Windows 2000 Active Directory

Errata for Windows 2000 Active Directory

Submit your own errata for this product.


The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".

The following errata were submitted by our customers and approved as valid errors by the author or editor.

Color Key: Serious Technical Mistake Minor Technical Mistake Language or formatting error Typo Question Note Update



Version Location Description Submitted By Date Submitted Date Corrected
Printed
Page xvii

The email address to request a catalog or be put on the O'Reilly mailing list was changed from "nuts@oreilly.com" to "info@oreilly.com".

Anonymous    Aug 01, 2000
Printed
Page 12
In the first pargraph, the third sentence did read

"This hierarchy is made up of objects that can act as containers and objects cannot." Now reads: "This hierarchy is made up of objects that can act as containers and objects that cannot."

Anonymous    May 01, 2000
Printed
Page 13
paragraph that begins "Active Directory

I noticed a simple subject-verb agreement error on page 13 in the paragraph that begins "Active Directory is split into...": Text: "One NC is known as the Configuration and holds data representing the entire configuration of the forest, e.g., the list of NCs, how the physical network of sites and servers are configured, and so on." Unless I'm terribly mistaken, and in which case I would beg your pardon, the middle clause should be: "e.g., the list of NCs, how the physical network of sites and servers is configured,". AUTHOR: Paul is quite right. Thanks Paul!

Anonymous   
Printed
Page 15
The first Tip did read

"Although the Schema appears to be a child of the Configuration, ..." Now reads: "Although the Schema container appears to be a child of the Configuration container, ..."

Anonymous    May 01, 2000
Printed
Page 16
In the top paragraph, the third sentence did read

"This ensures that should a search **** comes ***** in from a user for a property that exists in the GC, but to which the user has no read permission, the property will not be returned." Now reads: "This ensures that should a search **** come ***** in from a user for a property that exists in the GC, but to which the user has no read permission, the property will not be returned."

Anonymous    May 01, 2000
Printed
Page 18
second Note Tip

In the second Note Tip, the formatting of the LDAP path has been changed so the entries: "cn= Default Query Policy, cn=Query-Policies..." appear closer together.

Anonymous    May 01, 2000
Printed
Page 45-47
Table 3-2

The title of column 4 did read: "Attribute defined on which object" Now reads: "Attribute is defined on which class"

Anonymous    May 01, 2000
Printed
Page 68
Figure 4-1

Figure 4-1 the arrow showing the passage of time has been changed to point down, rather than up.

Anonymous    May 01, 2000
Printed
Page 76
Table 4-2

The bottom-left entry in Table 4-2 was changed from "1111" to "1112".

Anonymous    Aug 01, 2000
Printed
Page 155
Eight Servers section

The text under "Eight Servers," has been changed to read "Eight Servers: Once you hit eight servers connected together, you need more links across the ring if you are to maintain the three hop rule. If you look at Figure 7-3, you will see this demonstrated. If the cross-ring links did not exist, some servers would be four hops away from one another. The KCC figures out which servers it wishes to link by allowing the last server into the ring to make the initial choice. So, if Server H is the new server in the ring, it knows that Server D is four hops away and makes a connection to it. When Server D's KCC receives the new data that Server H has linked to it, it then reciprocates and creates a link to Server H. However, this doesn't completely solve the problem. Consider Server B and Server F, they're still four hops away from each other. So, now the KCC creates a link between these pairs in order to maintain the three hop rule."

Anonymous    May 01, 2000
Printed
Page 155
Figure 7-3

Figure 7-3: An arrow has been added which points from Server B to Server F. The caption of Figure 7-3 has also been modified. It did read: "Figure 7-3. Eight servers and the extra KCC-generated link" Now reads: "Figure 7-3. Eight servers and the extra KCC-generated links"

Anonymous    May 01, 2000
Printed
Page 243
The third paragraph did read

"If at any point you...Either or both can be used to help solve your problems" Now reads: "If at any point you need to debug group policies, there are two mechanisms: using a checked version of a DLL to produce a special log, or setting registry settings to generate verbose information to the normal event logs. The former has worked for Windows NT for some time and so is adequately described for Windows NT 4.0 System Policies in Microsoft Knowledge Base article Q154120, which can be found at http://support.microsoft.com/support/kb/articles/q154/1/20.asp. The next two sections cover each of these methods, and either or both may be used to solve your problem. However, you should note that the former is probably the more difficult of the two soley because you need to contact Microsoft to get hold of the checked version of the DLL you need, whereas the latter is solely a registry change."

Anonymous    May 01, 2000
Printed
Page 296
bottom

Mission Critical Software and the link no longer exist. They were bought by NetIQ.com. NetIQ.com does the same kind of work, so it can replace Mission Critical Software in the list of vendors.

Anonymous   
Printed
Page 318
Bullet #2 did read

"Zoomit...can be found on their web site at http://www.zoomit.com/." Now reads: "Zoomit and its VIA software was the recognized industry leader in directory interoperability and consolidation in 1999, when Microsoft purchased the company. The product is now available as Microsoft Metadirectory Services. More details can be found here: http://www.microsoft.com/WINDOWS2000/guide/server/features/mms.asp." The footnote at the bottom of the page has also been removed.

Anonymous    May 01, 2000
Printed
Page 334
The first sentence under the "Summary" heading did read

"Microsoft would like everyone to use Active Directory as the one true directory service; so would Novell, Netscape, and Sun." Now reads: "Microsoft would like everyone to use Active Directory as the one true directory service; just as Novell and Netscape/Sun/iPlanet would like you to use theirs."

Anonymous    May 01, 2000
Printed
Page 345
The two www.winntmag.com urls at the top of the page did read

"http://www.winntmag.com/ http://www.winntmag.com/scripting/" Now read: "http://www.win2000mag.com/ http://www.win32scripting.com/"

Anonymous    May 01, 2000
Printed
Page 348
Title of Example 14-3 did read

"SIMPLE.WS" Now reads: "SIMPLE.WSH"

Anonymous    May 01, 2000
Printed
Page 348
In the first text paragraph, it did read

"uses a .WS extension" Now reads: "uses a .WSH extension"

Anonymous    May 01, 2000
Printed
Page 348
In the last line of the first text paragraph, it did read

"In Example 14-4 SIMPLE ADSI.VBS becomes SIMPLE ADSI.VBS in WSH 2.0" Now reads: "In Example 14-4 SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSH in WSH 2.0"

Anonymous    May 01, 2000
Printed
Page 348
The title of Example 14-4 did read

"SIMPLE ADSI.WS" Now reads: "SIMPLE ADSI.WSH"

Anonymous    May 01, 2000
Printed
Page 348
Title of Example 14-3 did read

"SIMPLE.WSH" Now reads: "SIMPLE.WSF"

Anonymous    Aug 01, 2000
Printed
Page 348
The first sentence of the first text paragraph did read

"...uses a .WSH extension." Now reads: "...uses a .WSF extension."

Anonymous    Aug 01, 2000
Printed
Page 348
The last line of the first text paragraph did read

"In Example 14-4, SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSH in WSH 2.0." Now reads: "In Example 14-4, SIMPLE ADSI.VBS becomes SIMPLE ADSI.WSF in WSH 2.0."

Anonymous    Aug 01, 2000
Printed
Page 348
The title of Example 14-4 did read

"SIMPLE ADSI.WSH" Now reads: "SIMPLE ADSI.WSF"

Anonymous    Aug 01, 2000