Errata

Windows 2000 Active Directory

Errata for Windows 2000 Active Directory

Submit your own errata for this product.

The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".

The following errata were submitted by our customers and approved as valid errors by the author or editor.

Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update

Version Location Description Submitted By Date submitted Date corrected
Printed
Page xvii

The email address to request a catalog or be put on the O'Reilly mailing list was changed from "nuts@oreilly.com" to "info@oreilly.com".

Anonymous    Aug 01, 2000
Printed
Page 12
In the first pargraph, the third sentence did read

"This hierarchy is made up of objects that can act as
containers and objects cannot."

Now reads:

"This hierarchy is made up of objects that can act as
containers and objects that cannot."

Anonymous    May 01, 2000
Printed
Page 13
paragraph that begins "Active Directory

I noticed a simple subject-verb agreement error on page 13 in the paragraph that begins "Active Directory is split into...":
Text:
"One NC is known as the Configuration and holds data representing the entire
configuration of the forest, e.g., the list of NCs, how the physical network
of sites and servers are configured, and so on."

Unless I'm terribly mistaken, and in which case I would beg your pardon, the
middle clause should be: "e.g., the list of NCs, how the physical network of
sites and servers is configured,".

AUTHOR: Paul is quite right. Thanks Paul!

Anonymous   
Printed
Page 15
The first Tip did read

"Although the Schema appears to be a child of the Configuration, ..."

Now reads:

"Although the Schema container appears to be a child of the Configuration
container, ..."

Anonymous    May 01, 2000
Printed
Page 16
In the top paragraph, the third sentence did read

"This ensures that should a search **** comes ***** in from
a user for a property that exists in the GC, but to which
the user has no read permission, the property will not be
returned."

Now reads:

"This ensures that should a search **** come ***** in from
a user for a property that exists in the GC, but to which
the user has no read permission, the property will not be
returned."

Anonymous    May 01, 2000
Printed
Page 18
second Note Tip

In the second Note Tip, the formatting of the LDAP path has been changed so the entries: "cn= Default Query Policy, cn=Query-Policies..."
appear closer together.

Anonymous    May 01, 2000
Printed
Page 45-47
Table 3-2

The title of column 4 did read:

"Attribute defined on which object"

Now reads:

"Attribute is defined on which class"

Anonymous    May 01, 2000
Printed
Page 68
Figure 4-1

Figure 4-1 the arrow showing the passage of time has been changed to point down, rather than up.

Anonymous    May 01, 2000
Printed
Page 76
Table 4-2

The bottom-left entry in Table 4-2 was changed from "1111" to "1112".

Anonymous    Aug 01, 2000
Printed
Page 155
Figure 7-3

Figure 7-3: An arrow has been added which points from Server B to Server F. The caption of Figure 7-3 has also been modified. It did read:

"Figure 7-3. Eight servers and the extra KCC-generated link"

Now reads:

"Figure 7-3. Eight servers and the extra KCC-generated links"

Anonymous    May 01, 2000
Printed
Page 243
The third paragraph did read

"If at any point you...Either or both can be used to help solve your
problems"

Now reads:

"If at any point you need to debug group policies, there are two
mechanisms: using a checked version of a DLL to produce a special log, or
setting registry settings to generate verbose information to the normal
event logs. The former has worked for Windows NT for some time and so is
adequately described for Windows NT 4.0 System Policies in Microsoft
Knowledge Base article Q154120, which can be found at
http://support.microsoft.com/support/kb/articles/q154/1/20.asp. The next two
sections cover each of these methods, and either or both may be used to
solve your problem. However, you should note that the former is probably the
more difficult of the two soley because you need to contact
Microsoft to get hold of the checked version of the DLL you need, whereas
the latter is solely a registry change."

Anonymous    May 01, 2000
Printed
Page 296
bottom

Mission Critical Software and the link no longer exist. They were bought by
NetIQ.com. NetIQ.com does the same kind of work, so it can replace Mission
Critical Software in the list of vendors.

Anonymous   
Printed
Page 318
Bullet #2 did read

"Zoomit...can be found on their web site at http://www.zoomit.com/."

Now reads:

"Zoomit and its VIA software was the recognized industry leader in
directory interoperability and consolidation in 1999, when Microsoft
purchased the company. The product is now available as Microsoft
Metadirectory Services. More details can be found here:
http://www.microsoft.com/WINDOWS2000/guide/server/features/mms.asp."

The footnote at the bottom of the page has also been removed.

Anonymous    May 01, 2000
Printed
Page 334
The first sentence under the "Summary" heading did read

"Microsoft would like everyone to use Active Directory as the one true
directory service; so would Novell, Netscape, and Sun."

Now reads:

"Microsoft would like everyone to use Active Directory as the one true
directory service; just as Novell and Netscape/Sun/iPlanet would like you to
use theirs."

Anonymous    May 01, 2000
Printed
Page 345
The two www.winntmag.com urls at the top of the page did read

"http://www.winntmag.com/
http://www.winntmag.com/scripting/"

Now read:

"http://www.win2000mag.com/
http://www.win32scripting.com/"

Anonymous    May 01, 2000
Printed
Page 348
Title of Example 14-3 did read

"SIMPLE.WS"

Now reads:

"SIMPLE.WSH"

Anonymous    May 01, 2000
Printed
Page 348
In the first text paragraph, it did read

"uses a .WS extension"

Now reads:

"uses a .WSH extension"

Anonymous    May 01, 2000
Printed
Page 348
In the last line of the first text paragraph, it did read

"In Example 14-4 SIMPLE ADSI.VBS becomes SIMPLE ADSI.VBS in
WSH 2.0"

Now reads:

"In Example 14-4 SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSH in
WSH 2.0"

Anonymous    May 01, 2000
Printed
Page 348
The title of Example 14-4 did read

"SIMPLE ADSI.WS"

Now reads:

"SIMPLE ADSI.WSH"

Anonymous    May 01, 2000
Printed
Page 348
Title of Example 14-3 did read

"SIMPLE.WSH"

Now reads:

"SIMPLE.WSF"

Anonymous    Aug 01, 2000
Printed
Page 348
The first sentence of the first text paragraph did read

"...uses a .WSH extension."

Now reads:

"...uses a .WSF extension."

Anonymous    Aug 01, 2000
Printed
Page 348
The last line of the first text paragraph did read

"In Example 14-4, SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSH in
WSH 2.0."

Now reads:

"In Example 14-4, SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSF in
WSH 2.0."

Anonymous    Aug 01, 2000
Printed
Page 348
The title of Example 14-4 did read

"SIMPLE ADSI.WSH"

Now reads:

"SIMPLE ADSI.WSF"

Anonymous    Aug 01, 2000