F Annex 2-16
F Annex 2-16
F Annex 2-16
F Annex
2-16
F10- VIRTUALIZATION
STUDENT HANDOUT
ECC F02
(ECC)
3 APR 2013
1. LEARNING OBJECTIVES
2
Introduction
Now, the server classes during this module are designed to help you
properly plan, install, operate, and maintain data services for your
users. While the classes are going to focus on the upper layers of the
OSI model, don’t forget all of the best practices and planning
considerations that apply to our Layer 3 and Layer 2 networks.
• Print Services
• Domain Naming Service – “the phone book”
• File Shares
• Full Motion Video – Scan Eagle, Predators, Reapers
• VoIP
• Email
• Antivirus and Patching
• Chat
• Gaming
• Blogging and Social Networking
3
services are too complex to manage on a laptop, or too confusing to
operate, or even to expensive for the average user to purchase.
As was discussed during CCNA Module 1, the two types of computer networks
are Peer to Peer (P2P) and Client / Server Networks. In a P2P network,
each networked computer accesses one another to obtain permissions for
networked resources. There is no central point or control over the
network.
Now, client / server networks contain servers that hosts must access to
obtain permissions prior to accessing network resources; the network
is controlled from a centralized point, the server. In this model, a
client computer is defined as a computer or host that requests and uses
resources and information from another computer or
4
server. A server is a computer on the network that you can request
information, resources, services, and applications from.
The Marine Corps predominately uses the client / server architecture for
controlling resources on a network rather than a simple peer to peer
network. There are too many users, computers, and computer equipment on
the networks both deployed and in garrison to use a peer to peer network.
Imagine the workload it would be to individually configure 1000 computers
for file sharing.
Now, let’s analyze the client server model using the 4 characteristics
of a good network design: Fault tolerance, Scalability, Quality of
Service, and Security.
Fault Tolerance
5
In this diagram, there are two servers for email, DNS, and domain
services. The servers are located in two separate facilities separated
by a redundant layer 3 network. If one of the Techcons loses power or
is attacked by indirect fire, the users will be able to use the servers
and services running in the other facility without noticing an
significant interruption in service. A truly fault tolerant data
architecture combines all of the advantages of the lower and upper layers
of the OSI model.
Scalability
6
much more complex to maintain and administer. Thus, the Marine Corps
uses the client / server model in order to leverage powerful directory
services that can control and specify hundreds of individual computer
settings from one server and push that information out to every computer
on the network.
Quality of Service
Security
7
computer, it queries the security service on a server and receives the
authorized set of network permissions for that user. This lets the user
enter a password once, and have all of the doors opened rather than
individually logging onto every file share, printer, and other shared
resource that he or she needs.
Servers
8
Logically, they look like:
APPLICATIONS
The computer hardware and network operating system are optimized to
provide the maximum amount of resources to the services that the server
happens to be running. The most important part of the server is the
services that it is providing; it’s not the hardware or the operating
system. Furthermore, some servers can run multiple services:
AUTHENTICATION
SECURITY /
CHAT
DNS
WEB
(WINDOWS, UNIX)
COMPUTER HARDWARE
(RAM, CPU, DISK SPACE)
9
Additionally, servers have a very limited ability to run applications.
Most servers do not have Microsoft Office, games, or other applications
installed because the programs compromises the server’s ability to
provide resources to the other computers in the network. If an
administrator installed a resource intensive videogame on a server, how
responsive to DNS queries do you think the server would be?
Service Planning
Furthermore, some basic services, like DNS, are required for other
services to work. For the Mojave Viper exercise, you will need to plan
for DNS to support the email and webpage requirements. If you cannot
access a DNS service across a WAN, you will end up running your own DNS
service for your network. Depending upon the physical capacity of the
server, it may be able to run more than one service. Some powerful
servers can run everything (DNS, email, chat, web) at the same time and
other older servers may only be able to run one service at a time.
Finally as you begin to look at planning services, ensure that the four
characteristics of a good network – scalability, fault tolerance, quality
of service, and security are being factored in. A network with one
monstrously powerful server running all of the required servers may be
very simple, but is not very fault tolerant or scalable.
Service Framework
Now, the foremost question in your mind is probably, “How does the Marine
Corps and network planners manage and plan for these services?” The
Marine Corps uses a directory service to manage all of the resources and
services present in the network. All of the services, printers,
computers, users, applications, and everything else in the network
comprise a directory. A directory service is a shared information
structure used to locate, manage, administer, organize, and secure those
objects that comprise a directory.
10
There are two industry standards that exist to manage directory services.
They are the X.500 Directory Access Protocol and the Lightweight
Directory Access Protocol. Both directory access protocols provide a
set of rules and standards that organize directories and create a
standard interface to allow clients to access the directories. X.500 was
the original standard, based on the OSI model, and very resource
intensive. It ran on mainframes and was too complex to operate using
desktops and over the Internet so the Lightweight Directory Access
Protocol (LDAP) was designed.
LDAP is a much more compact protocol, designed around the TCP/IP model,
that allows for faster searches of the directory service because it
requires much less network overhead. Microsoft’s Active Directory uses
the LDAP protocol as the foundation for its directory services agent.
The Marine Corps uses Microsoft Active Directory as its directory
service agent.
Servers running Microsoft Active Directory Services share the same common
database of all resources and services on the network. Web pages, chat
service, email, DNS, DHCP, and many other services can all be easily
managed within Active Directory. Active Directory is one logical
directory that can exist on as many different physical servers as the
network planner wants. Information entered into one server is quickly
replicated to every other server running Active Directory in your
architecture. This means that if one server crashes, it will only have
a minor effect on your network. Microsoft Active Directory is easily
installed, modified, and configured by administrators and carries built
in security.
The server classes during this module will provide you the tools that
you need to properly evaluate and plan for the services that your users
will require. The framework for planning these services is tied to
understanding the capabilities and limitations of Active Directory. At
the end of this series of classes you will be able to properly plan,
install, operate, and maintain data services for your users.
11
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM,
CALIFORNIA 92278-8251
STUDENT HANDOUT
ACTIVE DIRECTORY LOGICAL STRUCTURE
ECC F03
(ECC)
3 APR 2013
1. LEARNING OBJECTIVES
3. Without the aid of reference, define Security Groups, per the MCTS
Training Kit, Configuring Windows Server 2008 - Active Directory (Exam
70-640), Network Infrastructure (Exam 70-642), and Applications
Infrastructure (Exam 70-643). (0602-PLAN-1105hk)
5. Without the aid of reference, define Domain, per the MCTS Training
Kit, Configuring Windows Server 2008 - Active Directory (Exam 70-640),
Network Infrastructure (Exam 70-642), and Applications Infrastructure
(Exam 70-643). (0602-PLAN-1105hm)
6. Without the aid of reference, define Tree, per the MCTS Training
Kit, Configuring Windows Server 2008 - Active Directory (Exam 70-640),
Network Infrastructure (Exam 70-642), and Applications Infrastructure
(Exam 70-643). (0602-PLAN-1105hn)
7. Without the aid of reference, define Forest, per the MCTS Training
Kit, Configuring Windows Server 2008 - Active Directory (Exam 70-640),
Network Infrastructure (Exam 70-642), and Applications Infrastructure
(Exam 70-643). (0602-PLAN-1105ho)
2
Introduction
Active Directory has its own distinct terminology. We will look at the
components of Active Directory from smallest to largest in order to
build our understanding.
• Objects
• Schema
• Groups (Distribution and Security)
• Organizational Units
• Domains
• Trees
• Forests
3
Active Directory Terms
The network administrators can add, modify, and delete attributes from
objects, depending upon the requirements.
4
The collection of objects and their attributes is called the Active
Directory Schema. The Schema is created and maintained by network
administrators and there is only 1 schema per active directory instance.
For example, every user object in the NMCI Active Directory structure is
defined with the same attributes. In another instance of Active Directory
in a deployed environment, all of the printers in Iraq share the same
attribute definitions. However because the NMCI domain and the deployed
domains are separate instances of Active Directory, there is no way for
a user in Iraq or Afghanistan to see the attributes of all of the NMCI
users or any other instance of Active Directory.
For example at communications school, each of the ECC students has been
associated with their Conference Group in Active Directory. Permissions
were then applied to the conference group to allow access to the shared
drive and CG folder.
Here is a screen capture showing the 4 security groups that the ECC
students are placed into. The security groups are shown in red.
5
The below screen capture shows how the groups were assigned specific
folders with specific permissions. For conference group 1’s shared
folder, these groups were given specific permissions:
6
As a network planner, you should create security groups to give your
users permissions and access equal to their responsibilities. Most of
your general users should not have permissions to do anything but access
their shared folder structure. For example, most of you are only members
of one security group giving you access to the shared drive and your CG
folder. If you tried to log onto a server in the CS network, you would
not be able to as you do not have the correct permissions because you
are not a member of the right security groups.
Inside of 3/5’s top level OU, the data Marines can add as many different
OUs as they want to more easily organize the users, computers, printers
and other objects along with the distribution and security groups. While
your Marines may not have permissions to modify some of the other
logical structures in Active Directory, they should always be able to
fully control their OU and what happens inside of it. There are many
different ways to organize objects using OUs. You can organize objects
by type, by location, by staff function, by rank, or just about anything.
When you or your Marines are developing your OU structure, make sure
that it makes sense and that you can easily find and add objects. Having
too few OUs can lead to confusion and if you are using too many OUs, you
can “lose objects”
7
and forget into what container you put them (this can lead to security
and permissions issues).
The best way of using OUs is to start with grouping your objects by
function or location and then break the sub-OU structure down from there
as you see fit. In the example diagram above, 3/5 was given its own OU
by the RCT. Inside that OU, sub-OUs were created for each company and
staff section, and inside that one, objects were sorted into users,
computers, and printers. So if you were looking to modify a computer in
India Company, you would open 3/5s OU, then India Co, then the computers,
and all of the computers in the company would be listed there without
having to sort through a list of all of the 200 computers in the
battalion.
In this screen capture, the OUs are shown on the left and the objects in
the OU are shown on the panel on the right. You can see that you as
students are members of the ECC Students OU, which falls under the BIG
(Basic Instructor Group) OU. The computers in the classroom fall under
the OU of BIG Student Machines. OUs are an excellent way of organizing
and categorizing objects within Active Directory and are the area where
you will have the most impact as a data planner in networks where you
don’t directly administer the servers.
8
Domains: The cornerstone element of Active Directory is called a domain;
it is the grouping of all objects that share common resources, services,
and administration. All of the computers, users, groups, and OUs within
a domain share a common security database and permissions hierarchy. As
a domain administrator, you have some higher level permissions and
access to change most of the logical structure inside Active Directory.
As such, domain level permissions should be tightly controlled.
Sometimes for exercises, you will stand up and run your own domains.
Many battalions run their own NIPR and SIPR domains during Mojave Viper.
In a more complex environment, the MEF, Division, or RCT may run the
domain and have the infantry battalions use Organizational Units in their
domains.
Below is a screenshot from Comm School. The domain for comm school is
cs.usmc.mil. All of the OUs, groups, and objects that we have already
covered are members of a domain.
9
root domain. Any subsequent domains created from the first domain are
known as child domains.
.usmc.mil
13meu.usmc.mil
cs.usmc.mil mnf-wiraq.usmc.mil
aa.mnf-wiraq.usmc.mil
All domains in the tree share the same domain namespace as well. In the
above diagram, the root domain is .usmc.mil. All of the child domains
expand on this namespace by adding their domain name in front of their
parent. The mnf-wiraq domain has the namespace of mnf- wiraq.usmc.mil.
Its child follows the same rules – aa.mnf- wiraq.usmc.mil. The DNS
namespace is contiguous across all of the child domains because the DNS
queries follow the same path as the domain structure does. DNS queries
are forwarded from the child domains up to the root domain and then to
the appropriate domain.
10
To review, domain trees start with the root as the first domain
established. All other domains from the root are child domains. All
parent and child domains share the same DNS namespace and Active
Directory Schema.
Most of the services for a data network are established and controlled
at the domain level. DNS, web pages, chat, and file shares are configured
within Active Directory and managed at the domain level. Email is another
service that is managed at the domain level. Permissions and access to
these services and resources is assigned to security groups. If you are
running your own domain, you and your Marines will have ultimate control
over all services. For a domain managed by the RCT or higher, you will
have to request services and ensure that your users have the appropriate
access to carry out their tasks and fulfill their requirements. You
will have the same access to the services, just less control over how
they are established and maintained.
11
Below, two examples of Active Directory Forests:
This first diagram should look familiar, its just like the parent child
domain tree diagram pictured earlier in the handout. In this example of
the Forest, the child domains are all part of the same domain tree as
the forest root. As such they not only share the same schema but also
the same DNS Namespace.
In this diagram, all of the four domains in the forest are separate
trees. In this example, all four domains share the same schema but they
do not share the same DNS namespace. Each of the domains here is the
parent of a separate tree and can have unique names and they do not
take the DNS namespace of the forest root. The only thing that domains
have in common in this structure is the shared schema.
12
Enterprise wide services are coordinated and ran at the forest level.
While each domain in the forest manages its own DNS namespace, planners
at the forest level have to ensure that DNS transfers and zones are
transparent throughout the forest. If DNS is configured incorrectly
between two domains, there will be problems with a lot of the other
services that exist on the data network.
As such forest level planners have ultimate oversight over all the
services that exist inside the Active Directory Infrastructure. They
ensure that web pages and other shared resources are available for access
to the appropriate users in all the domains and look to prevent service
conflicts between domains. Managing a complex Active Directory Forest
is much more complicated than administering a domain or even a simple
OU.
Trusts
We have learned that domains are the basic security boundary in Active
Directory. There are very few forest level enterprise permissions that
extend beyond the domain. This poses problems for the data planner
because he or she has to figure out how the users in the domain can
access resources outside of the domain. For example, air mission planners
at Camp Leatherneck, using computers on a Marine Corps domain, need to
have to access aviation planning rules and documents on an Air Force
SharePoint web server in Bagram in a separate instance of Active
Directory. Planners can solve these cross domain and forest access
problems by understanding how trusts work inside Active Directory.
13
There are six different types of trust relationships in Active
Directory:
• Parent / child
• Tree / root
• External Trusts
• Shortcut Trusts
• Realm Trusts
• Forest Trusts
Parent / Child
Parent / Child trusts exist between parent and child domains in the same
domain tree. These two-way transitive trusts allow security principals
to be authenticated in any domain in the forest. These trusts are created
by default and cannot be removed.
Tree / Root
Tree / Root trusts exist between all domain trees in the forest. These
two-way transitive trusts allow security principals to be authenticated
to any domain in the forest. These trusts are created automatically and
cannot be removed.
External Trusts
An external trust is created when data planners want to allow users from
different domains, but NOT in the same forest, to share resources. This
trust can be one-way or two-way depending upon security considerations.
In the Marine Corps, external trusts are used to link together Windows
New Technology (NT) domains with Windows Active Directory domains. Bottom
line, there are still a few NT domains around the Marine Corps, but
your likelihood of encountering one is relatively small.
Shortcut Trust
14
In this diagram, we see that a shortcut trust was created between the
aa domain and the 13meu domain. Since parent / child trusts and tree
/ root trusts exist inside the forest, we know that each domain already
trusts every other domain. So, why is a shortcut trust necessary? It is
necessary because trusts work just like DNS. So a user in the aa domain
has to query his parent domain of mnf-wiraq which has to query its
parent usmc.mil which then has to query 13meu to get access to the
resources. This process can use up a lot of bandwidth and cause
noticeable delay for the users, so shortcut trusts bypass this hierarchy
and allow users from aa and 13meu the ability to directly query resources
and services from each other without having to waste bandwidth and the
users time. These trusts form logical shortcuts between domains.
Realm Trusts
Forest Trusts
Forest trusts are trusts between two separate Active Directory Forests;
however, this will only work for forests that operate at the Windows
Server 2003 functional level or higher. Forest trusts can be
1 or 2 way trusts depending upon network security considerations. In the
example at the beginning of the trust section, if the Marine Corps forest
trusted the Air Force Forest, the aviation planners could easily access
documents and resources out of the Bagram web server. Forest trusts are
also used in the civilian world during corporate mergers.
Inside a Marine Corps forest, trusts are a natural way of doing business.
Only rarely do network planners in the Marine Corps establish trusts
outside of the Forest and usually those trusts are to other Marine Corps
or Navy domains. For example, for a MEU embarked on naval shipping,
trusts could be established between the Marine Corps and Navy domain to
allow everyone to have access to the shipboard file storage and
printers. The network planner has to balance the gains from the trust
against the vulnerabilities that introducing another organization would
entail.
15
The diagram below provides a visual depiction of each type of trust:
16
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM,
CALIFORNIA 92278-8251
STUDENT HANDOUT
MICROSOFT ACTIVE DIRECTORY – PHYSICAL STRUCTURE
ECC F04
(ECC)
22 OCT 2013
LEARNING OBJECTIVES
1. Without the aid of reference, define Domain Controller (DC), per the MCTS
Training Kit, Configuring Windows Server 2008 - Active Directory (Exam 70-
640), Network Infrastructure (Exam 70-642), and Applications Infrastructure
(Exam 70-643). (0602-PLAN-1105hq)
4. Without the aid of reference, state the purpose of the Active Directory
Schema Master, per the MCTS Training Kit, Configuring Windows Server 2008 -
Active Directory (Exam 70-640), Network Infrastructure (Exam 70-642), and
Applications Infrastructure (Exam 70-643). (0602-PLAN-1105hu)
5. Without the aid of reference, state the purpose of the Active Directory
Domain Naming Master, per the MCTS Training Kit, Configuring Windows Server
2008 - Active Directory (Exam 70-640), Network Infrastructure (Exam 70-642),
and Applications Infrastructure (Exam 70-643). (0602-PLAN-1105hv)
6. Without the aid of reference, state the purpose of the Active Directory
Relative Identifier (RID) Master, per the MCTS Training Kit, Configuring
Windows Server 2008 - Active Directory (Exam 70-640), Network Infrastructure
(Exam 70-642), and Applications Infrastructure (Exam 70-643). (0602-PLAN-
1105hw)
7. Without the aid of reference, state the purpose of the Active Directory
Primary Domain Controller (PDC) Emulator, per the MCTS Training Kit,
Configuring Windows Server 2008 - Active Directory (Exam 70-640), Network
Infrastructure (Exam 70-642), and Applications Infrastructure (Exam 70-643).
(0602-PLAN-1105hx)
8. Without the aid of reference, state the purpose of the Active Directory
Infrastructure Master, per the MCTS Training Kit, Configuring Windows Server
2008 - Active Directory (Exam 70-640), Network Infrastructure (Exam 70-642),
and Applications Infrastructure (Exam 70-643). (0602-PLAN-1105hy)
9. Without the aid of reference, state the purpose of the Active Directory
Global Catalog Server, per the MCTS Training Kit, Configuring Windows Server
2008 - Active Directory (Exam 70-640), Network Infrastructure (Exam 70-642),
and Applications Infrastructure (Exam 70-643). (0602-PLAN-1105hz)
10. Without the aid of reference, define a Site, per the MCTS Training Kit,
Configuring Windows Server 2008 - Active Directory (Exam 70-640), Network
Infrastructure (Exam 70-642), and Applications Infrastructure (Exam 70-643).
(0602-PLAN-1105ia)
2
11. Without the aid of reference, define a Site Link, per the MCTS Training
Kit, Configuring Windows Server 2008 - Active Directory (Exam 70-640),
Network Infrastructure (Exam 70-642), and Applications Infrastructure (Exam
70-643). (0602-PLAN-1105ib)
12. Without the aid of reference, describe the Replication Process, per the
MCTS Training Kit, Configuring Windows Server 2008 - Active Directory (Exam
70-640), Network Infrastructure (Exam 70-642), and Applications
Infrastructure (Exam 70-643). (0602-PLAN-1105ic)
13. Without the aid of reference, state the purpose of a Bridgehead Server,
per the MCTS Training Kit, Configuring Windows Server 2008 - Active Directory
(Exam 70-640), Network Infrastructure (Exam 70-642), and Applications
Infrastructure (Exam 70-643). (0602-PLAN-1105id)
14. Without the aid of reference, state the purpose of the Knowledge
Consistency Checker (KCC), per the MCTS Training Kit, Configuring Windows
Server 2008 - Active Directory (Exam 70-640), Network Infrastructure (Exam
70-642), and Applications Infrastructure (Exam 70-643). (0602-PLAN-1105ie)
15. Without the aid of reference, state the purpose for Directory Service
Remote Procedure Call (DS-RPC), per the MCTS Training Kit, Configuring
Windows Server 2008 - Active Directory (Exam 70-640), Network Infrastructure
(Exam 70-642), and Applications Infrastructure (Exam 70-643). (0602-PLAN-
1105if)
16. Without the aid of reference, state the purpose for Inter-Site Messaging
- Simple Mail Transfer Protocol (ISM-SMTP), per the MCTS Training Kit,
Configuring Windows Server 2008 - Active Directory (Exam 70-640), Network
Infrastructure (Exam 70-642), and Applications Infrastructure (Exam 70-643).
(0602-PLAN-1105ig)
3
Introduction:
This lesson will focus on the key physical roles and basic planning
considerations for designing an Active Directory Forest and Domain.
It will examine key roles and services that are needed to maintain the
one logical Active Directory Database and ensure that it is fault
tolerant, scalable, supports quality of service and is secure.
For example, for a MEB domain, the first three domain controllers in
the MEB domain may be 1MEBN01C, 1MEBN02C, and 1MEB03C. The C at the
end of the name designates the server as a domain controller. The
format reads, from left to right, “Domain Name (1MEB)” – “NIPR or SIPR
designation (N/S)” – “Sequential Numerical Identifier (01)” – “Domain
Controller, Exchange Server, or Member Server Designator (C/E/R)”.
4
The schema partition has a copy of the schema of the forest.
The configuration partition defines the physical structure of
Active Directory – the servers and the roles that they play.
Finally, all domain controllers have a domain partition where
they keep a copy of all of the objects in the domain.
There are 5 FSMO roles. Two of these roles are unique within the
forest, and three are unique in each domain. These unique roles mean
that only one server holds each role, there are no back ups. The two
unique forest level roles are the Schema Master (SM) and the Domain
Naming Master (DM). The three unique domain level roles are the
Relative Identifier Master (RID master), Primary Domain Controller
Emulator (PDC emulator), and the Infrastructure Master (IM). There
may be multiple servers in the domain – but 2 of the 5 are unique
instances per forest and the other 3 are unique instances per domain.
5
The reason ‘flexible’ is used as part of the title of the role comes
from the fact that an experienced administrator can transfer these
roles between servers, however this is not encouraged. Move the FSMO
roles only as a last resort. Now that the 5 Flexible Single Operations
Master Roles have been introduced, they will be examined in detail.
Schema Master
The Schema Master role is usually found upon the first domain
controller in the forest. It controls the master list of objects and
attributes in the Active Directory structure. The schema is how you
describe objects. For example, to describe users, we include their
first name, last name, middle initial, rank, phone number, etc. We
would not want to escribe users by their height, weight, and eye
color- they would be difficult to find (imagine searching for Lt Ochoa
in the GAL- brown hair, 190lbs…, it would not be easy).
6
In this diagram, the Schema Master and Domain Naming Master are
located on 2MEBN01C. The forest root domain is 2MEB.USMC.MIL. When
GCEFWD.2MEB.USMC.MIL was created, the domain naming master had to be
available to record the addition of the domain and add it to the
forest. Now that we have looked at the forest level FSMO roles, the
domain level FSMO roles will be examined.
Every object in the domain has a unique Security Identifier (SID) that
identifies the object and the permissions it has. It is composed of 2
numerical parts. The first part of the SID is domain specific – every
object in the domain has an identical first half of the SID. The
second half of the SID is unique and assigned by the RID Master. The
RID master functions by creating unique new blocks of RIDs and then
assigning them to each domain controller in the domain. When a user
account, or any other object, is created on that domain controller, it
will use up one of the RIDs that it was given to form the complete
SID. Once the server uses up its block of assigned RIDs it requests a
new block from the RID master. If the RID master is unavailable or
down, then new objects cannot be added to the domain once the domain
controllers use all of their previously assigned RIDs.
7
Primary Domain Controller (PDC) Emulator
Finally, the PDC emulator acts as the domain master browser. When you
open a network in Windows, you see a list of workgroups and domains,
and when you open one of the workgroups or domains, you see a list of
computers. These lists are called ‘browse lists.’ The PDC Emulator
combines all the browse lists from each network segment to form a
master browse list that an administrator can navigate in order to
centrally manage his domain.
8
For both the MEB and the RCT, the 02C domain controller is running the
3 domain level FSMO roles. Several Microsoft best practices for
establishing your forest and domain structure follow:
Global Catalog
9
for a printer only has to go to his local domain controller to find
the record, and not travel across a WAN link to find the information.
10
Sites in Active Directory
Sites are then connected to other sites via WAN links. Sites are used
to control logon traffic from users in the site, consolidate
replication, and facilitate service localization. The most important
function of a site is that it ensures that users logon and
authenticate to domain controllers on the LAN rather than traveling
across a low speed, low bandwidth WAN link. Because users log on
locally, the log on time is significantly reduced. Sites also control
replication because any changes within the site are made locally and
then replicated across the WAN.
11
There are 3 sites in the GCEFWD domain, the RCT and the two
subordinate battalions. If an artillery battalion or other GCE unit
were added to the T/O of the RCT, a separate site could be created for
each of the units.
The subnets listed on the diagram per site come from your VLANs and
subnetting plan for your IP address scheme. The same networks listed
on your WAN diagram should also appear on your Active Directory
Diagram. All sites must be associated with subnets, not just for the
Server VLAN at the site, but also for all of the user and C2 VLANs.
This is important because much of the traffic for Active Directory
objects and queries comes from all of the users’ computers.
Nonetheless, ensure that at a minimum your Server VLANs are listed.
12
Here is a screenshot from a different Active Directory Forest with
sites and subnets fully established:
You can see in the above capture that each site had two domain
controllers. The subnets are shown in the subnet folder. One of the
subnets has been opened to see the name and the site that it has been
associated with. This forces all of the computers in that IP address
range to authenticate to the domain controllers in the RCT’s site.
13
Replication connectors across the WAN are configured between sites and
contain costs and intervals. The cost is a logical representation of
the bandwidth available over the WAN link and the corresponding delay.
A higher cost link means a lower bandwidth and a higher delay. Active
Directory will build its replication topology using the lowest costs
available. Administrators can also define the replication interval –
sites will attempt to replicate changes at the interval specified –
immediately, every 5, 15 min, etc... Costs are also cumulative, so all
of the replication connectors in between the two sites are factored
into the replication topology. In your Active Directory diagram you
produce here at ECC, cost will not be a requirement to depict because
at the Regiment and lower levels default site link costs are typically
used. At larger organizations, MSC level and higher, cost is
typically shown on site links.
Let’s take a look at the diagram again and focus on the GCE domain and
look at replication.
To create the costs and decide upon a replication interval, you should
factor in the bandwidth, delay, number of hops, and other factors.
Given the costs above, there will be no replication directly between
1/6 and 2/6. Both of them will replicate their changes to the IP
bridgehead at RCT and then it will send them to the other site because
14
the cumulative cost of replication is less than the cost assigned to
the direct replication connector. If the bottom cost was lowered to
900 or below, 1/6 and 2/6 would start to replicate directly with one
another.
Now that Active Directory Sites have been defined, and the IP
Bridgehead servers selected, the next step is to select the type of
replication that the bridgehead will use to replicate with bridgeheads
in other sites.
Bottom line, utilize DS-RPC due to the fact that is less complex to
configure, however, ensure that you plan for replication to occur
during off peak usage in order to conserve bandwidth.
15
On this diagram, the replication type has been annotated in the
legend.
One of the most important services to the user and Active Directory is
DNS.
DNS
16
Here is an example of an internal query for DNS.
The third way is Active Directory Integrated, where changes are made
on any domain controller or DNS server and replicated to the other DNS
17
servers in the domain. This is the preferred method of running DNS
servers in the Marine Corps. This eases the burden of the network
administrators inside a domain from keeping track of primary and
secondary zones. In an Active Directory integrated zone, any DNS
server can make changes to the DNS records and all of the DNS servers
have the change replicated to them. Integrated zones only apply
inside a domain, so for faster external lookups secondary or stub
zones can be loaded for other Domains in the forest.
The fourth way is called a stub DNS zone. Stub DNS zones just contain
the DNS records for DNS servers from another domain in the forest.
For example, in our network, the primary GCE DNS server, N01C may have
stub zones for the ACEFWD and LCEFWD domains so that it can send
queries for DNS records in their domains directly to them without
forwarding traffic to the forest root DNS server. This works much
like establishing a shortcut trust to cut down on the overhead
required to query adjacent DNS servers.
The Marine Corps has gone away from Primary and Secondary DNS zones
and now uses Active Directory integrated zones wherever possible. It
is up to the network planner to decide whether or not to configure
stub or secondary zones for the other domains. Not using stub or
secondary zones increases DNS query overhead but reduces replication
traffic. Secondary zones greatly decrease DNS query overhead over WAN
links but increase the replication traffic. Stub zones offer a good
compromise between the two.
DHCP
Remote Access
Remote access does not apply for 90% of the networks that you will
utilize in the fleet. Firewalls will block all requests to
authenticate to the domain from external users. However, Active
Directory does support the functionality to allow remote access and
VPN connectivity.
Print Servers
A domain controller can serve as the print server for all of the
network printers. Rather than mapping every user individually to
printers and installing drivers on every computer, users can point to
18
the print server and use the print server to communicate with their
desired printer. They just search Active Directory for their desired
printer and make it the default, and the print server takes care of
the rest. The server checks Active Directory to see if the user has
permission to print to the server and then adds the document to the
queue for the printer to process.
File Services
Servers, Filers, and computers can all serve as network shares for
files. Domain controllers manage the permissions for user access to
files and folders on the shared drive.
Anti-Virus / Patching
Depending upon the number of servers that are available, the Antivirus
/ Patching roles can be run on a Domain Controller or member server.
Best practice recommends deployment on a member server, but if you are
limited, it is better to place the role on a Domain Controller rather
than not planning for it at all.
Web Services
19
Conclusion
We have covered many of the roles and services that can be employed on
domain controllers and servers. The different roles and services
available offer the data planner a lot of flexibility in tailoring the
services offered to the requirements of the users. The most important
takeaway remains that the data planner plans services to support the
user and bases the Active Directory design on user requirements.
Here is the sample Active Directory Diagram that we have used during
this class for you to look at one more time.
An astute observer will notice that there are no email servers on this
diagram. There are follow on classes that will go into detail in how
to plan both web servers and email servers to support your users in
your Active Directory Forest.
20
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM,
CALIFORNIA 92278-8251
STUDENT HANDOUT
PLANNING A MICROSOFT ACTIVE DIRECTORY INFRASTRUCTURE
ECC F05
(ECC)
27 APR 2013
LEARNING OBJECTIVES
Introduction:
Planning Considerations
2
There are several key planning considerations to start the
brainstorming process including:
Simplicity
3
Fault Tolerance, Scalability, QOS, and Security
Remember to examine the network and your plan not just from the
administrator’s perspective but also from the user’s viewpoint.
Remember that the purpose for Active Directory is to provide
services for the user. Any comprise to the Active Directory
infrastructure should be made in favor of the user, not against
4
them. Quality of Service must be balanced against all of the other
factors used to plan the Active Directory Infrastructure.
5
power and HVAC capacity of the different units when planning to
employ servers.
Available Equipment
A data planner must assess the knowledge of the Marines that will
be installing, operating, and maintaining the equipment. If
advanced or complicated aspects of Active Directory are employed,
the Marines should be sent to the training ahead of time or trained
on a test network. Employing advanced techniques with
inexperienced or untrained Marines on a production network can
cause problems for you and the users. Keep the network design and
topology within the Marines’ training and experience.
The one domain model works best with a single administrative staff
managing the servers, common security policies, and FSMO roles.
However there are times where multiple domains may be
6
preferred. The following are some of the main reasons to employ
multiple domains in your Active Directory Structure:
• Keep the schema master and forest root domain separate for
stability (No users on forest root domain)
• Different domain level security policies
• Decentralized administration
• Different DNS namespace
The above reasons are listed with the most important considerations
first. For a permanent Active Directory infrastructure, Microsoft
recommends a forest root domain that does not contain any users.
The domain exists to allow one group of administrators to define
a common security policy for the forest, manage the Schema and
Domain Naming Master FSMO roles, control the DNS namespace, and
provide an additional layer or security and control over the
infrastructure. Child domains are created from the forest root
domain to manage users. The domain structure for Marine Corps
networks in Iraq used this concept.
The MNF-WIRAQ domain was the forest root domain for the Marine
Corps Active Directory infrastructure and was managed by the MEF
G-6 and the Communications Battalion to provide overall security
policies and control for all of the MNFW networks. However for
most exercises and short term operations, a separate domain for
the forest root is usually not created.
7
administration of the Active Directory infrastructure. Current
practice in the Marine Corps is that each component of the MEF
will run their own domain – the CE, GCE, ACE, and LCE all will be
child domains from a MEF run forest root. This gives freedom and
flexibility to each one of the subordinate G-6s to plan their own
networks to support the needs of their Generals. Each of the MSCs
has communications squadrons, battalions, and companies to
centrally manage the core of their domain and has the freedom to
adjust the domain topology to fit the needs of their units and
operating tempo.
There are several basic rules to follow. Keep the number of domains
to a minimum. Infantry battalions do not need their own domains to
manage. You will have many other things to occupy your time and
effort than worrying about FSMO roles. Let the Marines and
Communication Officers at the Communications
8
Company, Battalions, and Squadron level worry about controlling a
domain.
Once a site has been created, all of your users need to be placed
in an OU that your Marines can control and manage. From this OU
structure you can organize the objects in your battalion how you
see fit, control and manage security and access to file shares.
With a separate site and OU, you will have all of the administrative
control you need to be responsive to your commander and users needs
without wasting the equipment, resources, and time of your Marines.
9
An Active Directory diagram that incorporates this concept looks
like the following:
Installation
10
The diagram below shows the wrong way to install a domain
controller at a site.
11
arise. This method is the best way to quickly and safely add
servers to the domain.
Site Replication
Take a look at this diagram. The delay depicted comes from the WAN
diagram which ultimately reflects the delay of the transmission
equipment:
12
Active Directory uses the cumulative value of costs between sites
to develop its replication topology. In this diagram, because costs
are configured incorrectly and replication will occur over low
bandwidth, high delay links from MEF to the MAW and the MARDIV.
Look at the below diagram and see if you can see how replication
traffic would be better configured to flow in this network:
13
operations by enclave and service. Take a look at the below
priorities:
All of the server tasks fall into the same Appendix as the
networking tasks. Many of the server tasks can fall under
coordinating instructions. Remember to use some of the Microsoft
best practices in the installation and operation phases and to
factor in your Commander’s priorities.
14
The C4 Application List is a required document for the USMC
Certification & Accreditation package (this will be covered
further in depth in H Annex, Information Assurance).
Active Directory manages more than objects in the domain,
but also the services that operate within the domain. Thus,
the list is an important reference to consult when ensuring
that Active Directory security policies have been established
that will allows the users to access the services they need
when they need them.
15
Sample Tasks:
Attach one DDSM from 1MEB.
Establish a domain for RCT-7.
PIOM the RCT-7 server architecture.
Establish an OU structure for RCT-7.
Terminate a site link connector between the 1st MEB IPBH
server and the RCT-7 IPBH server.
16
UNITED STATES MARINE CORPS
TRAINING COMMAND
COMMUNICATIONS SCHOOL
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
ECC F06
4 APR 2013
1. LEARNING OBJECTIONS:
Introduction
The last series of classes introduced Microsoft Active Directory and its
physical and logical components. This class will cover the planning and
implementation of creating and managing web sites, FTP servers, and other
web based functionality to further add to your ability to serve as a
network planner.
The Marine Corps uses web servers as log books, personnel databases such
as MOL, intelligence databases such as MarineLink, for tactical purposes
like Significant Event Logs and battle tracking, for Network Monitoring,
staff collaboration, and many more functions as the military becomes
more net centric.
The Marine Corps uses IIS as a platform for supporting web sites and
other web resources. Almost any Microsoft Operating System from NT
forward has built in functionality supporting IIS. You can host a web
page from your laptop or desktop at home if you are using a Microsoft
OS. The Marine Corps uses IIS to manage web pages, for FTP service, and
as the foundation for email transport.
2
When a user goes to a webpage, the computer establishes a connection
with the web server and downloads the web page. It is transparent to the
user whether the web server is running IIS or Apache as the support
framework for the web page. For example, upon surfing to a web site a
user sees:
A computer running IIS can host multiple web and FTP sites. In the screen
capture above, you can see that there are 2 web sites that this server
is hosting. All of the functionality to configure that web site can be
found by right clicking on the web site name or selecting one of the
features or plug ins on the left in the default site home box. This
console is the central point in managing a website, its built in
functionality, and any other plug-ins and advanced features.
3
Many web pages are written using Hypertext Markup Language (HTML) that
is based around text supplemented with interactive forms, embedded images
and videos and other objects. The plug ins and functionality present in
IIS provides the foundation for the user’s interactive experience with
the web site. If the HTML code calls for features or settings that the
administrator has disabled in IIS, then the web site will not function
properly.
The /S stands for the secure service. For example IIS supports both HTTP
and HTTPS protocols as well as offering secure shell support for POP3
and IMAP v4. These protocols are managed by through the IIS Manager
Console. Some services are disabled by default and some are enabled.
Ensure that only the services and protocols that you are going to use
are activated and the rest turned off to provide a harder surface for
network defense.
4
qualified domain name or IP address, folders, document and language.
An example of a URL is shown below:
An https URL would start out with https://. The server name can be its
DNS name or its IP address. When you use a domain name in the URL,
your computer will query a DNS server to resolve the domain name to an
IP address. The second half of the URL specifies where on a particular
server the webpage exists. URLs work the same way for FTP sites as well.
In the case of FTP, the second half of the URL is the location where the
files will be downloaded from or two using FTP.
When a computer sends the URL to the server the server responds to the
request with the actual page and the HTML, APSX, or other code is
translated into the graphics and text in your web browser.
In the Marine Corps, IIS is most often found running on web servers and
Exchange Servers. The Microsoft Exchange E-mail Server uses the protocols
and functionality inherent in IIS to transport mail messages. The
second place that you will see IIS ran is on web servers hosting web
pages for your unit.
In its capacity to serve as a web server, the best place for IIS to run
is on a member server that is not running any Active Directory roles or
other vital roles in your services infrastructure. This becomes
especially paramount when the web server is made accessible by the
Internet. For security purposes and access control many Marine Corps web
pages only run internal to a unit.
Using IIS and making your web server accessible to the rest of the world
on the Internet opens vulnerabilities in your network that you
5
must work to mitigate and protect against. Risk like hackers or
unauthorized personnel retrieving sensitive or confidential files from
your server, allowing outsiders unauthorized system access, suffering a
denial of service attack. A major risk is having the whole web page
hacked and changed without you knowing about it.
Good IIS security practices will help to mitigate these threats. Here
are some basic countermeasures:
Physical and system security mean protecting the web server from
authorized access within your site, FOB, or location. This will prevent
a malicious user from logging on to the server directly. Network and
application security mean using firewalls, Access Control Lists, and
antivirus programs to block ports and protocols that are unneeded by
users. This helps restrict access to your web server from the Internet.
Your web server should be running a firewall and a good antivirus program
on itself to serve as a last ditch defense against malicious activities
and threats. Auditing is another important way to protect your web
server. One of your data Marines should be checking the error and
service logs of the computer every day, looking for changes, errors, and
problems that happen to the IIS service. For example, if a hacker got
into your web page and changed everything on the web page, the computer
logs would show the IP address and user name where the changes came
from along with the time and changes that were made to the system. If
the hacker was very good, the audit logs may be the only place where a
record was left of his or her presence.
Inside IIS you can configure settings that force your users to log into
the web site, support only HTTPS connections, and other measures to make
it harder for the hacker to gain access to the system or the information
inside of it. The following picture shows some of the different roles
and options that you can secure, turn off, or utilize to make your web
server a harder target:
6
These options allow the Data Marines to specifically harden the different
components in IIS and on the website.
External web servers are much more difficult to employ. Since it will be
accessible from the Internet, it means that it must be hardened to
protect against attacks. An external web server is usually a stand alone
server that has no other services or roles running on it so nothing vital
will be compromised in the event of an exploit.
7
The external web server can then be placed outside the firewall on the
network or inside the firewall depending upon the information security
plan. Placing the external web server in the DMZ in front of the firewalls
makes configuring the packet filtering rules on the firewall easier than
opening holes in the firewall for external users to get to the web
server.
8
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL TRAINING
COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
ECC F07
(ECC)
28 APR 2013
LEARNING OBJECTIVES
2
Introduction
Email Review
Many of the different ports and protocols that relate to email were
covered in the C06 and C07 classes on the Application, Presentation,
Session, and Transport Layer and in the F06 class detailing the Internet
Information Service (IIS).
Here is a list of the email protocols that will be supported and used
by Microsoft Exchange:
• SMTP: 25
• IMAP: 143
• POP3: 110
• MAPI: 135
• NNTP (Network News Transfer Protocol) Port 119
• HTTP: 80
• HTTPS: 443
The only new protocol introduced is the NNTP protocol which is used to
distribute news around the network from servers to clients. News is
pushed out from a news server and received by the clients running the
appropriate software and the articles are viewed by the reader. The
reader can subscribe to a series of articles or news updates and he or
she will receive them as updates occur to the articles posted on the
news server. This protocol is not commonly employed in the Marine Corps.
Within the Marine Corps, there is not much use of the IMAP and POP3
client protocols, MAPI and HTTPS are the two primary email retrieval
options of note because of the employment of Microsoft Outlook and
Outlook Web Access. For a third party email application IMAP and POP3
would be employed to enable the email client to download the emails from
the Exchange Server. SMTP is used to send emails from the client to the
server and from the server to other servers.
Email Formats
There are two types of email formats: ASCII and Multipurpose Internet
Mail Extension (MIME). The ASCII format is for text only emails. There
are no pictures, attachments or different fonts.
3
MIME formatted emails can contain multiple fonts, embedded applications
(.exe files), images, video, and audio. The MIME format has overtaken
the original text based system because it offers a richer set of features
for users and developers. However the MIME format is much less secure
because hackers can embed hostile programming within the MIME format and
have it ran by a user’s computer before the user’s computer is even
aware of it. The Marine Corps habitually disables much of the MIME
functionality to protect our networks.
Exchange 2010
This course will focus on Exchange 2010, however, you may find some units
still using older versions (Exchange 2003, unlikely, or Exchange 2007).
Exchange 2010 is fully integrated with Active Directory instances that
are at the Microsoft Server 2008 functional level or higher. This means
that Exchange leverages many of the Active Directory infrastructure
settings such as mirroring AD replication for email forwarding and access
to the server is obtained through the same Microsoft Management Console
that controls Active Directory. Furthermore, being fully Active
Directory integrated means that the user only has to log onto the domain
once, he or she will not have to authenticate to the Exchange Server.
All of the users permissions for mailbox access, public folder access,
and send and receive rights are configured through Active Directory.
Organization
4
The USMC default name for the Organization is ORGANIZATION. Here is a
screenshot of the comm school domain’s Exchange Organization.
Administrative Groups
5
The Marine Corps uses the mixed administration method to run the Exchange
Organizations. Higher level permissions like modifying the organization
and adding servers are kept centralized, while backups, maintenance, and
all of the daily tasks are decentralized and ran by data administrators
at each site.
Servers
Information Store
Routing Engine
6
System Attendant
You can also see the public folder tree in the MMC on the left. The
Exchange administrator controls who has read, write, and edit permissions
for the public folders.
7
The third component of an Exchange Server is the System attendant. The
system attendant has several functions in Exchange including building
routing tables for the routing engine to execute. It also generates
addresses for emails sent outside the organization, is used to enable
and disable digital signatures, and logs all errors. The system attendant
is the first service started on an Exchange Server and the last one to
shut down before a reboot. If the system attendant function is not
running, the exchange server will not send, route, receive, or process
emails.
Recipients
8
consisting of government and commercial-of-the-shelf (COTS) software and
hardware used to prepare, submit, transport, deliever, store and retrieve
organizational messages (releasing messages [MARADMINS], equipment
taskers, feasibility of support, etc). AMHS was developed to replace
the legacy equipment and messaging centers that comprised the Automatic
Digital Network (AUTODIN) and the Defense Messaging System (DMS).
Overall, AMHS can be used on both unclassified-but- sensitive (NIPRNET)
and secret (SIPRNET) networks.
Conclusion
9
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
MICROSOFT EXCHANGE PHYSICAL STRUCTURE
ECC F08
(ECC)
4 APR 2013
1. LEARNING OBJECTIVES
4. Without the aid of reference, state the purpose of the Mailbox role,
per the Microsoft Exchange Server 2010 Resource Kit. (0602-PLAN- 1105ka)
5. Without the aid of reference, state the purpose the Client Access
role, per the Microsoft Exchange Server 2010 Resource Kit. (0602-PLAN-
1105kb)
7. Without the aid of reference, state the purpose of the Hub Transport
role, per the Microsoft Exchange Server 2010 Resource Kit. (0602-PLAN-
1105ja)
2
Introduction
3
RCT, ACE, and CLR will all have to run /PrepareDomain for their
individual domains before they can add Exchange Servers to their domains
as well.
• Naming Standards:
– NIPR Designator – NameN01E
– SIPR Designator – NameS01E
Let’s look at an Active Directory diagram that has Exchange 2010 added
to it and examine naming standards used.
4
Mailbox Role
The Microsoft Exchange Server 2010 Mailbox server role hosts mailbox
databases and provides e-mail storage and advanced scheduling services
for Microsoft Office Outlook users. The Mailbox server role can also
host a public folder database, which provides a foundation for workflow,
document sharing, and other forms of collaboration. Servers on which the
Mailbox server role is installed are called “Mailbox servers”. This role
will be one of the most common roles your have present in your Exchange
architecture because it is what will physically hold all of your users’
emails. At a minimum, you should plan to have at least (1) Mailbox server
per AD site.
Public Folders
However, public folders were not designed for the following functions:
Archiving data. Users who have mailbox limits sometimes use public
folders, instead of personal folder (.pst) files, to archive data.
We do not recommend this practice because it increases storage on
public folder servers and undermines the goal of mailbox limits.
5
Finally, if your users are want a way to enhance document sharing,
collaboration, and control either assist the S-3’s Information
Management Officer develop a information management policy and use your
networks share drive, or install and configure a Microsoft SharePoint
server. SharePoint was explicitly designed to be integrated with the
entire Microsoft Office suite of products and provide for enhanced levels
of document sharing and version control.
The Client Access server role supports the Microsoft Outlook Web Access,
Outlook Anywhere, Microsoft Entourage 2004 and Entourage 2008 for Mac,
and Microsoft Exchange ActiveSync client applications, in addition to
the Post Office Protocol version 3 (POP3) and Internet Message Access
Protocol version 4rev1 (IMAP4) protocols. The Client Access server role
also hosts several key services, such as the Autodiscover service and
Exchange Web Services.
You must have the Client Access server role installed in every Active
Directory site within your organization that contains an Exchange 2010
server that has the Mailbox server role installed. If your organization
has only one Active Directory site, the Client Access server role must
be installed on at least one computer within your Exchange organization.
In Exchange 2010, the Client Access server role was designed specifically
to optimize the performance of the Mailbox server role by handling much
of the processing that previously occurred on back-end servers in odder
version of Microsoft Exchange. Business logic processes, such as Exchange
ActiveSync mailbox policies and Outlook Web Access segmentation, are
now performed on the Client Access server instead of the Mailbox server.
Because the Mailbox server role relies on the Client Access server role
to handle incoming client connections, each Active Directory site that
has a Mailbox server must also have a Client Access server. Both roles
can run on one physical computer. If you have multiple Active Directory
sites and want a single external URL for Outlook Web Access or Exchange
ActiveSync, you must configure your Client Access servers for proxying.
Exchange Servers running the Edge Transport role connects the Exchange
Organization to the NIPR or SIPR cloud via a SMTP connector. Edge
Transport servers commonly have no mailbox store; their primary use is
strictly for email routing into and out of the organization. The Exchange
Server running the Edge Transport role is the only server that is
visible to the world and external organizations and serves as an
additional layer of protection for our data networks. The Transport
Edge role in the Marine Corps is commonly associated with Exchange
Servers connected to STEP entries in deployed networks.
6
For the MEB Exchange Organization, this is how the Transport Edge role
would be utilized.
2MEB01E is the only Exchange Server running the Transport Edge role in
the MEB. All email traffic to the NIPR cloud is forwarded via SMTP from
the other Exchange Servers to 01E which will send the traffic out to the
cloud. The firewall is configured to allow Port 25 and Port
443 traffic inbound and outbound from 2MEB01E. In the master DNS server
for the Marine Corps, DNS 1, DNS Alias and Mail Exchanger (MX) records
for 2MEB, GCEFWD, ACEFWD, and LCEFWD are all entered with the IP address
of the MEB’s Transport Edge server. Inbound email to any of the domains
is routed to the Transport Edge server first through the firewall and
then sent to the appropriate Exchange Server. The backside Exchange
Organization is kept hidden from anyone external to the firewall to
protect the network.
The benefits to using the Transport Edge role on Exchange Servers are:
7
Hub Transport Role
Exchange Servers running the Hub Transport role can also be configured
to run the Client Access and Mailbox roles, however, for larger networks
with multiple AD sites and exchange servers, Microsoft’s best practice
is to not put the Mailbox role on an Exchange Server running the Hub
Transport role. Nonetheless, in the Marine Corps there are never enough
servers to go around, thus this practice is not always followed. You
should plan on having the Hub Transport role running on at least one
Exchange Server per AD site.
The number of Exchange servers per AD site depends upon user requirements
and mailbox size. The physical limitation per server is typically
dependent on the hard drive space with respect to how large the mailbox
sizes are. If an exchange server’s mailbox fills up, it stops routing
emails and generally causes you to have a bad day.
With the advent of virtual servers, the main advantage for Exchange is
that mailbox stores can be mounted on a filer rather than a server. The
most common practice is to use the processor and RAM of a normal server
but mount the mailboxes on the filer. If the stand alone server fails,
the mailboxes can be immediately transferred to another server in
seconds. Since modern filers have over a terabyte of storage, it negates
the mailbox store problem that physical servers have.
8
Solarwinds and other network monitoring software can help you keep track
of hard drive, processor, and RAM utilization on your server
architecture. Do not exceed 80% hard drive utilization if you can help
it.
• For larger sites, use more than 1 exchange server for redundancy
For the smaller units like CLBs and Infantry battalions, you can run
your own domains and Exchange organizations during exercises like Mojave
Viper. Just submit your Active Directory Diagrams along with your Layer
3 and 2 architecture in your accreditation package.
If you are running your own Exchange Organization, you need to ensure
that after your accreditation package has been approved that:
Once these steps have been completed, you will be able to send and
receive emails from the cloud.
9
Exchange and Active Directory
Now that we have learned about Microsoft Exchange, the servers are added
to the Active Directory Diagram that we learned about in the previous
set of classes. A complete Active Directory Diagram has all of the
servers and their roles in the networks featured on it.
10
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
MICROSOFT ACTIVE DIRECTORY SECURITY CONSIDERATIONS
ECC F09
(ECC)
15 APR 2012
1. LEARNING OBJECTIVES
1. Without the aid of reference, state the two purposes for creating
Organizational Units (OUs) within Microsoft Active Directory (AD), per
the MCSE Guide to Designing a Microsoft Windows Server 2003 Active
Directory and Network Infrastructure, Chapter 2, Page 119-121. (0602-
PLAN-1105jc)
2. Without the aid of reference, define Group Policy, per the MCSE
Guide to Designing a Microsoft Windows Server 2003 Active Directory
and Network Infrastructure, Chapter 2, Page 122-123. (0602-PLAN-
1105jd)
2
Introduction
Organizational Units
– Users
– Computers
– Groups
– Printers
– Applications
– Security Policies
– Shared Folders
– Other OUs
–
There are two purposes for creating Organizational Units:
3
structure and higher level functions and roles inside Active
Directory.
Both of the purposes for OU creation are very important and are often
used together. For example, if a regiment is running its own Domain,
Cyber Marines at the battalion level will be given their own OU to
control. They will be able to manage all of the users and computers
in the battalion from inside the OU. They will be able to reset
passwords, create new accounts, map printers, build mailboxes in
Exchange and other functions. They will also be able to use group
policy in the OU to limit the permissions of the users like block the
command prompt, prevent users from installing programs and from
changing settings in Internet Explorer.
If your Marines are not running a domain, and you are part of another
unit’s domain, you will often be given your own OU to manage. As long
as your Marines have ownership of the OU they will be able to manage
all of your users’ service requirements and needs.
In this OU structure, the 3/5 Cyber Marines were given full control of
the 3/5 OU. To further manage users and group policy, the Marines
created sub OUs for each company and staff section. Inside each
company OU, 3 child OUs were created to hold the users, computers, and
C2 systems for each company. Group Policy settings were then applied
to the users and computers for each company. The reason for having
4
separate companies OUs is that since each company may have had
separate user requirements that can be addressed through Group Policy
settings.
Administrative Function
Object Type
5
The benefits for the object type OU structure are seen by the regiment
because they can specify overall group policy settings for the top
level user, computer, and C2 system OU. There is now more
administrative overhead by regiment as well because battalion level
cyber permissions are not assigned to 1 OU, they are assigned to each
type – there will be one OU for 3/5 computers, another one for 3/5
users etc. This can be rather complex to manage at the regimental
level.
Oftentimes in the Marine Corps, you will see the administrative model
ran by the higher level organizations and then either object type or
administrative type ran by the battalions. Sometimes a battalion may
only have 3 OUs – computers, users, and printers inside its top level
OU.
Object Standards
Now that you have planned out your OU architecture, you must build
computer and user accounts for all of your computers and users in the
battalion. Because an Active Directory domain is one logical
structure, every user, printer, and computer name must be unique.
However, this is not license for creativity. How hard do you think it
would be to locate a computer named MIKESCOMPUTER on a network with
over 250 computers? How about 3BN5MARXO? The 3/5 XO’s computer is
much easier to locate and find. If MIKESCOMPUTER had a virus, it
could affect many more computers before it is isolated and removed
from the network compared to the 3BN5MARXO computer.
6
Marine Corps defaults for user names are usually either:
– Firstname.lastname Joe.Smith
– Lastname first initial middle initial – SmithJS
Computer naming standards vary depending upon unit, Forest, and Domain
level SOPs. Computers are usually unit and billet specific such as
the following examples:
• 3bn5marS6
• rctcoc1
• Rctcurrentops1
Group Policy
7
Here is a screenshot of some of
the many options available to you
as a network planner and your
Marines to manage the network:
Group Policy can be linked to domains, sites, and OUs. Group Policy
does not apply at the forest level and to other domains in the forest,
only within a domain. The Marine Corps often manages group policy at
the domain and OU levels. Group Policy settings are inherited from the
top down. So a computer in an OU may have group policies applied at
both the domain and OU level. Child OUs inherit the group policy of
the parent OU. Group Policy inheritance can be blocked by experienced
administrators but is not commonly done.
8
Here is a diagram of how group policy may be managed for a domain and
some child OUs:
In this diagram you can see that the Regiment has specified a domain
level Group Policy that is shown in green. The regiment has created a
logon banner, locked down Internet Explorer and pushed a general
security template to lock down computers and users in the domain in
accordance with the MCNOSC security templates. At 3/5 the
administrators have added further restrictions to remove the command
line and specify share drive access for all of the users and computers
in the OU. You can see that the 3/5 OU inherits the green domain
level policies. For the user and computer OUs for I Company, you can
see the separate restrictions that the 3/5 administrators have applied
to the computers and users including locking down some programs,
disabling USB functions, and specifying the local administrator
password for the computers. The I Co child OUs have three levels of
group policy applied to them – local OU, parent OU, and domain level.
Here is a screenshot from Active Directory showing how the Group
Policies are applied to an OU:
9
You can see that there is the default domain policy and then an
additional GPO for the specific OU applied. If additional Group
Policies were created and applied to the OU, they would show up here.
One of the important concepts with employing group policy that you
should not overlook is that your Cyber Marines user and computer
accounts should not be put into the User OUs. The permissions they
need to access and troubleshoot servers and computers would be
blocked! Take a look at this OU diagram:
10
While 3/5’s Cyber Marines have ownership of the 3/5 OU their own
accounts and computers would fall inside the Administrator OU ran by
regiment. Regiment will use child OUs and Group Policy to give the
3/5 administrators the proper level of permissions.
Managing permissions for users can be easy, because most of the time
the regular user accounts are locked down to prevent them from
inadvertently affecting the Active Directory Infrastructure. It is
much harder to allocate and control permissions for Cyber Marines and
network administrators. To examine how to distribute these
administrative permissions and control we will look at two types of
permissions:
The next level of service permissions is the Domain Admin level. This
person has permissions to do anything at the Domain level. They can
add, remove, and change the roles of domain controllers and other
services within the domain. If your battalion level data chief is
trusted by the regimental data planner, your chief may be given domain
admin rights. However, on a daily basis your Marines do not need
domain admin rights unless they are directly in charge of running a
server farm.
11
solution is to tightly control the service level permissions and
create and assign data administrator permissions. Here is an example
of how to manage the data Administrator permissions in Active
Directory:
12
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
VIRTUALIZATION
ECC F10
(ECC)
15 APRIL 2013
1. LEARNING OBJECTIVES
2
Introduction
The compromise for the Marine Corps was just to run multiple services
on the same server, even though they could potentially cause conflicts
with each other. An example of services competing for server hardware
resources are when Microsoft Exchange and SQL for a database are
running on the same server. Both services are in competition for the
server’s available memory and CPU.
To better utilize our existing servers and remove the 1:1 ratio of
roles and servers, the Marine Corps has adopted virtualization
technology.
3
initiatives to decrease the electrical and physical footprint of our
IT infrastructure.
Virtualization Basics
4
Below is a table depicting the advantages of utilizing virtualization
to improve the network:
Physical machines and servers are very difficult to move or copy. For
a physical machine to be moved, it needs to be loaded in a truck and
physically moved from one site to another. Since virtual computers
are electronic files and exist as software, virtual machines can
easily be moved from one host computer to another over the network.
Software can be easily copied and cloned; it is much harder to make a
complete copy of a physical computer. Physical computers need the
correct drives, need to have hardware upgrades and new components to
stay current, and have to be continually replaced because technology
changes so fast.
5
Virtualization frees network planners from planning 1:1 Active
Directory servers, roles, and services. Instead of having 8 servers
in the server room, now the planner may be able to employ 4. This
allows planners the ability to truly plan networks according to the
best practices of Microsoft, Sun, and other companies. Fewer physical
servers mean less power, HVAC support, and Marines to manage and
maintain as well. This makes the Marine Corps more environmentally
friendly as well as easing the load on the power planners.
Virtualization Software
Virtual Machines are based around software and not physical hardware.
As such, Virtual Machines are completely independent of physical
computers and can be moved from one computer to another to adjust for
network topology changes, changes in demand, and changes to resource
allocation.
6
Hosted virtualization software acts as an application running on top
of an existing operating system. In the server labs, we have employed
VMware Workstation, which is a hosted virtualization software.
You can see that the computer on the left has the extra layer of the
Windows XP OS that the computer on the left using the hypervisor does
not. It is important to note that there is no difference between a VM
running on hosted software or one running using a hypervisor. You can
actually transfer the VMs back and forth from a hosted computer to a
hypervisor if required.
7
networks, hosted virtualization software is the best. Hosted
virtualizations allow the user to take advantage of not only the VMs
running on the computer but also the applications running on the host
computer. For hypervisors, only the VMs are accessible to the user,
no applications are supported by the hypervisor. Each type of
virtualization software has its benefits and drawbacks, but they also
work well together, and the virtual machines can be easily moved from
one type to another.
8
To illustrate this concept, lets look at an example:
Lets look at another scenario where we are going to employ the same
physical server but also add a FAS 270 filer to the equation to give
an additional TB of storage space.
9
Here are the two VMs that have been already allocated:
What resources are left over for the 3rd virtual machine? We can
still use the 4 processors of the host, have 8 GB of RAM left over to
use, 200 GB on the filer and 500 GB of space on the actual physical
server left to utilize for hard drive space, 2 NICs and the DVD-ROM
drive.
10
To plan for virtual servers, there is a five step process to follow:
This diagram shows one physical server with 3 virtual servers running
on it.
11
Allocating the virtual servers to the physical servers though is the
last step of the process. The first part of designing a server
architecture is to still develop the AD and Exchange. Here is a
sample AD diagram:
12
If you are planning on using a filer like a FAS270 and storing the
Virtual Hard Drives on the filer, add the filer to the physical server
diagram to arrive at a product like this:
This lets the data Marines doing the configuration and installations
know where to put the VM data stores. If no filer is depicted, it is
understood that the Virtual servers will be stored on the physical
server.
13
another physical server at the location of the copy of the virtual
server and the network is back in business.
Scalability
14
by simply copying the existing virtual servers. More resources can
easily be added to the network: filers for more datastores and more
physical servers to act as hosts for the virtual servers.
Additionally, because virtual servers are all software they are
hardware independent, which means that you can purchase servers from
almost any manufacturer and install the virtualization software.
Physical computers can also be easily upgraded for increased
performance without affecting the virtual infrastructure.
Virtualization also allows for support of legacy programs and
operating systems so there will always be support for critical command
and control applications that may run on older infrastructure. This
may be especially important as the Marine Corps transitions from a 32
bit to a 64 bit Operating System standard. Finally, virtualization
supports scalability because there is a much lower strain on HVAC and
generator support because there are less physical servers needed.
Adding a virtual server to the existing infrastructure adds no new
power or cooling demands to the grid.
Quality of Service
Security
15
virtual servers for specific roles reduces the vulnerability into the
network from both external and internal security threats.
Virtualization allows critical roles like front end bridgehead
Exchange servers and web servers to be isolated from the rest of the
network infrastructure using a minimum of physical servers.
Virtualization also cuts down on the actual footprint of servers. It
is easier to secure one or two physical servers than 8.
Summary
16
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
21 MAR 2012
1. LEARNING OBJECTIVES
2
Introduction
Helpdesk Organization
3
The helpdesk must balance the daily needs and requirements of each
user with problems with the priority needs of certain locations on
camp like the COC, LOC, TACC, as well as certain priority users like
the Commanding General, Commanding Officer, Sgt Major, Operations
Officers, etc. One of the responsibilities of the Syscon Watch
Officer is to adjust the priorities of the helpdesk on the fly to
ensure that the helpdesk is focused on the right places.
The helpdesk should consist of both Wire and Data Marines. If a user
calls the helpdesk with a phone problem, the wiremen will work with
the switchboard operator to troubleshoot the issue to fix the problem.
Because data is so complex, the helpdesk needs access to server
Marines, LAN Marines, and then troubleshooting tiger teams. The
helpdesk will receive a call from users and then try to resolve the
problem over the phone or remotely. If they cannot resolve the
problem, they will then dispatch a troubleshooting team to go to the
user to solve the problem. Many times due to volume, the tiger teams
will receive a list of user issues in priority order and travel all
day around the camp, solving the user’s problems and closing trouble
tickets.
Definitions
Customer Service: process by which the needs of your customers are met
through customer centric, solution oriented and proactive measures
4
Help Desk: An aspect of Customer Service which provides the central
interface between users and the technicians who support them.
A good helpdesk system will try and minimize the downtime that users
experience by solving problems at the lowest level. If the ISC cannot
solve the problem or the unit does not have one, the helpdesk will
take the problem for action. If it is not resolved in a timely manner
or it is decided that the problem or user is a priority issue, the
syscon can adjust the focus of the helpdesk and bring more resources
to bear to solve the problem.
The first component is the user education piece. The more educated
and knowledgeable your users are, the less problems that they will
have that they will need to call the helpdesk to resolve. To educate
your users, you can provide a customer service brief so that they
5
understand the procedures and user actions that need to happen to
resolve a problem as well as a timeline if they report an issue to the
helpdesk or open a trouble ticket. “Smartpacks” are another excellent
option to help your users. A good smartpack will have instructions on
how to dial a POTS phone, VOIP phone, STE phone, helpdesk phone
numbers and email address, how to set up email accounts, how to set up
a printer, how to map a sharedrive, and other things that you and your
Marines will identify that users can do one their own rather than
calling in a trouble ticket and wasting your Marines’ time. A
smartpack should also list Information Assurance concerns and
regulations that all of your users should follow in a simple, easy to
understand format.
Helpdesk Procedures
The largest component of your customer service plan will always be the
helpdesk procedures. Here is a list of the some the procedures that
you need to plan for:
• Priorities
• Trouble ticket system & work flow
• Reception
• Equipment receipt – tracking laptops and desktops for
imaging / troubleshooting
• Maintenance –
– Who inducts computers not on your CMR?
– Who orders parts? Whose funds?
• Customer contact
• Integration with SYSCON
6
You also have to think about maintenance and fixing laptops for users
that are from different units and CMRs and how your Marines will
maintain accountability over them. A Helpdesk SOP from 9th
Communication Battalion is attached at the end of this student handout
to serve as a template for you.
7
underemployed and your helpdesk will bear the burden. If they have
too many permissions they can inadvertently introduce problems into
your network. You can see how it seems easy in concept to set up a
tiered approach but it can be very hard work out the different
responsibilities and access of data personnel in practice.
You and your Marines need patience. There will be lines at your
helpdesk and many problems that users have especially around a relief
in place or a turnover. All of the problems will be eventually
solved. Your Marines need to understand that it is a marathon and not
a sprint.Rushing to solve problems sometimes creates more problems
and your Marines will overlook things or forget about users. As long
as they are working diligently through problems, it is your job to
provide them top cover and protect them from angry and complaining
users. Remember that your procedures and priorities were hopefully
explained to the users so when they are waiting in line and there is a
problem in the COC, they do not make a scene because they know where
they fall in the food chain. At some of the larger bases during unit
turnover’s your helpdesk may have a line outside of it.
Helpdesk Systems
There are many electronic systems that can make your life easier.
There are databases for trouble tickets that can be used like Remedy.
8
Logbooks like the syscon logbook can also be adapted for use at the
helpdesk so that Marines can maintain detailed logs of
troubleshooting, priorities and issues, and so the night shift can
look at what the day shift accomplished and vice versa as they come on
watch.
Solarwinds and network monitoring software can also play a key role in
the network. If there is a switch problem or fiber cut on the camp,
your Marines can see this and respond appropriately. For example, it
doesn’t pay to send out a tiger team to troubleshoot a user’s
connection, when the fiber to the access layer switch was cut.
Network monitoring software allows Marines to troubleshoot smartly and
effectively.
Documentation
Conclusion
9
1000
Data
2 Feb 06
Ref: a. Remedy
b. MNF-W User Agreement
c. Gear Receipt
d. Trouble Ticket flow chart
e. User Smart Pack List
f. OpDir Procedures
g. New Computer Setup and VLAN Change Procedures
h. Maintenance Procedures
i. Information System Coordinator (ISC)
j. Helpdesk Support Priorities
1. Purpose of Document
2. Mission Statement
The Help Desk is a central point of contact for all technical support,
including hardware, software and troubleshooting questions. This
enables 9th Communication Battalion to facilitate uninterrupted
communication and data access to all I MEF CE personnel; and provides
users with a single access point for troubleshooting needs.
3. The COC Help Desk works primarily for all the sections inside the
COC and the SSEC. The 9th Comm Help Desk is the Main user support
facility for the CEMNF domain. Both helpdesks:
10
The Information System Coordinator serves as the first line of defense
for all information system related problems. The 9th Communication
Battalion Helpdesk serve as the second line of defense. The technician
provides software application assistance and computer repair services.
They also evaluate and prioritize trouble calls, receive user reported
problems, and track and maintain a historical database of problem
resolution. They provide accurate and creative solutions to user
problems to ensure productivity.
5. The ISC Responsibilities come straight from the G-6. And encompass
all of the below.
a. Update ISD and send all updates to the MCCC Watch Officer on
SIPR.
g. Manage Group E-mail accounts (and who has access to the group
e-mail accounts).
Users are informed to log trouble calls with the helpdesk via
telephone, email or at the window located in Bldg 26. The email
address used is HelpDesk@cemnf-wiraq.usmc.mil or Helpdesk@cemnf-
wiraq.usmc.smil.mil The phone numbers are 3400-603 and 3404-608.
11
(5) Phone Number (user)
a. Users will approach the helpdesk and fill out a detailed gear
receipt. The user and the helpdesk technician will do a
complete Stock List-3 inventory of all gear received at the
Helpdesk. This form is used for hard drives and other non-
laptop equipment that may be brought in to the help desk.
12
b. If the computer is to be configured for the CENTRIX network,
technicians will process the paperwork then we will forward
the computer to LCpl Ricci for process, at 318-3401-328
(6) Have the customer verify the inventory and sign and
date.
(7) Print your name, then, sign and date the receipt.
(4) Give this page to the user. They will need this to
receive their equipment.
(5) Secure the first page with the equipment that the
customer relinquished to the helpdesk.
(2) The customer must then print their name, sign, and
date the “picked up by” portion of the sheet.
13
(3) The customer then prints their name, signs and dates
the maintenance log book.
(5) Staple both pages together and place them in the gear
trouble ticket completed folder.
14
(1) Open Users and Computers.
(i) Go to “Action”.
(a) New User.
(c) Ensure:
1. “User must change password at
next logon” is checked.
(e) “Finish”.
15
a. All accounts will be deleted 15 days after the user(s) checks
out with the Help Desk, and deleted immediately at the user’s
request. After 30 days of account inactivity, or if instructed
by IA or G6 Data Chief:
b. Run the “30+ User Account” script on the share and it will
automatically delete users without account activity for more
than 30 days. To individually delete an account, you have to
search for that persons account in active directory, right
click on the users account, and select “delete” This will
prompt you to make sure you wish to delete the user; click
“Yes.” Schedule the user’s mail box for deletion upon deleting
the account.
16
the account. After disabling an account, do not re-enable
until directed by IA or the
G6 Data Chief.
a. The user must show proof that the account in question is his
(I.D. must be shown).
a. Reporting procedures:
b. Actions to take
a. Send on Behalf
17
(2) Why? Marines must have a reason to send on behalf of
another. If they are filling a billet, they can get
“send on behalf” of that billet by letting us know
that they stand post. If a Marine wishes to send on
behalf of another Marine, both marines must come to
the helpdesk, and provide good reason and their ID
cards before this permission is granted.
b. Mailbox rights
b. The Helpdesk will notify the user when the equipment, and
failed hard drive are ready for pick up, it will the user’s
responsibility to dispose of the hard drive.
18
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
ECC F13
(ECC)
27 APR 2013
1
1. LEARNING OBJECTIVES
2
Command and Control, Cont’d
What is C2?
3
C2 Applications
4
Other: You will see other applications and tools used in a
Coalition environment.
COP Management
5
work over tactical communication systems to ensure connectivity
with deployed forces in the tactical environment. GCCS-J employs
an open system client/server architecture that allows a diverse
group of commercial-off-the-shelf (COTS) and government-off-the-
shelf (GOTS) software packages to operate at any GCCS-J
location.
The IOSv1 is a server fielded to the Regt and above. The IOSv1
server collects track data from subordinate units to populate
GCCS-J. One of the primary features of the IOSv1 is the Track
Database Manager (TDBM). The TDBM collects, indexes, and
disseminates track information from a variety of sources to
create the COP.
Force XXI Battle Command Brigade and Below – Blue Force Tracking
(FBCB2-BFT)
FalconView
6
personnel.
7
and designate targets for laser-seeking Precision Guided
Munitions (PGM) and Laser Spot Trackers (LST).
8
gain access to seemingly disparate information and data sources
to create vital, common operating pictures. The COIC also
provides an avenue for strategic reachback to collaborative,
fused, multi-source analysis and innovation across critical DoD,
government, industry, and academic organizations and agencies.
Web Geo-Browser
9
CellPack
3D Dashboard
MarineLink
10
Graphical User Interface (GUI). MarineLink queries, organizes,
sorts and filters the data, which it then displays on a map
showing geographical coordinates.
11
Common Logistics C2 System (CLC2S)
Microsoft SharePoint
Current chat and instant messaging (IM) solutions within the DoD
have created problems with information security and
interoperability. Though Extensible Message and Presence
12
Protocol (XMPP) is the only mandated chat and IM protocol in the
DoD, the majority of the military still operates alternate
nonstandard solutions that prevent interoperability and lack
appropriate security assurances.
Conclusion
References
13
UNITED STATES MARINE CORPS
COMMUNICATIONS SCHOOL
TRAINING COMMAND
BOX 788251
TWENTYNINE PALM, CALIFORNIA
92278-8251
STUDENT HANDOUT
AN/TSQ-239 COMBAT OPERATIONS CENTER
(COC) FXX
(ECC)
27 APR 2013
1. LEARNING OBJECTIVES
Introduction
2
Maintains contact with higher, adjacent, and supporting units.
3
Common COC Standard Operating Procedures
Primary staff will not leave the COC unless they have checked out
with either the WO or the OpsO per the CO’s guidance.
All sensitive items will remain with the individual to whom they
are assigned.
All work areas will be maintained neat and clean at all times.
4
to the operations.
The COC provides Command Post (CP) mobile facilities hosting and
interfacing with Tactical Data Systems (TDS) across Marine Corps
Command echelons and enables the interaction and flow of information
between various staff members within a CP. To provide these
capabilities to the commander and command staff, COCs contain power
generation, environment control, and communications equipment in a
package that can be rapidly moved to keep pace with the battle.
Tents: (1) 303 Tent 18’x 15’ (2) 305 Tents 18’x 25’
Tables: (8)
Chairs: (16)
Plotter: (1)
Scanner: (1)
5
Shredder: (1) Approved for Classified document shredding
Projectors: (2)
Smartboards: (2)
Backup UPS Batteries: (4) Total; (3) on Ops Trailer, (1) for the
Tent
IP Phones: (2)
Data Transmit Case: (1) Case; Contains Fiber Optic Modem (FOM)
and KIV-7s.
IP KVM: (1)
6
contains a (3) Server Suite
USB Audio Adapter (UAA): (6) Total Kits including (6) Laptops,
(6) Headsets, (6) J-Boxes and corresponding connectors.
Tents: (1) 303 Tent 18’x 15’ (1) 305 Tents 18’x 25’
Tables: (4)
Chairs: (8)
Plotter: (0)
Scanner: (1)
Projectors: (1)
Smartboards: (1)
7
Antenna Hill Generator: (1)
IP Phones: (2)
Data Transmit Case: (1) Case; Contains Fiber Optic Modem (FOM)
and KIV-7s.
IP KVM: (1)
USB Audio Adapter (UAA): (6) Total Kits including (6) Laptops,
(6) Headsets, (6) J-Boxes and corresponding connectors.
References
8
b. MCDP-1-0 Marine Corps Operations
c. Digital COC SOP for Battalion Operations in Irregular
Warfare