<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki-stadm.eri.ucsb.edu/index.php?action=history&amp;feed=atom&amp;title=Old_ad</id>
	<title>Old ad - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki-stadm.eri.ucsb.edu/index.php?action=history&amp;feed=atom&amp;title=Old_ad"/>
	<link rel="alternate" type="text/html" href="https://wiki-stadm.eri.ucsb.edu/index.php?title=Old_ad&amp;action=history"/>
	<updated>2026-04-20T02:02:47Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.34.0</generator>
	<entry>
		<id>https://wiki-stadm.eri.ucsb.edu/index.php?title=Old_ad&amp;diff=2474&amp;oldid=prev</id>
		<title>Stadm1: Created page with &quot;*This page is an archive and used for reference, just my thoughts and notes from when first installing AD on centos  ==Installing Samba 4 onto CentOS== *Install a minimal inst...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki-stadm.eri.ucsb.edu/index.php?title=Old_ad&amp;diff=2474&amp;oldid=prev"/>
		<updated>2014-09-26T20:50:57Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;*This page is an archive and used for reference, just my thoughts and notes from when first installing AD on centos  ==Installing Samba 4 onto CentOS== *Install a minimal inst...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;*This page is an archive and used for reference, just my thoughts and notes from when first installing AD on centos&lt;br /&gt;
&lt;br /&gt;
==Installing Samba 4 onto CentOS==&lt;br /&gt;
*Install a minimal install of CentOS 6.5&lt;br /&gt;
*The following install and file Locations/Names are a bit different for Centos 7, once configured though installing and managing Samba4 should be the same&lt;br /&gt;
*change the hostname&lt;br /&gt;
 vi /etc/sysconfig/network&lt;br /&gt;
*Edit &amp;quot;HOSTNAME=***&amp;quot; to say &amp;quot;HOSTNAME=samba&amp;quot; or whatever you want to name the server&lt;br /&gt;
*manually edit or add network-scripts if not there&lt;br /&gt;
 cd /etc/sysconfig/network-scripts/&lt;br /&gt;
 vi ifcfg-eth0&lt;br /&gt;
*Make sure these options are included&lt;br /&gt;
 DEVICE=eth0&lt;br /&gt;
 HWADDR=**:**:**:**:**:**&lt;br /&gt;
 TYPE=ETHERNET&lt;br /&gt;
 ONBOOT=yes&lt;br /&gt;
 NM_CONTROLLED=yes&lt;br /&gt;
 BOOTPROTO=dhcp&lt;br /&gt;
*restart the network&lt;br /&gt;
 service network restart&lt;br /&gt;
*run yum update&lt;br /&gt;
*install vim or an editor of your choice, vi comes included with minimal &lt;br /&gt;
*SELinux must be disabled:&lt;br /&gt;
 vim /etc/sysconfig/selinux&lt;br /&gt;
*change &amp;quot;SELINUX=enforcing&amp;quot; to &amp;quot;SELINUX=disabled&amp;quot;&lt;br /&gt;
*restart the computer&lt;br /&gt;
 shutdown -r now&lt;br /&gt;
*required:&lt;br /&gt;
  yum install gcc libacl-devel libblkid-devel gnutls-devel \&lt;br /&gt;
   readline-devel python-devel gdb pkgconfig krb5-workstation \&lt;br /&gt;
   zlib-devel setroubleshoot-server libaio-devel \&lt;br /&gt;
   setroubleshoot-plugins policycoreutils-python \&lt;br /&gt;
   libsemanage-python setools-libs-python setools-libs \&lt;br /&gt;
   popt-devel libpcap-devel sqlite-devel libidn-devel \&lt;br /&gt;
   libxml2-devel libacl-devel libsepol-devel libattr-devel \&lt;br /&gt;
   keyutils-libs-devel cyrus-sasl-devel cups-devel bind-utils \&lt;br /&gt;
   glibc glibc-devel gcc libacl-devel krb5-server krb5-workstation krb5-libs pam_krb5 make gnutls-devel openldap-devel openldap-clients openldap-servers openldap-servers-sql \&lt;br /&gt;
   openssl-devel bind bind-libs bind-utils libblkid-devel readline-devel gdb python-devel cups sqlite-devel \&lt;br /&gt;
   setroubleshoot-server popt-devel libxml2-devel libpcap-devel libidn-devel cups-devel ctdb-devel pam-devel gnutls-devel \&lt;br /&gt;
   krb5-server-ldap nss-pam-ldapd pam_ldap openssh-ldap python-ldap docbook-style-xsl&lt;br /&gt;
&lt;br /&gt;
*install git, git will be used to download samba if using developer version of samba&lt;br /&gt;
 yum install git-core&lt;br /&gt;
 git clone http://&lt;br /&gt;
*master git now located at(3-17-14)&lt;br /&gt;
 git://&lt;br /&gt;
*For stable Samba version visit&lt;br /&gt;
*or:&lt;br /&gt;
 wget http://&lt;br /&gt;
*reboot server so all packages and updates are applied&lt;br /&gt;
 shutdown -r now&lt;br /&gt;
*Extract the archive if not done so already&lt;br /&gt;
*Build the samba install, replace samba-master with samba-[Version#]&lt;br /&gt;
 cd ~/samba-master&lt;br /&gt;
 ./configure --enable-debug --enable-selftest&lt;br /&gt;
*if it completes successfully, make sure it is Building with Active Directory support, if not you may have forgotten a few packages&lt;br /&gt;
 make&lt;br /&gt;
 make install&lt;br /&gt;
&lt;br /&gt;
==Creating script for starting and stopping samba service==&lt;br /&gt;
 cd /etc/init.d&lt;br /&gt;
 cp rdisc samba&lt;br /&gt;
 vim samba&lt;br /&gt;
 :%s/rdisc/samba/g&lt;br /&gt;
 :wq&lt;br /&gt;
*change daemon location from /sbin/samba to /usr/loca/samba/sbin/samba, as well as killproc location&lt;br /&gt;
*Delete RDISCOPT variable, remove usage from daemon command&lt;br /&gt;
*change what gets echoed to the screen&lt;br /&gt;
&lt;br /&gt;
==Enabling Samba 4 as DC==&lt;br /&gt;
*add samba path to $PATH&lt;br /&gt;
 echo 'export PATH=$PATH:/usr/local/samba/bin' &amp;gt;&amp;gt; ~/.bashrc&lt;br /&gt;
 echo 'export PATH=$PATH:/usr/local/samba/sbin' &amp;gt;&amp;gt; ~/.bashrc&lt;br /&gt;
*run command &lt;br /&gt;
 /usr/local/samba/bin/samba-tool domain provision&lt;br /&gt;
*the domain-provision tool should pick all defaults automatically, however they can be changed to your liking&lt;br /&gt;
*once the provision tool has finished successfully restart the server&lt;br /&gt;
 shutdown -r now&lt;br /&gt;
*once system has started enable samba 4 and add it start at boot, change to start with chkconfig after service script is created&lt;br /&gt;
 /usr/local/samba/sbin/samba&lt;br /&gt;
 vim /etc/rc.d/rc.local&lt;br /&gt;
*append &amp;quot;/usr/local/samba/sbin/samba&amp;quot; without quotations to the end of the file and then save&lt;br /&gt;
*samba version as well as samba client version can be checked using the following commands&lt;br /&gt;
 /usr/local/samba/sbin/samba -V&lt;br /&gt;
 /usr/local/samba/bin/smbclient --version&lt;br /&gt;
&lt;br /&gt;
==Configuring DNS==&lt;br /&gt;
*DNS forwarding was set up on the domain provision ing using the samba-tool&lt;br /&gt;
 cat /usr/local/samba/etc/smb.conf&lt;br /&gt;
*there should be a line under &amp;quot;[global]&amp;quot; that says &amp;quot;dns forwarder = ***.***.***.***&amp;quot;, if not it was not enabled during domain provisioning&lt;br /&gt;
*edit resolv.conf&lt;br /&gt;
 vim /etc/resolv.conf&lt;br /&gt;
*edit to look exactly like:&lt;br /&gt;
 domain mydomain.com&lt;br /&gt;
 nameserver 128.***.***.** &lt;br /&gt;
*where &amp;quot;128.***.***.***&amp;quot; is the ipaddress of the centos server&lt;br /&gt;
*next go back and edit ifcfg-eth0 in network-scripts&lt;br /&gt;
 vim /etc/sysconfig/network-scripts/ifcfg-eth0&lt;br /&gt;
*change the file to look like this&lt;br /&gt;
 DEVICE=&amp;quot;eth0&amp;quot;&lt;br /&gt;
 BOOTPROTO=&amp;quot;none&amp;quot;&lt;br /&gt;
 DNS1=&amp;quot;128.***.***.**&amp;quot; #this is host ipaddress&lt;br /&gt;
 GATEWAY=128.**.***.*&lt;br /&gt;
 HWADDR=&amp;quot;84:B4:C1:0A:**:**&amp;quot;&lt;br /&gt;
 IPADDR=&amp;quot;128.***.***.**&amp;quot;&lt;br /&gt;
 IPV6INIT=&amp;quot;no&amp;quot;&lt;br /&gt;
 NM_CONTROLLED=&amp;quot;yes&amp;quot;&lt;br /&gt;
 ONBOOT=&amp;quot;yes&amp;quot;&lt;br /&gt;
 PREFIX=&amp;quot;24&amp;quot;&lt;br /&gt;
 TYPE=&amp;quot;Ethernet&amp;quot;&lt;br /&gt;
*reboot so that all changes may  take effect&lt;br /&gt;
 shutdown -r now&lt;br /&gt;
*login and test that the DNS is working properly&lt;br /&gt;
 host -t SRV _ldap._tcp.mydomain.com&lt;br /&gt;
*where mydomain.com is then name of the domain you are on&lt;br /&gt;
*output should look like, where samba is the hostname of your server  &lt;br /&gt;
 _ldap._tcp.mydomain.com has SRV record 0 100 389 samba.mydomain.com&lt;br /&gt;
*test with&lt;br /&gt;
 host -t SRV _kerberos._udp.mydomain.com&lt;br /&gt;
*output&lt;br /&gt;
 _kerberos._udp.mydomain.com has SRV record 0 100 88 samba.mydomain.com&lt;br /&gt;
*last test&lt;br /&gt;
 host -t A samba.mydomain.com.&lt;br /&gt;
*output should return your ip adddress&lt;br /&gt;
 samba.mydomain.com has address 192.168.0.2&lt;br /&gt;
*if test did not produce those outputs DNS has not been configured properly&lt;br /&gt;
&lt;br /&gt;
==Firewall==&lt;br /&gt;
*settings:&lt;br /&gt;
 -A INPUT -p tcp --dport 53 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 53 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 137:138 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 139 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 445 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 135 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 88 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 88 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 464 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 389 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 389 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 1024 -j ACCEPT&lt;br /&gt;
  &lt;br /&gt;
 -A INPUT -p tcp --dport 636 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 3268 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 3269 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 445 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 25 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 135 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 5722 -j ACCEPT&lt;br /&gt;
 -A INPUT -p udp --dport 464 -j ACCEPT&lt;br /&gt;
 -A INPUT -p tcp --dport 137 -j ACCEPT&lt;br /&gt;
&lt;br /&gt;
==Kerberos==&lt;br /&gt;
*make a backup of original kerberos file and replace it with the copy generated by samba&lt;br /&gt;
 mv /etc/krb5.conf /etc/krb5.conf.bak&lt;br /&gt;
 cp /usr/local/samba/share/setup/krb5.conf /etc/krb5.conf&lt;br /&gt;
*edit the new krb5.conf file and change the ${REALM} variable to the realm selected during domain provisioning, ALL CAPS&lt;br /&gt;
 vim /etc/krb5.conf&lt;br /&gt;
*test Kerberos using the kinit command &lt;br /&gt;
 kinit administrator@MYDOMAIN.COM&lt;br /&gt;
*if Kerberos is working you will be asked for your password&lt;br /&gt;
*verify that it is working by running klist, output should look something along the lines of&lt;br /&gt;
 Ticket cache: FILE:/tmp/krb5cc_0&lt;br /&gt;
 Default principal: administrator@MYDOMAIN.COM&lt;br /&gt;
 &lt;br /&gt;
 Valid starting Expires Service principal&lt;br /&gt;
 07/25/13 15:23:33 07/26/13 1:23:33 krbtgt/MYDOMAIN.COM@MYDOMAIN.COM&lt;br /&gt;
 renew until 07/26/13 15:23:31&lt;br /&gt;
&lt;br /&gt;
==NTP==&lt;br /&gt;
*install ntp&lt;br /&gt;
 yum install ntp&lt;br /&gt;
*start ntp&lt;br /&gt;
 /etc/init.d/ntpd start&lt;br /&gt;
*add ntp to start up&lt;br /&gt;
 chkconfig ntpd on&lt;br /&gt;
&lt;br /&gt;
=Windows Domain=&lt;br /&gt;
==Add Windows computer to domain==&lt;br /&gt;
*manually edit network settings to point DNS to samba4 server&lt;br /&gt;
*assign static ip so there are no problems with joining computers to domain&lt;br /&gt;
*ping samba4 server at ip address to verify you can see it&lt;br /&gt;
 ping 128.***.***.****&lt;br /&gt;
*ping FQDN to verify DNS is working&lt;br /&gt;
 ping samba4.mydomain.com&lt;br /&gt;
*should get replies form both verifying that you can communicate with server and that DNS is functioning &lt;br /&gt;
*run the date command in your server&lt;br /&gt;
 date&lt;br /&gt;
*Change the date and time on Windows Computer so that it is within a few seconds of the server, Kerberos requires the times between computers be no more than a few seconds apart&lt;br /&gt;
*Right click on &amp;quot;My Computer&amp;quot; and click &amp;quot;Properties&amp;quot;&lt;br /&gt;
*Under &amp;quot;Computer name, domain, and workgroup settings&amp;quot; click change settings&lt;br /&gt;
*Under &amp;quot;Member of&amp;quot; check &amp;quot;Domain&amp;quot;&lt;br /&gt;
*Type in the name of your domain in full uppercase letters, ex. &lt;br /&gt;
**MYDOMAIN.COM&lt;br /&gt;
*When asked enter in the username and password for the Administrator created during the samba-tool domain provisioning&lt;br /&gt;
*Once you have joined the domain restart the computer and you can now log in to the domain&lt;br /&gt;
&lt;br /&gt;
==Adding Profile path to Samba==&lt;br /&gt;
*make a folder where the profiles will be stored&lt;br /&gt;
 mkdir /usr/local/samba/var/profiles &lt;br /&gt;
*Add the following to smb.conf to inlcude that location&lt;br /&gt;
 vim /usr/local/samba/var/profiles&lt;br /&gt;
 &lt;br /&gt;
 [profiles]&lt;br /&gt;
 path = /usr/local/samba/etc/smb.conf&lt;br /&gt;
 read only = No&lt;br /&gt;
*restart samba&lt;br /&gt;
 /usr/local/samba/bin/smbcontrol all reload-config&lt;br /&gt;
*once restarted check the shares on your samba server, profiles should appear under there&lt;br /&gt;
 smbclient -L localhost -U%&lt;br /&gt;
&lt;br /&gt;
==Change Security on Profiles folder==&lt;br /&gt;
*login to the domain as administrator onto a windows 7 computer &lt;br /&gt;
*open up my computer and navigate to &amp;quot;\\servername&amp;quot; , ex. &amp;quot;\\samba4&amp;quot;&lt;br /&gt;
*Right Click on the folder and select properties&lt;br /&gt;
*Change security to allow Domain Administrators Full Control&lt;br /&gt;
*add Domain Users to Security with options, Traverse folder/execute file. List Folder/read data, Create folder/append data&lt;br /&gt;
==Install RSAT==&lt;br /&gt;
*Download Remote Server Administration Tool from the microsoft website&lt;br /&gt;
*Install, Once installed open up control panel and then open up programs, then programs and features &lt;br /&gt;
*on the left pane click &amp;quot;Turn Windows features on or off&amp;quot;&lt;br /&gt;
*Select all under Remote Server Administration Tool, then click okay&lt;br /&gt;
==Adding User and profile path==&lt;br /&gt;
*From a windows computer with RSAT installed run: dsa.msc&lt;br /&gt;
*create a new user and edit its properties to include a profile path of &amp;quot;\\servername\profiles\%USERNAME%&amp;quot;&lt;br /&gt;
*then run: gpupdate /force&lt;br /&gt;
*Login with new user on domain and roaming profile will be created under /usr/local/samba/var/profiles on the server&lt;br /&gt;
*If you're having Group Policy Issues you can view what has been applied by gpresult&lt;br /&gt;
*From command line run:&lt;br /&gt;
 gpresult /H filename.html&lt;br /&gt;
*or if you only want Computer Configuration(must be run as an administrator)&lt;br /&gt;
 gpresult /SCOPE COMPUTER /H filename.html&lt;br /&gt;
*Login with new user on domain and roaming profile will be created under /usr/local/samba/var/profiles on the server&lt;br /&gt;
&lt;br /&gt;
==Folder Security==&lt;br /&gt;
*create a share for where users folder redirections will go, want on a NFS, demoing on local drive&lt;br /&gt;
 [users]&lt;br /&gt;
        path = usr/local/samba/var/data/users&lt;br /&gt;
        comment = temp user folders for folder redirection, move to NFS&lt;br /&gt;
        read only = No&lt;br /&gt;
*make the folder or have the NFS mouted&lt;br /&gt;
 mkdir -p usr/local/samba/var/data/users&lt;br /&gt;
 chown root:3000000 usr/local/samba/var/data/users&lt;br /&gt;
 chmod 755 usr/local/samba/var/data/users&lt;br /&gt;
*login into windows computer using a domain administrator to change permissions on users folder&lt;br /&gt;
*navigate to users folder on windows computer \\domainame.edu&lt;br /&gt;
*right click on users folder and select properties, go to security tab, click on advanced, click change permissions&lt;br /&gt;
*remove all current permissions, add new permissions making sure &amp;quot;Include inheritable permissions from the object's parents&amp;quot; is NOT checked  &lt;br /&gt;
*add:&lt;br /&gt;
**Administrator: Full Control : This Folder, Subfolder, and Files&lt;br /&gt;
**Domain Admins: Full Control : This Folder, Subfolder, and Files&lt;br /&gt;
**SYSTEM: Full Control : This Folder, Subfolder, and Files&lt;br /&gt;
**CREATOR OWNER: Full Control : Subfolder, and Files&lt;br /&gt;
**Authenticated Users: Traverse Folder/Execute FIle, List Folder/Read Data, Create Files/Write Data, Create Folders/Append Data, Change Permissions: This Folder Only&lt;br /&gt;
*restart service and check that settings stay&lt;br /&gt;
*using getfacl &lt;br /&gt;
 getfacl /data/users&lt;br /&gt;
*returns&lt;br /&gt;
 # file: users&lt;br /&gt;
 # owner: root&lt;br /&gt;
 # group: root&lt;br /&gt;
 user::rwx&lt;br /&gt;
 user:root:rwx&lt;br /&gt;
 group::---&lt;br /&gt;
 group:root:---&lt;br /&gt;
 group:3000002:rwx&lt;br /&gt;
 group:3000003:rwx&lt;br /&gt;
 group:3000008:rwx&lt;br /&gt;
 mask::rwx&lt;br /&gt;
 other::---&lt;br /&gt;
 default:user::rwx&lt;br /&gt;
 default:user:root:rwx&lt;br /&gt;
 default:group::---&lt;br /&gt;
 default:group:root:---&lt;br /&gt;
 default:group:3000002:rwx&lt;br /&gt;
 default:group:3000008:rwx&lt;br /&gt;
 default:mask::rwx&lt;br /&gt;
 default:other::---&lt;br /&gt;
==Folder Redirection with GPO==&lt;br /&gt;
*Download admx files for windows 7/2008 and place them in \\mydomain.edu\sysvol\domainname.edu\policies\PolicyDefinitions&lt;br /&gt;
*service samba restart&lt;br /&gt;
*Create OU in AD and add a couple users&lt;br /&gt;
*Open up Group Policy Management&lt;br /&gt;
*Do not edit default domain policy, instead right click on the OU, Create GPO and link to OU&lt;br /&gt;
*edit linked GPO&lt;br /&gt;
*Go to User Configuration =&amp;gt; Policies =&amp;gt; Windows Settings =&amp;gt; Folder Redirection&lt;br /&gt;
*Click each folder and change setting under &amp;quot;Target&amp;quot; tab to:&lt;br /&gt;
**Setting: Basic - Redirect everyone's folder to the same location&lt;br /&gt;
**Target Folder Location: Create a folder for each user under the root path&lt;br /&gt;
**Root path:\\MYDOMAIN.EDU\users &lt;br /&gt;
*under the &amp;quot;Settings&amp;quot; tab&lt;br /&gt;
**Uncheck &amp;quot;Grant the user exclusive rights to (name_of_folder)&amp;quot;&lt;br /&gt;
**under policy removal: Leave the folder in the new location when policy is removed should remain checked&lt;br /&gt;
*Since folder redirection windows will ask for conformation every time you try and open a shortcut because they are stored on NFS&lt;br /&gt;
*Go to User Configuration =&amp;gt; Policies =&amp;gt; Windows Settings =&amp;gt; Internet Explorer Maintenance =&amp;gt; Security&lt;br /&gt;
**NOTE!!!: This can only be done from a Windows 7 Machine running RSAT, server 2012 and Windows 8 deprecated this feature&lt;br /&gt;
&lt;br /&gt;
*Double Click Security Zones and Content Ratings&lt;br /&gt;
*A windows may pop up before you can edit settings click &amp;quot;continue&amp;quot;&lt;br /&gt;
*click modify settings, click on Local intranet, click Sites, click Advanced&lt;br /&gt;
*add:&lt;br /&gt;
 file://mydomain.edu&lt;br /&gt;
*click, close, OK, OK, and Apply&lt;br /&gt;
*Configuring Automatic Resolution Policy(when sync conflicts rise keep the last modified file)  &lt;br /&gt;
*Navigate to  Computer Configuration =&amp;gt; Preferences =&amp;gt; Windows Settings =&amp;gt; Registry&lt;br /&gt;
*create a new registry item&lt;br /&gt;
*add: Software\Microsoft\Windows\CurrentVersion\NetCache\SyncConflictHandling :to the key path&lt;br /&gt;
*in the UNC path add the share you want to Auto resolve conflicts with, \\DOMAIN\users&lt;br /&gt;
*set Value Data to 4&lt;br /&gt;
**0-7: &lt;br /&gt;
***1:Keep the local state. This overwrites the remote copy with the local copy's contents. If the local copy was deleted, this deletes the remote copy on the server.&lt;br /&gt;
***2:Keep the remote state. This overwrites the local copy with the remote copy's contents. If the remote copy was deleted, this deletes the local copy in the Offline Files cache.&lt;br /&gt;
***4:Retains the state of the latest operation as determined by last-change times of the items in conflict. If the local item was deleted, the time of deletion is used for comparison.&lt;br /&gt;
*save and apply&lt;br /&gt;
&lt;br /&gt;
==Map a Network Drive with GPO==&lt;br /&gt;
*Go to User Configuration =&amp;gt; Preferences =&amp;gt; Windows Settings =&amp;gt; Drive Maps&lt;br /&gt;
*Create new mapped drive with:&lt;br /&gt;
 Action:Create&lt;br /&gt;
 Location: \\mydomainname.edu\folder\location&lt;br /&gt;
 Reconnect:Checked&lt;br /&gt;
 Use:&amp;quot;*&amp;quot; (pick any drive letter)&lt;br /&gt;
 Hide/Show this drive:Show this Drive&lt;br /&gt;
 Hide/Show all drives:No Change&lt;br /&gt;
*click Okay &lt;br /&gt;
*samba must be restarted for GPO to take effect&lt;br /&gt;
*make sure all the right ports are open on your firewall or mapped drive may not connect, tcp 137, udp 137 etc..&lt;br /&gt;
&lt;br /&gt;
==Windows Update GPO==&lt;br /&gt;
*Download ADM files from Microsoft&lt;br /&gt;
*Install when asked, navigate to where it installed the ADM files. Usually C:\Program Files(x86)\Microsoft Group Policy\Windows Server...\...&lt;br /&gt;
*copy only wuau.adm to \\mydomain.edu\sysvol\mydomain.edu\Policies\PolicyDefinitions\&lt;br /&gt;
*Edit GPO&lt;br /&gt;
*Go to Computer Configuration =&amp;gt; Policies =&amp;gt; Administrative Templates =&amp;gt; Windows Components =&amp;gt; Windows Update&lt;br /&gt;
*still testing, enable the following&lt;br /&gt;
 Configure Automatic Updates: Enabled: Auto Download and Schedule Install: Every Day: 17:00&lt;br /&gt;
 Specify intranet Microsoft update service location: Enabled: http://servername:port, http://servername:port&lt;br /&gt;
 Automatic Updates Detection Frequency: enabled 12 hours&lt;br /&gt;
 Allow non administrators to receive update notifications : enabled&lt;br /&gt;
 Allow Automatic Updates immediate installation: Enabled&lt;br /&gt;
 No auto-restart with logged on user for scheduled automatic updates installations: Enabled&lt;br /&gt;
 Reschedule Automatic Updates scheduled installations: Enabled: 10 minutes&lt;br /&gt;
 Enable clients-de targeting: Enabled or Disabled, can be used to organize wsus better&lt;br /&gt;
 Allow signed updates from an intranet Microsoft update service location: enabled&lt;br /&gt;
&lt;br /&gt;
==SSSD==&lt;br /&gt;
 vim /etc/sssd/sssd.conf&lt;br /&gt;
 [domain/default]&lt;br /&gt;
 ldap_tls_reqcert = allow&lt;br /&gt;
 ldap_id_use_start_tls = True&lt;br /&gt;
 cache_credentials = True&lt;br /&gt;
 ldap_search_base = dc=domain,dc=edu&lt;br /&gt;
 krb5_realm = $REALM&lt;br /&gt;
 id_provider = ldap&lt;br /&gt;
 auth_provider = ldap&lt;br /&gt;
 chpass_provider = ldap&lt;br /&gt;
 ldap_uri = ldap://domain.edu&lt;br /&gt;
 ldap_tls_cacertdir = /etc/openldap/cacerts&lt;br /&gt;
 ldap_schema = rfc2307bis&lt;br /&gt;
 ldap_user_fullname = displayName&lt;br /&gt;
 ldap_user_search_base = ou=idmap,dc=domain,dc=edu&lt;br /&gt;
 ldap_group_search_base = ou=Group,dc=domain,dc=edu&lt;br /&gt;
 ldap_group_member = member&lt;br /&gt;
 ldap_group_nesting_level = 4&lt;br /&gt;
 ldap_tls_cacert = /etc/openldap/cacerts/cacert.pem&lt;br /&gt;
 ldap_tls_reqcert = demand&lt;br /&gt;
 ldap_default_bind_dn = cn=Manager,dc=domain,dc=edu&lt;br /&gt;
 ldap_default_authtok_type = password&lt;br /&gt;
 ldap_default_authtok = ******&lt;br /&gt;
 debug_level = 8&lt;br /&gt;
 [sssd]&lt;br /&gt;
 services = nss, pam&lt;br /&gt;
 config_file_version = 2&lt;br /&gt;
 domains = default&lt;br /&gt;
 [nss]  &lt;br /&gt;
&lt;br /&gt;
 [pam]&lt;br /&gt;
&lt;br /&gt;
==ACL==&lt;br /&gt;
*set privileges&lt;br /&gt;
 net rpc rights grant 'Domain\Domain Admins' SeDiskOperatorPrivilege -Uadministrator&lt;br /&gt;
*view privileges&lt;br /&gt;
 net rpc rights list accounts -Uadministrator&lt;br /&gt;
&lt;br /&gt;
*add group acl to folder or file&lt;br /&gt;
 setfacl -m &amp;quot;g:groupname:permissions&amp;quot; folder&lt;br /&gt;
&lt;br /&gt;
*get and set acls&lt;br /&gt;
 getfacl x | setfacl -R –setfile = -y&lt;br /&gt;
&lt;br /&gt;
==Misc==&lt;br /&gt;
*after a yum update portreserve may have been updated and interferes with samba&lt;br /&gt;
*holds a lock on port 636 for slapd, samba provides an ldap service on 636 so slapd cannot hold it&lt;br /&gt;
*go to /etc/portreserve and remove the slapd file, restart server, portreserve will not hold lock in 636 anymore and samba can use it&lt;br /&gt;
 cd /etc/portreserve&lt;br /&gt;
 rm slapd&lt;br /&gt;
*deleting regedit user profile&lt;/div&gt;</summary>
		<author><name>Stadm1</name></author>
		
	</entry>
</feed>