This project demonstrates the management of Active Directory (AD) for user account creation, permission management, and the structuring of Organizational Units (OUs).
Resources:
Microsoft Active Directory (AD) is a directory service designed to simplify network management for organizations. Operating on Windows Server, AD efficiently stores and organizes information about network components, including users, devices, and services. It provides convenient access to this information for both administrators and users. Furthermore, AD allows administrators to regulate permissions, manage access to network resources, and create security policies, optimizing overall network management. —
In this step, the virtual machines must sit in the same **resource group** and the same **virtual network** to be connected. The virtual network can be created separately. The **Domain Controller** will have **Windows Server 2022** as the client computer will be **Windows 10**. Windows Server 2022 has access to the **Server Manager**, which will be used later in the steps.
In this demonstration, the NIC in the domain controller needs to be set to static. The **DNS** of the client VM should be configured to match the Domain Controller’s DNS. To check connectivity, turn off the firewall in the domain controller. In the client’s computer, open PowerShell and type ipconfig /all
. Here, the DNS should show the Domain Controller IP address.
In the **Domain Controller**, download the **Active Directory Domain Services** role, set up a new forest with the domain name (it can be the company or department name). Restart the system and log back in with the domain name.
Create **Domain Admin users** by creating new **Organizational Units (OUs)**. For this tutorial, use the names _EMPLOYEES
and _ADMIN
. New employees will have their names and permissions listed under these OUs. Log out and log back in as the new employee to verify access.
Add the **Client-1 Virtual Machine** into the domain. After restarting, the client-1 should appear in the **Active Directory Users and Computers (ADUC)**. Drag the account to _CLIENTS
. Under **_CLIENTS**, users will have non-admin permissions. Log into **Client-1** as an admin (e.g., mydomain.com/alice_admin
).
For more in-depth information on Active Directory and its management, visit the official Microsoft documentation or explore additional resources on related topics:
Note: The steps mentioned above are essential for setting up and managing Active Directory within an organization. With these steps, you’ll be able to control network resources, manage users and permissions, and secure access to your company’s data.
Group Policy in Active Directory is a centralized management tool used to control the working environment of user accounts and computers. Administrators rely on Group Policy Objects (GPOs) to set policies, such as security settings and software installations, across an entire organization. These GPOs are linked to Active Directory containers, such as sites, domains, or organizational units (OUs), and automatically apply their settings to all users or computers within those containers. This functionality simplifies network management by ensuring consistent configurations and enhances security across the enterprise.
To configure Group Policy settings, follow these steps:
Open Group Policy Management Console (GPMC):
On domain controllers, navigate to the Start menu and open the Group Policy Management Console (GPMC).
Finding and Configuring the Account Lockout Policy:
In the Group Policy Management Editor, navigate to:
This is where you can configure account lockout policies, such as lockout duration and thresholds.
This project demonstrates how Group Policy in Active Directory is an essential tool for IT administrators to enforce policies and maintain consistent configurations in an enterprise environment.