Configuring Microsoft Sharepoint Hybrid Capabilities

Total Page:16

File Type:pdf, Size:1020Kb

Configuring Microsoft Sharepoint Hybrid Capabilities Configuring Microsoft SharePoint Hybrid Capabilities Jeremy Taylor, Neil Hodgkinson, and Manas Biswas Forewords by Jeff Teper, Corporate Vice President, Microsoft OneDrive and SharePoint and Seshadri Mani, Principal Program Manager, Microsoft Offi ce 365 OneDrive and SharePoint PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0243-7 Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions and Developmental Editor: Rosemary Caperton Editorial Production: Dianne Russell, Octal Publishing, Inc. Copyeditor: Bob Russell, Octal Publishing, Inc. Technical Reviewers: Jeremy Taylor, Neil Hodgkinson, and Manas Biswas; Technical Review services provided by Content Master, a member of CM Group, Ltd. Cover: Twist Creative • Seattle Visit us today at MicrosoftPressStore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Dedications Jeremy Taylor To my wife, Sylvia, and two daughters, Nasia and Amarissa. Thanks for providing a supportive environment for me to keep focused, which helped me type away at my portions of this book every evening, night, and weekend for two months. I owe you heaps of fun-filled evenings, nights, and weekends now! Neil Hodgkinson I would like to dedicate my contribution to this book to my family. To my wife, Julie, whose love and dedication to our family provided me with the evenings and weekends to spend time writing. To our children, Luke, Cerys, and James who inspire me to so many things with their fantastic outlook on life and how they always see the best in everything. Without the support of my family, my work on this book would have been quite the burden; instead, they helped to make it a fabulous adventure. Manas Biswas My contribution is dedicated to my family. To my son, Manab, who sacrificed his play time for me, and to my wife, Sabita, who gave up family time, making it possible for me to work on this book. To my mom and dad, who put endless efforts into raising me, giving me the opportunities to pursue my career path, and providing me everything that I could ever ask for. Only with the unlimited love, support, and encouragement of my entire family was I able to fulfil my parts of this book. Contents Forewords ........................................................ xvi By Jeff Teper, corporate vice president, Microsoft OneDrive and SharePoint ............. xvi By Seshadri Mani, principal program manager, Office 365 SharePoint, Microsoft Corporation ........................................ xix Introduction ................................................... xxii Acknowledgments ................................................. xxiv From us all ............................................................. xxiv Jeremy Taylor ....................................................... xxiv Neil Hodgkinson .................................................. xxv Manas Biswas ....................................................... xxvi Free ebooks from Microsoft Press ................ xxviii Errata, updates, & book support ................... xxviii We want to hear from you ................................. xxix Stay in touch .............................................................. xxx Chapter 1: Introduction and prerequisites ..... 1 Introduction .................................................................. 2 Overview of SharePoint hybrid solutions .......... 4 iii Contents Hybrid search ............................................................ 4 Hybrid Business Connectivity Services ........... 5 Hybrid OneDrive for Business ............................ 5 Hybrid Sites Features ............................................. 6 Delve ............................................................................ 8 Extranet sharing ....................................................... 8 Technology components overview ...................... 9 Active Directory and Azure Active Directory ..................................................................... 9 IdFix directory synchronization error remediation tool ................................................... 10 Azure AD Connect ............................................... 10 Federation service ................................................ 11 Reverse proxy ........................................................ 11 Certificates .............................................................. 12 SharePoint On-Premises ................................... 14 ULS Viewer .............................................................. 17 Microsoft Visual Studio ...................................... 17 Prerequisites for hybrid scenarios ...................... 17 Modules for hybrid with Windows PowerShell ................................................................... 19 S2S trust........................................................................ 21 iv Contents S2S trust setup—certificate management .......................................................... 22 Configuring the ACS trust ................................. 27 Chapter 2: SharePoint Server hybrid search ................................................................ 31 The importance of search ...................................... 31 Hybrid search overview .......................................... 33 Infrastructure requirements for classic hybrid search deployments .................................. 37 Configuring outbound hybrid search ............... 43 SharePoint on-premises configuration ....... 44 Configuring inbound hybrid search .................. 56 Publishing the SharePoint on-premises web application by using client certificate preauthentication ................................................. 58 Configuring the SharePoint Online Secure Store Target application ..................... 62 SharePoint Online search configuration ..... 65 Configuring bidirectional hybrid search .......... 67 Configuring Cloud Search Service Application .................................................................. 69 Configuring the Cloud Search Service Application .................................................................. 75 v Contents Creating a Cloud Search Service Application via Central Administration........ 76 Creating a Cloud Search Service Application via Windows PowerShell ........... 78 Search Content Service ...................................... 83 Completing the onboarding process ........... 85 Searching from Office 365 with the Cloud Search Service Application .................................... 90 Configuring content sources on-premises ........................................................... 91 Configuring outbound query federation on the Cloud Search Service Application ... 92 Managed property for hybrid search results ........................................................................ 93 Summary ...................................................................... 96 Chapter 3: Business Connectivity Services hybrid ................................................. 98 Overview of Business Connectivity Services hybrid ........................................................... 99 BCS hybrid flow ................................................... 102 Prerequisite Steps for Configuring SharePoint BCS hybrid ..................................... 106 Configuring SharePoint BCS hybrid ............ 112 Validation steps for BCS hybrid .................... 143 vi Contents Chapter 4: Additional hybrid solutions ...... 146 Overview of additional hybrid capabilities .. 147 OneDrive for Business .......................................... 148 OneDrive for Business hybrid ........................ 149 OneDrive for Business synchronization client ........................................................................ 152 Hybrid Sites features ............................................ 154 Hybrid site following ......................................... 154 Hybrid profiles ..................................................... 157 Delve in a hybrid deployment ....................... 161 Extensible hybrid app launcher .................... 165 Overview of configuring additional hybrid capabilities ................................................
Recommended publications
  • ATTACKING RDP How to Eavesdrop on Poorly Secured RDP Connections
    IT SECURITY KNOW-HOW Adrian Vollmer ATTACKING RDP How to Eavesdrop on Poorly Secured RDP Connections March 2017 © SySS GmbH, March 2017 Wohlboldstraße 8, 72072 Tübingen, Germany +49 (0)7071 - 40 78 56-0 [email protected] www.syss.de Vollmer | Attacking RDP 1 Introduction The Remote Desktop Protocol (RDP) is used by system administrators everyday to log onto remote Windows machines. Perhaps most commonly, it is used to perform administrative tasks on critical servers such as the domain controller with highly privileged accounts, whose credentials are transmitted via RDP. It is thus vital to use a secure RDP configuration. We at SySS regularly observe that due to misconfigurations, system administrators in an Active Directory environment are routinely presented with (and ignore) certificate warnings like this: Figure 1: An SSL certificate warning If warnings like these are a common occurrence in your environment, you will not be able to recognize a real man-in-the-middle (MitM) attack. This article was written to raise awareness of how important it is to take certificate warnings seriously and how to securely configure your Windows landscape. The intended audience is system administrators, penetration testers and security enthusiasts. While not necessary, it is recommended that you have a firm understanding of the following subjects: – Public key cryptography as well as symmetric cryptography (RSA and RC4) – SSL – x509 certificates – TCP 2 Vollmer | Attacking RDP – Python – Hexadecimal numbers and binary code We will demonstrate how a MitM can sniff your credentials if you aren’t careful. None of this is particularly new – it even has been done before, for example by Cain [2].
    [Show full text]
  • The Future Computer the Future Computer
    Anyone MICROSOFT TECHNOLOGY who knows DEPLOYMENT ISSUE 6 OCTOBER 2003 this much TECHNOLOGY about our software .NET: CHANGING THE FACE OF DEVELOPING is probably SQL SERVER: WAITING FOR YUKON TERMINAL SERVICES: certifiable. AT YOUR FINGERTIPS The Affinity Homes Group chose Phoenix Software, a Microsoft Certified Partner, to migrate 250 users and their 20 servers to It takes a special company to be a Microsoft Gold Certified Open here Windows 2000, Microsoft Exchange 5.5 and Partner, one that’s demonstrated an exceptional level of You naturally want your IT service provider to have proven Microsoft Exchange 2000 Server. Richard Swift, specialist expertise in a particular Microsoft solution. And expertise across the full range of Microsoft products for the ultimate Head of Information Systems at Affinity you will reap the rewards for all their hard work, as you get commented: “We had been working with and solutions. Every Microsoft Certified Partner has met the assurance of the highest possible levels of service. Microsoft resource guide Phoenix for a number of years and they are a rigorous technical criteria set by Microsoft, so you can be THETHE FUTUREFUTURE Whatever challenges you’re facing, a Microsoft Gold Certified Microsoft Certified Partner, that gave us the confident that they can give you the high level of service Partner is perfectly qualified to make your IT systems for IT Professionals and added comfort of knowing that they had the you expect, together with trustworthy, independent advice. Developers right level of expertise that we were looking for”. workFor moreharder details, for you. visit Visit www.microsoft.com/uk/certified www.microsoft.com/uk/certified COMPUTERCOMPUTER PUSHINGPUSHING THETHE BOUNDARIESBOUNDARIES ATAT < ©Microsoft©Microsoft Corporation.
    [Show full text]
  • Download Deploying Windows 7, Essential Guidance
    FROM THE Windows® 7 Resource Kit Mitch Tulloch, Tony Northrup, Jerry Honeycutt, Ed Wilson, and the Windows 7 Team at Microsoft I Chapter 3 Deployment Platform .............................................. 85 I Chapter 4 Planning Deployment ............................................ 113 I Chapter 5 Testing Application Compatability ........................... 139 I Chapter 6 Developing Disk Images ......................................... 179 I Chapter 7 Migrating User State Data ...................................... 223 I Chapter 8 Deploying Applications .......................................... 247 I Chapter 9 Preparing Windows PE ........................................... 273 I Chapter 10 Confi guring Windows Deployment Services .............. 293 I Chapter 11 Using Volume Activation ........................................ 335 I Chapter 12 Deploying with Microsoft Deployment Toolkit ........... 355 DEPLOYING WINDOWS 7 83 Chapter 3 Deployment Platform n Tools Introduction 85 n Windows 7 Deployment Terminology 87 n Platform Components 89 n Deployment Scenarios 99 n Understanding Setup 101 n Basic Deployment Process 105 n Microsoft Deployment Toolkit Process 107 n Summary 110 n Additional Resources 111 uilding on technology that the Windows Vista operating system introduced, Windows 7 Bdeployment technology has evolved significantly since Windows XP Professional . For example, it supports file-based disk imaging to make high-volume deployments quicker, more efficient, and more cost effective . The Windows 7 operating system also provides
    [Show full text]
  • IT Academy Program Benefits
    IT Academy Program Benefits What Membership Offers IT Academy membership offers many valuable benefits. You can: • Increase your students’ employability with relevant technology courses that help them get jobs after graduation. • Offer educators and other staff members the opportunity to enhance their own professional development. • Gain access to resources that will help you save time and money. • Unlimited access to E-Learning portfolio courses focused on the Microsoft Office applications plus Windows desktop courses, Windows Server, Windows Client, SQL Server, Visual Studio, and many other Microsoft technologies. • The ability to administer content and manage your students’ progress with the online Instructor Learning Management System. • Essential computer skills training with Microsoft Digital Literacy. • One complimentary enrollment in the Microsoft Certified Trainer program for a qualified educator at your institution and a 25 percent discount on enrollments for any additional instructors. • A 60 percent discount on the Full E-Reference Library, which is a collection of E-Reference Libraries for Microsoft Press. • Academic pricing on Microsoft Official Academic Courses (MOAC). • Academic pricing on Microsoft Official Courseware (MOC). • Academic pricing on Microsoft Certification exams. • Up to 100 lab licenses for Windows 7, Microsoft Office Professional 2007, or Microsoft Office Professional Academic 2010. • Five complimentary annual subscriptions to the Full E-Reference Library from Microsoft Press and a 60 percent discount for additional subscriptions. • One complimentary subscription to Microsoft DreamSpark. • One complimentary, Not for Resale (NFR) version of Microsoft TechNet Subscription Professional. Lea • Educator resources such as downloadable and customizable lesson plans to help you save class preparation time, personalized course completion certificates, and a complementary tool that enables you to create your own online courses.
    [Show full text]
  • Tapani Havia
    Tapani Havia Microsoft Windows Server 2012 Centrally Managed Basic Services for Microsoft Windows 8 Clients Helsinki Metropolia University of Applied Sciences Bachelor of Engineering Information Technology Bachelor’s Thesis 14th May 2013 PREFACE This Bachelor’s Thesis is the outcome of my professional knowledge of the Microsoft Windows Server 2012 centrally managed basic services. I wish to thank my instructors Kari Järvi and Jonita Martelius for their invaluable help and support while writing the study. Last but not least I wish to thank my wife Mia Havia for her endless patience while writing the study. Espoo, May 14, 2013 Tapani Havia Abstract Author(s) Tapani Havia Title Microsoft Windows Server 2012 Number of Pages 153 pages + 10 appendices Date 14th May 2013 Degree Bachelor of Engineering Degree Program Information Technology Specialization option Data Networks Instructor(s) Kari Järvi, Principal Lecturer Microsoft published the latest operating system versions; Windows Server 2012 and Windows 8 last autumn. It was the correct time to create a test environment and test how basic services and their centralized remote management could be done nowadays. The purpose was to come up with as versatile an environment as possible which any person interested in the topic could do and continue to the desired direction. The initial plan was to create the test environment in one computer virtually. The environment was done with redundancy of basic services without Network Load Balancing or Failover Clustering features. Finally, the environment within the framework of the study included 11 virtual servers and three virtual workstations. For the host computer’s operating system was chosen the Windows Server 2012 Datacenter edition and the needed hypervisor software was chosen between Microsoft Hyper-V and VMware Workstation 9, the environment was done with VMware.
    [Show full text]
  • 8.2.03 Release Guide
    WebFOCUS Release Guide Release 8.2 Version 03 March 06, 2019 Active Technologies, EDA, EDA/SQL, FIDEL, FOCUS, Information Builders, the Information Builders logo, iWay, iWay Software, Parlay, PC/FOCUS, RStat, Table Talk, Web390, WebFOCUS, WebFOCUS Active Technologies, and WebFOCUS Magnify are registered trademarks, and DataMigrator and Hyperstage are trademarks of Information Builders, Inc. Adobe, the Adobe logo, Acrobat, Adobe Reader, Flash, Adobe Flash Builder, Flex, and PostScript are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Due to the nature of this material, this document refers to numerous hardware and software products by their trademarks. In most, if not all cases, these designations are claimed as trademarks or registered trademarks by their respective companies. It is not this publisher's intent to use any of these names generically. The reader is therefore cautioned to investigate all claimed trademark rights before using any of these names other than to refer to the product described. Copyright © 2018, by Information Builders, Inc. and iWay Software. All rights reserved. Patent Pending. This manual, or parts thereof, may not be reproduced in any form without the written permission of Information Builders, Inc. Contents 1. WebFOCUS Release Information ................................................5 Functionality ......................................................................... 5 Browser Information ...................................................................6
    [Show full text]
  • Deployment Guide | Microsoft Office 365 for Citrix Xenapp and Xendesktop 7.X
    Deployment Guide | Microsoft Office 365 for Citrix XenApp and XenDesktop 7.x Microsoft Office 365 for Citrix XenApp and XenDesktop 7.x Microsoft Office 365 ProPlus is a bundled These challenges are relevant for most software plus subscription-based offering organizations. focused on user productivity-based applications. Office 365 ProPlus includes a Historically, Microsoft Office is one of the combination of online-based applications most common applications delivered via that are accessed from anywhere via a web Citrix XenApp, due to its ability to provide browser, in addition to the latest traditional, the user with the latest version of Office with locally installed version of Microsoft Office. the best user experience for a wide range of Included with Office 365 ProPlus is an online use cases. With Office 365 ProPlus, the value email account that has 50 GB of mail storage of Citrix XenApp has not changed. To deliver and 1 TB of file storage per user licensed for Office 365 to users properly, we provide the OneDrive for Business. following recommendations to enable an optimized user experience while minimizing the potential impact to the underlying Office 365 is a great solution for any infrastructure. organization, but due to user, application and business requirements, there is often Outlook a requirement for a locally installed version of the Office applications in addition to the As part of an Office 365 implementation with online versions. Typically, organizations Citrix XenApp or XenDesktop, organizations require the locally installed versions for the can use Exchange Online instead of managing following reasons: and maintaining Exchange servers installed on-premises.
    [Show full text]
  • Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide
    Microsoft Diagnostics and Recovery Toolset 7 Evaluation Guide White Paper Descriptor This document provides administrators with information and steps-by-step technique for deploying Microsoft® Diagnostics and Recovery Toolset in an enterprise environment. Copyright © 2011 MICROSOFT CORPORATION Overview ................................................................................................................................................... 3 Intended Audience ............................................................................................................................... 3 Prerequisite Knowledge ....................................................................................................................... 3 Creating the DaRT 7 Recovery Image ..................................................................................................... 4 Install DaRT .......................................................................................................................................... 4 Install Debugging Tools for Windows ................................................................................................... 4 Run the DaRT Recovery Image Wizard ............................................................................................... 5 Deploying DaRT 7 Recovery Images ....................................................................................................... 8 Deployment Instructions ........................................................................................................................
    [Show full text]
  • Dell EMC SC Series Storage and Microsoft Multipath I/O
    Dell EMC SC Series Storage and Microsoft Multipath I/O Abstract This document provides an overview of Microsoft® Multipath I/O (MPIO) along with best practice guidelines for configuring MPIO on Microsoft Windows Server® with Dell EMC™ SC Series storage. July 2018 Dell EMC Best Practices Revisions Revisions Date Description October 2010 Initial release October 2010 Corrected errors November 2011 Additional content on Microsoft® Windows Server® Core October 2012 Updated to include Windows Server 2012 content May 2013 Updated to include Windows Server 2008 R2/2012 iSCSI initiator setup and appendix listing recommended hotfixes and registry values October 2013 Updated to include Windows Server 2012 R2 content January 2014 Updated hotfix information January 2015 Updated configuration recommendations March 2015 Updated hotfix and configuration recommendations April 2015 Added SAS front-end content February 2016 Removed Windows Server 2003 content and updated hotfix recommendations October 2016 Re-ordered document for clarity, added Windows Server 2016 and Nano Server content, and updated hotfix recommendations January 2017 Updated configuration recommendations June 2017 Updated hotfix info and configuration recommendations January 2018 Re-ordered document for clarity, updated hotfix and configuration recommendations, updated guidance on Nano Server July 2018 Updated configuration recommendations; added guidance on Live Volume ALUA support with SCOS 7.3 Acknowledgements Author: Marty Glaser The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license.
    [Show full text]
  • Good Practice Guide on Vulnerability Disclosure from Challenges to Recommendations
    Good Practice Guide on Vulnerability Disclosure From challenges to recommendations NOVEMBER 2015 www.enisa.europa.eu European Union Agency For Network And Information Security Good Practice Guide on Vulnerability Disclosure Creation date: November 15 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the European Union (EU), its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Authors This document was created by the CERT Capability team at ENISA in consultation with RAND Europe Project officer Cosmin Ciobanu Contact To contact the authors please use [email protected] For media enquiries about this report, please use [email protected]. Acknowledgements The project team wishes to thank all the interviewees, and those who provided written input for the project, for their time and invaluable insights. Their contribution to this project has been essential. 02 Good Practice Guide on Vulnerability Disclosure Creation date: November 15 Legal notice Notice must be taken that this publication represents the views and interpretations of the authors and editors, unless stated otherwise.
    [Show full text]
  • Dell EMC SC Series: Microsoft Windows Server Best Practices
    Best Practices Dell EMC SC Series: Microsoft Windows Server Best Practices Abstract This document provides best practices for configuring Microsoft® Windows Server® to perform optimally with Dell EMC™ SC Series storage. June 2019 680-042-007 Revisions Revisions Date Description October 2016 Initial release for Windows Server 2016 November 2016 Update to include BitLocker content February 2017 Update MPIO best practices November 2017 Update guidance on support for Nano Server with Windows Server 2016 June 2019 Update for Windows Server 2019 and SCOS 7.4; template update Acknowledgements Author: Marty Glaser The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any software described in this publication requires an applicable software license. Copyright © 2016–2019 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. [5/29/2019] [Best Practices] [680-042-007] 2 Dell EMC SC Series: Microsoft Windows Server Best Practices | 680-042-007 Table of contents Table of contents Revisions............................................................................................................................................................................
    [Show full text]
  • Linee Guida Per L'adozione Di Un Ciclo Di Sviluppo Di Software Sicuro
    LINEE GUIDA PER L’ADOZIONE DI UN CICLO DI SVILUPPO DI SOFTWARE SICURO Linee guida per l’adozione di un ciclo di sviluppo di software sicuro SOMMARIO 1 INTRODUZIONE ............................................................................................................................................... 6 1.1 SCOPO ................................................................................................................................................................. 6 1.2 AMBITO DI APPLICABILITÀ ........................................................................................................................................ 6 1.3 STRUTTURA DEL DOCUMENTO ................................................................................................................................... 6 2 RIFERIMENTI ................................................................................................................................................... 7 2.1 DOCUMENTI APPLICABILI ................................................................................... ERRORE. IL SEGNALIBRO NON È DEFINITO. 2.2 DOCUMENTI DI RIFERIMENTO ................................................................................................................................... 7 3 DEFINIZIONI E ACRONIMI ................................................................................................................................ 8 3.1 DEFINIZIONI .........................................................................................................................................................
    [Show full text]