追蹤
Fingers的混搭空間
關於部落格
記錄我花了時間, 腦力, 心力, 體力做過玩過, 正在做正在玩的各種經歷.
  • 66379

    累積人氣

  • 13

    今日人氣

    0

    追蹤人氣

Windows 網域/樹系功能等級列表

http://technet.microsoft.com/zh-tw/library/understanding-active-directory-functional-levels(WS.10).aspx

Features that are available at domain functional levels

The following table shows the features that are available at each domain functional level.

 

Domain functional levelAvailable featuresSupported domain controller operating systems

Windows 2000 native

All of the default AD DS features and the following directory features are available:

  • Universal groups for both distribution and security groups.

     
  • Group nesting

     
  • Group conversion, which allows conversion between security and distribution groups

     
  • Security identifier (SID) history

     
noteNote
In Windows Server 2008 R2, the Personal Virtual Desktop feature was introduced. It requires the Windows 2000 native domain functional level.

  • Windows 2000

     
  • Windows Server 2003

     
  • Windows Server 2008

     
  • Windows Server 2008 R2

     

Windows Server 2003

All the default AD DS features, all the features that are available at the Windows 2000 native domain functional level, and the following features are available:

  • The domain management tool, Netdom.exe, which makes it possible for you to rename domain controllers

     
  • Logon time stamp updates

    The lastLogonTimestamp attribute is updated with the last logon time of the user or computer. This attribute is replicated within the domain.

     
  • The ability to set the userPassword attribute as the effective password on inetOrgPerson and user objects

     
  • The ability to redirect Users and Computers containers

    By default, two well-known containers are provided for housing computer and user accounts, namely, cn=Computers,<domain root> and cn=Users,<domain root>. This feature allows the definition of a new, well-known location for these accounts.

     
  • The ability for Authorization Manager to store its authorization policies in AD DS

     
  • Constrained delegation

    Constrained delegation makes it possible for applications to take advantage of the secure delegation of user credentials by means of Kerberos-based authentication.

    You can restrict delegation to specific destination services only.

     
  • Selective authentication

    Selective authentication makes it is possible for you to specify the users and groups from a trusted forest who are allowed to authenticate to resource servers in a trusting forest.

     
  • Windows Server 2003

     
  • Windows Server 2008

     
  • Windows Server 2008 R2

     

Windows Server 2008

All of the default AD DS features, all of the features from the Windows Server 2003 domain functional level, and the following features are available:

  • Distributed File System (DFS) replication support for the Windows Server 2003 System Volume (SYSVOL)

    DFS replication support provides more robust and detailed replication of SYSVOL contents.

     
  • Domain-based DFS namespaces running in Windows Server 2008 Mode, which includes support for access-based enumeration and increased scalability. Domain-based namespaces in Windows Server 2008 mode also require the forest to use the Windows Server 2003 forest functional level. For more information, see Choose a Namespace Type (http://go.microsoft.com/fwlink/?LinkId=180400).

     
  • Advanced Encryption Standard (AES 128 and AES 256) support for the Kerberos protocol

     
  • Last Interactive Logon Information

    Last Interactive Logon Information displays the following information:

    • The total number of failed logon attempts at a domain-joined Windows Server 2008 server or a Windows Vista workstation

       
    • The total number of failed logon attempts after a successful logon to a Windows Server 2008 server or a Windows Vista workstation

       
    • The time of the last failed logon attempt at a Windows Server 2008 or a Windows Vista workstation

       
    • The time of the last successful logon attempt at a Windows Server 2008 server or a Windows Vista workstation

       
    For more information, see Active Directory Domain Services: Last Interactive Logon (http://go.microsoft.com/fwlink/?LinkId=180387).

     
  • Fine-grained password policies

    Fine-grained password policies make it possible for you to specify password and account lockout policies for users and global security groups in a domain. For more information, see Step-by-Step Guide for Fine-Grained Password and Account Lockout Policy Configuration (http://go.microsoft.com/fwlink/?LinkID=91477).

     
  • Personal Virtual Desktops

    To use the added functionality provided by the Personal Virtual Desktop tab in the User Account Properties dialog box in Active Directory Users and Computers, your AD DS schema must be extended for Windows Server 2008 R2 (schema object version = 47). For more information, see Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide (http://go.microsoft.com/fwlink/?LinkId=183552).

     
  • Windows Server 2008

     
  • Windows Server 2008 R2

     

Windows Server 2008 R2

All default Active Directory features, all features from the Windows Server 2008 domain functional level, plus the following features:

  • Authentication mechanism assurance, which packages information about the type of logon method (smart card or user name/password) that is used to authenticate domain users inside each user’s Kerberos token. When this feature is enabled in a network environment that has deployed a federated identity management infrastructure, such as Active Directory Federation Services (AD FS), the information in the token can then be extracted whenever a user attempts to access any claims-aware application that has been developed to determine authorization based on a user’s logon method.

     
  • Automatic SPN management for services running on a particular computer under the context of a Managed Service Account when the name or DNS host name of the machine account changes. For more information about Managed Service Accounts, see Service Accounts Step-by-Step Guide (http://go.microsoft.com/fwlink/?LinkId=180401).

     
  • Windows Server 2008 R2

     

Features that are available at forest functional levels

The following table shows the features that are available at each forest functional level.

 

Forest functional levelAvailable featuresSupported domain controllers

Windows 2000 native

All of the default AD DS features are available.

  • Windows Server 2008 R2

     
  • Windows Server 2008

     
  • Windows Server 2003

     
  • Windows 2000

     

Windows Server 2003

All of the default AD DS features, and the following features, are available:

  • Forest trust

     
  • Domain rename

     
  • Linked-value replication

    Linked-value replication makes it possible for you to change group membership to store and replicate values for individual members instead of replicating the entire membership as a single unit. Storing and replicating the values of individual members uses less network bandwidth and fewer processor cycles during replication, and prevents you from losing updates when you add or remove multiple members concurrently at different domain controllers.

     
  • The ability to deploy a read-only domain controller (RODC)

     
  • Improved Knowledge Consistency Checker (KCC) algorithms and scalability

    The intersite topology generator (ISTG) uses improved algorithms that scale to support forests with a greater number of sites than AD DS can support at the Windows 2000 forest functional level. The improved ISTG election algorithm is a less-intrusive mechanism for choosing the ISTG at the Windows 2000 forest functional level.

     
  • The ability to create instances of the dynamic auxiliary class named dynamicObject in a domain directory partition

     
  • The ability to convert an inetOrgPerson object instance into a User object instance, and to complete the conversion in the opposite direction

     
  • The ability to create instances of new group types to support role-based authorization.

    These types are called application basic groups and LDAP query groups.

     
  • Deactivation and redefinition of attributes and classes in the schema. The following attributes can be reused: ldapDisplayName, schemaIdGuid, OID, and mapiID.

     
  • Domain-based DFS namespaces running in Windows Server 2008 Mode, which includes support for access-based enumeration and increased scalability. For more information, see Choose a Namespace Type (http://go.microsoft.com/fwlink/?LinkId=180400).

     
  • Windows Server 2003

     
  • Windows Server 2008

     
  • Windows Server 2008 R2

     

Windows Server 2008

All of the features that are available at the Windows Server 2003 forest functional level, but no additional features are available. All domains that are subsequently added to the forest, however, operate at the Windows Server 2008 domain functional level by default.

  • Windows Server 2008

     
  • Windows Server 2008 R2

     

Windows Server 2008 R2

All of the features that are available at the Windows Server 2003 forest functional level, plus the following features:

  • Active Directory Recycle Bin, which provides the ability to restore deleted objects in their entirety while AD DS is running.

     

All domains that are subsequently added to the forest will operate at the Windows Server 2008 R2 domain functional level by default.

If you plan to include only domain controllers that run Windows Server 2008 R2 in the entire forest, you might choose this forest functional level for administrative convenience. If you do, you will never have to raise the domain functional level for each domain that you create in the forest.

  • Windows Server 2008 R2

     

Guidelines for raising domain and forest functional levels

相簿設定
標籤設定
相簿狀態