Solved

AD structure...

Posted on 2004-08-17
3
248 Views
Last Modified: 2010-04-11
Hi, Just want to get some ideas. I´m going to structure a AD for a small company. Is there any best practice to naming computers/servers. I need some tips, someone that have som good thougts?
Regards
Oskar Eriksson
0
Comment
Question by:Oskowich
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Expert Comment

by:shinds57
ID: 11819527
I personally like to name using a number scheme.

Servers
Domain Controllers = 100
File Servers = 200
App Servers = 300
Web Servers= 400
Telephony Servers=500
Clients = 600,700,800,900, 1000

Then I throw in a location
DC= 100R1S1 That means its Domain Controller 100 in Rack1 Slot 1

204R4S6 would be File Server 204 in Rack 4 Slot 6

Clients are a bit different in that you would replace the Rack and Slot with Floor Location, Dept, or Drop Location
684F2DACD139 = Client 684 Floor 2 Dept Accounting Drop 139

This isnt as exciting as comming up with your favorite movie naming scheme but it keeps track of all your devices. But really anything that meets your fancy will be fine.

Good Luck
Shinds57
0
 
LVL 1

Accepted Solution

by:
mgrass earned 50 total points
ID: 11823390
Common coding abbreviations I've used:

SV - Servers
WS - Workstations
PR - Printers
TS - Terminal Servers
DC - Domain Controllers
IIS - Web Servers
MSX - Mail Servers
SQL - SQL Servers
SMS - MS Servers
APP - Application Servers
CLI or WKT - Client Workstation

I use that to replace the 100, 200, etc that Shinds57 recommended, but I do use the rest of his(her) rack/location naming scheme.  It's whatever meets your requirements.  

Mike

 
0
 
LVL 1

Expert Comment

by:shinds57
ID: 11951087
Is this still and issue?

shinds57
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question