Solved

Domain Controller?

Posted on 2006-11-28
2
296 Views
Last Modified: 2010-04-26
Hello Experts,

I am very new to this.  Could someone please explain to me what a domain controller is and how it works.   I need the explanation in "plain english"  pretend you are explaining this to a child.   I am completely lost.  Thank you.

IC
0
Comment
Question by:IClown
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Assisted Solution

by:killbrad
killbrad earned 20 total points
ID: 18028861
http://en.wikipedia.org/wiki/Domain_controller   says:

" the domain controller (DC) is the server that responds to security authentication requests (logging in, checking permissions, etc.) within the Windows Server domain. "
0
 
LVL 11

Accepted Solution

by:
DoTheDEW335 earned 30 total points
ID: 18029107
A Domain Controller is a computer which acts as a server, other computers that people use (clients) connect to the server with a username and password, then the domain controller communicates with the clients and allows them to use resources (such as space on the server's hard drive or printers) off the server depending on the permission they are given. The Domain Controller contains the User information and policies for the computer. The policies can be used to change computer settings to allow or prevent actions from being taken.. Theres alot more to a domain controller but thats how I would sum it up.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Repairing a physically broken flash drive 4 104
Dell Power edge R310 10 89
Hardware issue - display had rectangle spots then machine froze 10 62
Low ampere 10 118
In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question