Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WSH and ADSI Administrative Scripting

Buy

This book is intended to help you, the network administrator, make your job somewhat easier by teaching you to script and automate many of your administrative tasks. As you are well aware, mundane chores such as adding user, group, and computer accounts take more time than they should. The tasks of mapping network shares and creating login scripts can’t be left to end users. The best solution follows the saying, “If you want something done right, you have to do it yourself.” The concepts you will learn in this book will aid you in ensuring that the job is done right and will also free some of your valuable time by allowing you to automate some of these tasks.

Microsoft incorporated a set of interfaces known as ADSI, or Active Directory Service Interfaces, into Windows NT, Windows 2000, and the upcoming Windows XP/2002 product. These interfaces allow access to the networking structure of these operating systems as well as other LDAP-compliant network operating systems such as Novell NetWare.

Using ADSI, you have high-level access to network resources and file systems using COMcompliant scripting and programming languages. This means that you don’t need to understand the implications of COM to implement it with the scripting languages available today.

In concert with the information that you will find on ADSI, this book shows you how to use the interfaces with an easy-to-learn scripting language known as VBScript. A few examples use the JScript scripting language as well. The reason for using VBScript and JScript is quite simply that Windows Script Host (WSH), the scripting host environment used in Windows, offers built-in support for both languages. Learning either scripting language will offer you the ability to use WSH and ADSI effectively.

You will find all you need in this book to get started using WSH and ADSI to automate your administrative tasks and perform other functions as well. You will learn how to incorporate multiple jobs into one script and execute the correct job based on input parameters.

There are also two sections on security. The first deals with security of your scripts in terms of what they are permitted to do on a system. This section also discusses the process of digitally signing your scripts to ensure their validity. The second security section deals with the security of ADSI objects. Everything in ADSI is considered to be an object that exists on the system and network. These objects are the printers, drives, users, and computers that make up the network. ADSI security deals with Access Control Entries (ACEs) and Access Control Lists (ACLs), which make up the security access mechanisms for your network resources.

(HTML tags aren't allowed.)

SAP Project Management Pitfalls: How to Avoid the Most Common Pitfalls of an SAP Solution
SAP Project Management Pitfalls: How to Avoid the Most Common Pitfalls of an SAP Solution

Master the SAP product ecosystem, the client environment, and the feasibility of implementing critical business process with the required technical and functional configuration. SAP Project Management Pitfalls is the first book to provide you with real examples of the pitfalls that you can avoid, providing you with a road-map to a...

Beginning Arduino Programming (Technology in Action)
Beginning Arduino Programming (Technology in Action)

Beginning Arduino Programming allows you to quickly and intuitively develop your programming skills through sketching in code. This clear introduction provides you with an understanding of the basic framework for developing Arduino code, including the structure, syntax, functions, and libraries needed to create...

A Photographic Atlas for the Microbiology Laboratory
A Photographic Atlas for the Microbiology Laboratory

This full-color atlas is intended to act as a supplement to introductory microbiology laboratory manuals. It is not designed to replace them, nor is it intended to replace actual performance of the techniques. Rather, the photographs are supplied to help with the interpretation of results.
The third edition of the Photographic Atlas
...


The Nature and Prospect of Bioethics: Interdisciplinary Perspectives
The Nature and Prospect of Bioethics: Interdisciplinary Perspectives

Prominent bioethicists whose work is rooted in philosophy, religion, medicine, nursing, literature, history, and policy analysis join together to discuss their methods and professional insights, as well as to better define the field and its future development. Writing from the perspective of their own specialties, the authors: review just how...

SOA for the Business Developer: Concepts, BPEL, and SCA
SOA for the Business Developer: Concepts, BPEL, and SCA

Service-Oriented Architecture (SOA) is a way of organizing software. If your company’s development projects adhere to the principles of SOA, the outcome will be an inventory of modular units called "services," which allow for a quick response to change.

This book tells the SOA story in a simple, straightforward manner...

Sex Hormones and Immunity to Infection
Sex Hormones and Immunity to Infection

Why sex matters

Among human and nonhuman animals, the prevalence and intensity of infection typically is higher in males than females and may reflect differences in exposure as well as susceptibility to pathogens. Elevated immunity among females is a double-edged sword in which it is beneficial against infectious diseases but is...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy