Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Domain Controller?

Posted on 2006-11-28
2
295 Views
Last Modified: 2010-04-26
Hello Experts,

I am very new to this.  Could someone please explain to me what a domain controller is and how it works.   I need the explanation in "plain english"  pretend you are explaining this to a child.   I am completely lost.  Thank you.

IC
0
Comment
Question by:IClown
2 Comments
 
LVL 7

Assisted Solution

by:killbrad
killbrad earned 20 total points
ID: 18028861
http://en.wikipedia.org/wiki/Domain_controller   says:

" the domain controller (DC) is the server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. "
0
 
LVL 11

Accepted Solution

by:
DoTheDEW335 earned 30 total points
ID: 18029107
A Domain Controller is a computer which acts as a server, other computers that people use (clients) connect to the server with a username and password, then the domain controller communicates with the clients and allows them to use resources (such as space on the server's hard drive or printers) off the server depending on the permission they are given. The Domain Controller contains the User information and policies for the computer. The policies can be used to change computer settings to allow or prevent actions from being taken.. Theres alot more to a domain controller but thats how I would sum it up.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question