/for-the-exam-season-crammer-291934"},{"collectionId":301547,"title":"For the Game Day Prepper","hasSubCategories":false,"url":"/collection/big-game-day-prep-made-easy-301547"}],"navigationCollectionsLoadedStatus":"success","navigationCategories":{"books":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/books/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/books/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/books/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/books/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/books/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/books/level-0-category-0"}},"articles":{"0":{"data":[{"categoryId":33512,"title":"Technology","hasSubCategories":true,"url":"/category/articles/technology-33512"},{"categoryId":33662,"title":"Academics & The Arts","hasSubCategories":true,"url":"/category/articles/academics-the-arts-33662"},{"categoryId":33809,"title":"Home, Auto, & Hobbies","hasSubCategories":true,"url":"/category/articles/home-auto-hobbies-33809"},{"categoryId":34038,"title":"Body, Mind, & Spirit","hasSubCategories":true,"url":"/category/articles/body-mind-spirit-34038"},{"categoryId":34224,"title":"Business, Careers, & Money","hasSubCategories":true,"url":"/category/articles/business-careers-money-34224"}],"breadcrumbs":[],"categoryTitle":"Level 0 Category","mainCategoryUrl":"/category/articles/level-0-category-0"}}},"navigationCategoriesLoadedStatus":"success"},"searchState":{"searchList":[],"searchStatus":"initial","relatedArticlesList":[],"relatedArticlesStatus":"initial"},"routeState":{"name":"ArticleCategory","path":"/category/articles/networking-33581/","hash":"","query":{},"params":{"category":"networking-33581"},"fullPath":"/category/articles/networking-33581/","meta":{"routeType":"category","breadcrumbInfo":{"suffix":"Articles","baseRoute":"/category/articles"},"prerenderWithAsyncData":true},"from":{"name":null,"path":"/","hash":"","query":{},"params":{},"fullPath":"/","meta":{}}},"profileState":{"auth":{},"userOptions":{},"status":"success"}}
Logo
  • Articles Open Article Categories
  • Books Open Book Categories
  • Collections Open Collections list
  • Custom Solutions

Article Categories

Book Categories

Collections

Explore all collections
BYOB (Be Your Own Boss)
Be a Rad Dad
Career Shifting
Contemplating the Cosmos
For Those Seeking Peace of Mind
For the Aspiring Aficionado
For the Budding Cannabis Enthusiast
For the College Bound
For the Exam-Season Crammer
For the Game Day Prepper
Log In
  • Home
  • Technology Articles
  • Information Technology Articles
  • Networking Articles

Networking Articles

All those computers out there in the world? Well, they've gotta talk to one another somehow. We explain how.

Browse By Category

Active Directory

Cloud Computing

General Networking

Previous slideNext slide

Active Directory

Cloud Computing

General Networking

Articles From Networking

page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27

Filter Results

269 results
269 results
General Networking Configuring Network Connections for Windows 10

Step by Step / Updated 10-28-2024

Windows usually detects the presence of a network adapter automatically; typically, you don’t have to install device drivers manually for the adapter. When Windows detects a network adapter, Windows automatically creates a network connection and configures it to support basic networking protocols. You may need to change the configuration of a network connection manually, however. The following steps show you how to configure your network adapter on a Windows 10 system:

View Step by Step
Cloud Computing Your Business Performance Can Soar with Enterprise Automation

Article / Updated 01-26-2024

In this article you will learn: What enterprise automation is Why you should implement enterprise automation How enterprise automation will impact businesses in the future What is enterprise automation? Enterprise automation increases efficiency by replacing repetitive, manual, and error-prone business processes with intelligent, automated, and more reliable workflows. Enterprise automation is an ongoing and strategic driver of the digital business landscape that seamlessly connects data, applications, and services with people and their organizations. With enterprise automation, companies remove bottlenecks, improve and accelerate the flow of data, empower IT resources with better productivity, and give non-IT business groups the ability to easily self-serve their data needs – across their enterprise. Why enterprise automation? Think about the IT and organizational challenges you face today. You’re experiencing poor agility in certain areas. Meanwhile, the rapid pace of business requires digitalization, cloud adoption, and quick responsiveness. This situation is exactly what you want to aspire to; however, your business processes are sluggish and suffering where data silos persist. Collaboration between teams is more difficult than it should be. Not only is business moving quickly, but the pace of innovation is increasing as well. Your project leaders, your customers, your internal business partners, and your employee expectations are ever increasing. This forces your organization to be more innovative and try new things as you seek to become faster and more efficient. Competitors in your landscape aren’t sitting still. You need to leverage and exploit all the data you can across your enterprise — operational systems, functional applications, and multiple channels of data. All must be harnessed to survive, thrive, and excel in a competitive landscape and to take corporate intelligence to the next level. You recognize that to be agile and responsive, and to achieve these aspirations, you need solutions to be agile and responsive and capable of connecting your entire enterprise, end-to-end. That is what enterprise automation is all about and the inspiration behind Enterprise Automation For Dummies, sponsored by SnapLogic. The future is enterprise automation Enterprise automation done well uniquely combines data integration, app-to-app integration, and API development and management for API-led integrations and delivery of data services. And, it doesn’t have to be complicated. Easy-to-use, event-driven platforms, augmented with graphical (low-code and no-code) user interfaces and AI-assistance, enables you to get up and running sooner to remove manual burdens and automate business processes. To learn more, download Enterprise Automation For Dummies to gain knowledge of integration principles and pick up insights on how to automate and orchestrate data across your enterprise and empower people. Enterprise Automation For Dummies includes case studies with summaries and achieved success metrics. Download Enterprise Automation For Dummies today and chart your future.

View Article
General Networking The 2 Pillars of Cybersecurity

Article / Updated 08-31-2023

As an IT professional, cybersecurity is the thing most likely to keep you awake at night. You must consider two basic elements as part of your cybersecurity plan: Prevention: The first pillar of cybersecurity is technology that you can deploy to prevent bad actors from penetrating your network and stealing or damaging your data. This technology includes firewalls that block unwelcome access, antivirus programs that detect malicious software, patch management tools that keep your software up to date, and antispam programs that keep suspicious email from reaching your users’ inboxes. The most important part of the prevention pillar is the human firewall. Technology can only go so far in preventing successful cyber attacks. Most successful attacks are the result of users opening email attachments or clicking web links that they should have known were dangerous. Thus, in addition to providing technology to prevent attacks, you also need to make sure your users know how to spot and avoid suspicious email attachments and web links. Recovery: The second pillar of cybersecurity is necessary because the first pillar isn’t always successful. Successful cyber attacks are inevitable, so you need to have technology and plans in place to quickly recover from them when you do.

View Article
General Networking Securing the Human Firewall

Article / Updated 08-31-2023

Security techniques and technology — physical security, user account security, server security, and locking down your servers — are child’s play compared with the most difficult job of network security: securing your network’s users. All the best-laid security plans are for naught if your users write down their passwords on sticky notes and post them on their computers and click every link that shows up in their email. The key to securing your network users is to empower your users to realize that they’re an important part of your company’s cybersecurity plan, and then show them what they can do to become an effective human firewall. This necessarily involves training, and of course IT training is usually the most dreaded type of training there is. So, do your best to make the training fun and engaging rather than dull and boring. If training isn’t your thing, search the web. You’ll find plenty of inexpensive options for online cybersecurity training, ranging from simple and short videos to full-length online courses. You’ll also need to establish a written cybersecurity policy and stick to it. Have a meeting with everyone to go over the security policy to make sure that everyone understands the rules. Also, make sure to have consequences when violations occur. Here are some suggestions for some basic security rules you can incorporate into your security policy: Never write down your password or give it to someone else. Accounts should not be shared. Never use someone else’s account to access a resource that you can’t access under your own account. If you need access to some network resource that isn’t available to you, you should formally request access under your own account. Likewise, never give your account information to a co-worker so that he or she can access a needed resource. Your co-worker should instead formally request access under his or her own account. Don’t install any software or hardware on your computer — especially wireless access devices or modems — without first obtaining permission. Don’t enable file and printer sharing on workstations without first getting permission. Never attempt to disable or bypass the network’s security features.

View Article
Active Directory Common Domain Name Service Resource Records

Article / Updated 05-03-2023

A resource record is the basic data component in the Domain Name Service (DNS). DNS resource records define not only names and IP addresses but domains, servers, zone, and services as well. This list shows you the most common types of resource records: Type Purpose A Address resource records match an IP address to a host name. CNAME Canonical name resource records associate a nickname to a host name. MX Mail exchange resource records identify mail servers for the specified domain. NS Name server resource records identify servers (other than the SOA server) that contain zone information files. PTR Pointer resource records match a host name to a given IP address. This is the opposite of an Address record, which matches an IP address to the supplied host name. SOA Start of authority resource records specify which server contains the zone file for a domain. SRV Service resource records identify servers that provide special services to the domain.

View Article
Cloud Computing Microsoft Azure For Dummies Cheat Sheet

Cheat Sheet / Updated 12-12-2022

The best approach to working with Microsoft Azure can be summarized in three words: “always be learning.” The Azure product development teams release new features every workday, so if you aren’t actively working to stay current, you’ll fall behind, and your career will suffer. This Cheat Sheet offers some essential ingredients in Azure automation. Remember that the Azure portal is all well and good until you’re tasked with deploying 50 virtual machines!

View Cheat Sheet
Active Directory Active Directory Logical Design Checklist

Article / Updated 11-07-2022

Active Directory is part of a storage structure you design that provides organization of objects — like users, computers, groups, and an assortment of other objects — in your IT environment. Before you can implement Active Directory, you have to do some planning. Be sure to complete the following steps before creating domains and organizational units (OUs): Using the DNS namespace, identify and name the root domain. Determine whether a tree or a forest is appropriate for your organization. Determine whether you need additional domains. Consult your requirements and environment to decide which domain model is best for your needs and to decide whether you need additional child domains. Analyze business models and processes to determine which OU model is best for your needs. Determine who will administer each OU and the administrative rights they'll need. Delegate the administrative privileges that the OU administrators need. Diagram the logical Active Directory structure.

View Article
Active Directory Roles of the Active Directory Domain Controllers

Article / Updated 11-07-2022

Active Directory uses a multiple-master model, and usually, domain controllers (DCs) are equal with each other in reading and writing directory information. However, certain roles cannot be distributed across all the DCs, meaning that changes can't take place on more than one domain controller at a time. Some domain controllers, therefore, do assume a single-master operations role — known as operations masters in Active Directory. The five categories of operations master roles are: Schema master (one per forest): Maintains the master copy of the schema. PDC emulator (one per domain): Emulates a primary domain controller for backward compatibility with Windows NT. Domain naming master (one per forest): Tracks object names throughout a forest to ensure that they're unique. Also tracks cross-references to objects in other directories. Infrastructure master (one per domain): Tracks object references among domains and maintains a list of deleted child objects. Relative identifier (RID) master (one per domain): Tracks the assignment of SIDs (security identifiers) throughout the domain. Usually, the first domain controller that you create in the first domain assumes the operations master roles. You can assign these roles to other domain controllers in the domain or forest, but only one domain controller at a time can hold each operation's master role.

View Article
Active Directory Hardware Requirements for Windows Server 2008

Article / Updated 11-07-2022

Before you arrange and use Active Directory, you need to install the operating system Windows Server 2008. Start by making certain the hardware you plan to use as domain controllers is able to run the operating system. This list shows you the minimum and recommended hardware levels for Windows Server 2008: Component Requirement Processor 1 GHz (x86 CPU) or 1.4 GHz (x64 CPU) Memory 512MB required; 2GB or higher recommended. Hard Disk 10 GB required. 40 GB or more recommended. Video Super VGA or higher video card and monitor. Hardware Must be on the Windows 2008 Hardware Compatibility List.

View Article
Active Directory Active Directory Components in Windows Server 2008

Article / Updated 11-07-2022

The range of Active Directory (AD) has expanded in Windows Server 2008 and has become an essential part of many information technology (IT) environments. Active Directory has become an umbrella for a multitude of technologies surpassing what AD was in Windows Server 2000 and 2003. Check out the new uses for Active Directory: Active Directory Domain Services: An X.500-based directory service that provides integrated authentication and authorization services for a Windows computing environment. Active Directory Lightweight Directory Services: A stripped down version of Active Directory Domain Services that focuses on providing just the directory services functionality. Active Directory Federation Services: A Web Services–based technology for providing Web single sign-on authentication services between different organizations. Active Directory Certificate Services: Provides digital certification enrollment and revocation services in the support of a public key infrastructure (PKI). Active Directory Rights Management Services: Provides a solution for managing how users can use documents that they're authorized to access.

View Article
page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16
page 17
page 18
page 19
page 20
page 21
page 22
page 23
page 24
page 25
page 26
page 27

Quick Links

  • About For Dummies
  • Contact Us
  • Activate Online Content

Connect

About Dummies

Dummies has always stood for taking on complex concepts and making them easy to understand. Dummies helps everyone be more knowledgeable and confident in applying what they know. Whether it's to pass that big test, qualify for that big promotion or even master that cooking technique; people who rely on dummies, rely on it to learn the critical skills and relevant information necessary for success.

Copyright @ 2000-2024 by John Wiley & Sons, Inc., or related companies. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.

Terms of Use
Privacy Policy
Cookies Settings
Do Not Sell My Personal Info - CA Only