Hi AT
So growing up, my father was an IT Pro (not networking, software developer/exec) and we always had our home network setup on an NT server with an ActiveDirectory domain. Years later as an adult, I find myself interested in the added security/control benefits of an AD Domain as I am in the planning stages of launching a little business project that will involve a network of probably 10-25 computers, a mix of Windows/Linux/maybe even a couple of Macs.
I've downloaded the trial for Windows Server 2012 and want to use my 180 days to figure out how to set up an AD domain and appropriate accompanying services, get other machines joined to the domain so that I can manage them centrally through group policy, and secure the whole thing to make it as employee/customer proof as possible (some of the machines on the network will be usable by the public as this will be a retail operation - and will therefore no doubt require a higher level of configuration to keep them secure)
I have spent a fair amount of time googling and trying to find answers to some basic questions. I have a couple to start with and will no doubt come up with others as I learn. For now:
1. When I go to set up a domain with the AD control panel, the domain name has to be a "fully qualified" domain - meaning something.something.com, for example. Why does it have to be structured like that, as opposed to just naming it "mynetworkname"?
2. If I use a virtualized copy of Win Server 2012 as my PDC, and the machine hosting it is domain joined...and I turn it off, thereby also taking the PDC offline - am I then stuck in an impossible catch 22 can't authenticate situation? And if so, is that then as bad an idea as it sounds or is there a way to make this work? For learning purposes, it is easier for me to use it as a virtualized copy rather than buy new hardware or dual boot.
So growing up, my father was an IT Pro (not networking, software developer/exec) and we always had our home network setup on an NT server with an ActiveDirectory domain. Years later as an adult, I find myself interested in the added security/control benefits of an AD Domain as I am in the planning stages of launching a little business project that will involve a network of probably 10-25 computers, a mix of Windows/Linux/maybe even a couple of Macs.
I've downloaded the trial for Windows Server 2012 and want to use my 180 days to figure out how to set up an AD domain and appropriate accompanying services, get other machines joined to the domain so that I can manage them centrally through group policy, and secure the whole thing to make it as employee/customer proof as possible (some of the machines on the network will be usable by the public as this will be a retail operation - and will therefore no doubt require a higher level of configuration to keep them secure)
I have spent a fair amount of time googling and trying to find answers to some basic questions. I have a couple to start with and will no doubt come up with others as I learn. For now:
1. When I go to set up a domain with the AD control panel, the domain name has to be a "fully qualified" domain - meaning something.something.com, for example. Why does it have to be structured like that, as opposed to just naming it "mynetworkname"?
2. If I use a virtualized copy of Win Server 2012 as my PDC, and the machine hosting it is domain joined...and I turn it off, thereby also taking the PDC offline - am I then stuck in an impossible catch 22 can't authenticate situation? And if so, is that then as bad an idea as it sounds or is there a way to make this work? For learning purposes, it is easier for me to use it as a virtualized copy rather than buy new hardware or dual boot.