Modulul II
Modulul II
Module 2
Managing objects in AD DS
Contents:
Module Overview 2-1
Module Overview
Active Directory Domain Services (AD DS) can help you manage your network more effectively. For
instance, you can use it to manage user and computer accounts in groups instead of managing one
account at a time. It also provides ways to group objects together in containers called organizational units
(OUs) and to delegate administrative tasks to help you distribute workload efficiently.
Managing device identities is becoming increasingly complex as more employees bring their own devices
into the workplace. As Bring Your Own Device (BYOD) programs expand, you will be managing device
identities for many types of personal devices and the various operating systems that they run. AD DS has
many features that can make this easier.
This module describes how to use both graphical tools and Windows PowerShell to manage user and
computer accounts and groups. It covers how to manage an enterprise network by performing bulk
operations to modify object attributes.
Objectives
After completing this module, students will be able to:
Administer AD DS.
MCT USE ONLY. STUDENT USE PROHIBITED
2-2 Managing objects in AD DS
Lesson 1
Managing user accounts
A user object in AD DS is far more than just properties related to the user’s security identity or account. It is
the cornerstone of identity and access in AD DS. Therefore, consistent, efficient, and secure processes
regarding the administration of user accounts are integral to enterprise security management.
In this lesson, you will learn about managing users’ accounts, which is more complex than just creating and
deleting them. User accounts have attributes that you can use for purposes such as storing additional user
contact information or application-specific information for Active Directory–aware applications.
Additionally, there are user-specific files and settings that are not stored in AD DS but in the user profile.
Lastly, you will learn about using user templates to help you create user accounts more easily.
Lesson Objectives
After completing this lesson, you will be able to:
Allow or deny users permission to sign in to a computer based on their user account identity.
Grant users access to processes and services for a specific security context.
Manage users’ access to resources such as AD DS objects and their properties, shared folders, files,
directories, and printer queues.
A user account enables a user to sign in to computers and domains with an identity that the domain can
authenticate. When you create a user account, you must provide a user logon name, which must be unique
in the domain and forest in which you create the user account.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-3
To maximize security, you should avoid multiple users sharing a single account and instead ensure that
each user who signs in to the network has a unique user account and password.
Note: This course focuses on AD DS accounts. You can also store user accounts in the local
Security Accounts Manager database of each computer, enabling local sign in and access to
local resources. Local user accounts are, for the most part, beyond the scope of this course.
Full Name attribute. Full Name is used to create several attributes of a user object, most notably, the
common name and display name attributes. The common name of a user is the name displayed in the
details pane of the snap in, and it must be unique within the container or OU. If you create a user
object for a person with the same name as an existing user in the same container or OU, you need to
give the new user object a unique Full Name.
UPN logon. User principal name (UPN) logons follow the format user logon name@ (UPN suffix). User
names in AD DS can contain special characters, including periods, hyphens, and apostrophes. These
special characters enable you to generate accurate user names such as O’Hare and Smith Bates.
However, certain programs and applications might have other restrictions. Therefore, we recommend
that you use only standard letters and numbers until you test the applications in your enterprise
environment for compatibility with special characters.
You can manage the list of available UPN suffixes by using the Active Directory Domains and Trusts
snap-in. Right-click the root of the snap-in, click Properties, and then use the UPN Suffixes tab to add
or remove suffixes. The Domain Name System (DNS) name of your AD DS domain is always available as
a suffix, and you cannot remove it. In a multidomain environment, you can assign different UPN
suffixes to users for purposes such as email domain suffixes.
Note: It is important that you implement a user account naming strategy, especially in large
networks in which users might have the same full name. A combination of last name and first
name, and where necessary, additional characters, should yield a unique user account name.
Specifically, it is only the UPN name that must be unique within your AD DS forest. The Full Name
attribute needs to be unique only within the OU where it resides. The User SAMAccountName
name must be unique within that domain.
MCT USE ONLY. STUDENT USE PROHIBITED
2-4 Managing objects in AD DS
Note: The attributes associated with a user account are defined as part of the AD DS schema,
which members of the Schema Admins security group can modify. The schema does not often
change. However, introducing an enterprise-level program (such as Microsoft Exchange Server)
requires many schema changes. These changes enable objects, including user objects, to have
additional attributes.
Attribute categories
The attributes of a user object fall into several broad categories. These categories appear in the navigation
pane of the User Properties dialog box in Active Directory Administrative Center:
Account. In addition to the user’s user name properties (First name, Middle initial, Last name, Full
name) and the user’s various logon names (User UPN logon, User SAMAccountName logon), you
can configure the following additional properties:
o Log on hours. This property defines when the user can use the account access domain computers.
You can use the weekly calendar style view to define Logon permitted hours and Logon denied
hours.
o Log on to. Use this property to define which computers a user can use to sign in to the domain.
Specify the computer’s name and add it to a list of allowed computers.
o Account expires. This value is useful when you want to create temporary user accounts. For
example, you might want to create user accounts for interns who will be at your organization for
just one year. You can set the account expiration date in advance. No one can use the account
after the expiration date until an administrator reconfigures it manually.
o User must change password at next log on. This property enables you to force users to reset
their own password the next time they sign in. This is something you might enable after you reset a
user’s password.
o Smart card is required for interactive log on. This value resets the user’s password to a complex,
random sequence of characters and sets a property that requires that the user use a smart card to
authenticate during logon.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-5
o Password never expires. This is a property that you normally use with service accounts; that is,
those accounts that services use, and not regular users. By setting this value, you must remember
to update the password manually on a periodic basis. However, the system does not force you to
do this at a predetermined interval. Consequently, the account can never be locked out due to
password expiration—a feature that is particularly important for service accounts.
o User cannot change password. You use this option generally for service accounts.
o Store password by using reversible encryption. This policy provides support for programs that
use protocols that require knowledge of the user's password for authentication purposes. Storing
passwords by using reversible encryption is essentially the same as storing plain-text versions of
the passwords. For this reason, you should never enable this policy unless program requirements
outweigh the need to protect password information. This policy is mandatory when you use
Challenge Handshake Authentication Protocol (CHAP) authentication through remote access or
Internet Authentication Service (IAS). It is also mandatory when using Digest authentication in
Internet Information Services (IIS).
o Account is trusted for delegation. You can use this property to allow a service account to
impersonate a standard user to access network resources on behalf of a user.
Organization. This includes properties such as the user’s Display name, Office, Email Address,
various contact telephone numbers, managerial structure, department and organization names,
addresses, and other properties.
Member of. Use this section to define group memberships for the user.
Password Settings. This section includes password settings that apply directly to the user.
Profile. Use this section to configure a location for the user’s personal data and to define a location in
which to save the user’s desktop profile when he or she logs out.
Policy. Use authentication policies to control Kerberos ticket-granting ticket (TGT) lifetimes and the
authentication access control for a specific account, such as high-level administrative accounts.
Silo. Authentication policy silos are containers to which you can assign a user account. You can assign
authentication policies to these silos.
Extensions. This section exposes many additional user properties, most of which do not normally
require manual configuration.
o Change department
Demonstration Steps
o Password: Pa55w.rd
2. Open the Development OU to verify that the Burton Bartels account is present.
Profile path. This path is either a local or, more commonly, a Universal Naming Convention (UNC)
path. The profile stores the user’s desktop settings. If users’ profiles have a UNC path, then the users will
have access to their desktop settings regardless of the domain computer they use to sign in. We refer
to this as a roaming profile.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-7
Logon script. This is a batch file that contains commands that execute when the user signs in. Typically,
you use these commands to create drive mappings. If you use a login script, the name of the script
should be a file name (with extension) only. Scripts should be stored in the C:\Windows\SYSVOL
\domain\scripts folder on all domain controllers. Rather than use a logon script batch file, you will
typically implement logon scripts by using Group Policy Objects (GPOs) or Group Policy preferences.
Home folder. This is a storage area in which users can save their personal documents. You can specify
either a local path or typically a UNC path to the user’s folder. You also must specify a drive letter for
mapping a network drive to the specified UNC path. You can then configure a user’s personal
documents to this redirected home folder.
Note: When you create user accounts to use as templates and use a common location for the
profile path and home folder, you should use the %username% variable in the path. This means
that AD DS can create these folders automatically when the account is used as a template. For
example, you can use the following paths, where the file server is named LON-FS and you have
created shares for the profiles and home folders, profile$ and home$, respectively:
You can use these subnodes to configure all aspects of a user’s desktop profile and app settings. For a given
subnode, such as Documents, you can choose between Basic and Advanced redirection. In Basic
redirection, all users that the GPO affects have their Documents folder redirected to an individually named
subfolder off a common root folder defined by a UNC name, such as \\LON-SVR1\Users\. In Advanced
redirection, you can use security group membership to specify where to store a user’s settings and
documents. For example, you might store a Research and Development user’s documents on a highly
secured server.
MCT USE ONLY. STUDENT USE PROHIBITED
2-8 Managing objects in AD DS
To disable a user account, locate and select the account in Active Directory Administrative Center, and then
in the Tasks pane, click Disable. To enable an account, click Enable in the Tasks pane.
Note: Best practices include disabling the template account so that no one can use it to sign
in, and putting an underscore at the beginning of the name so that the template account is always
at the top of the user list and easy to locate.
Only the most commonly used attributes are copied from the template over to the new user account. These
include:
Group memberships
Home directories
Profile settings
Logon scripts
Logon hours
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-9
Password settings
Department name
Manager
When you copy an account, you must provide the following information for the new account:
First name
Last name
Full name
Attribute fields that are not copied from the template include:
Office
Phone numbers
Street address
Job title
Demonstration Steps
o Password: Pa55w.rd
2. Clear the User must change password at next logon check box.
o Department: Sales
o Manager: Erin Bull
2. Create a new user named Sales User with the password Pa55w.rd.
3. Enable the account and clear the Password never expires attribute.
4. Require the account to change the password the next time the user signs in.
5. View the properties of the newly created Sales User account and ensure that the template properties
are present.
Question: What is the difference between disabling an account and an account being
locked out?
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-11
Lesson 2
Managing groups in AD DS
Although it might be practical to assign permissions and abilities to individual user accounts in small
networks, this becomes impractical and inefficient in large enterprise networks. For example, if many users
need the same level of access to a folder, it is more efficient to create a group that contains the required
user accounts and then assign the required permissions to the group. As an added benefit, you can change
users’ file permissions by adding or removing them from groups rather than editing the file permissions
directly. Before you implement groups in your organization, you must understand the scope of various
Windows Server group types. In addition, you must understand how to use group types to manage access
to resources or to assign management rights and abilities.
Lesson Objectives
After completing this lesson, you will be able to:
Group types
In a Windows Server 2016 enterprise network,
there are two types of groups: security and
distribution. When you create a group, you choose
the group type and scope. Group type determines
the capabilities of the group.
Note: The default group type for newly created groups is security.
Because you can use security groups for both resource access and email distribution, many organizations
use only security groups. However, we recommend that if you use a group for email distribution only, you
should create the group as a distribution group. Otherwise, the group is assigned a security identifier (SID),
and the SID is added to the user’s security access token, which can make the token unnecessarily large.
MCT USE ONLY. STUDENT USE PROHIBITED
2-12 Managing objects in AD DS
You can convert a security group to a distribution group at any time. When you do this, the groupType
attribute changes. A security group that you have converted to a distribution group therefore loses all
permissions assigned to it, even though the ACLs still contain the SID. If you convert a distribution group to
a security group, the reverse occurs—the groupType attribute changes, and you can now assign
permissions to resources to the group.
Note: Consider that when you add a user to a security group, the user’s access token—which
authenticates user processes—updates only when the user signs in. Therefore, if the user is
currently signed in, the user must sign out and sign back in to update his or her access token with
any changed group memberships.
Note: The benefit of using distribution groups becomes more evident in large-scale
Exchange Server deployments, especially when you need to nest these distribution groups across
the enterprise.
Group scopes
Windows Server 2016 supports group scoping. The
scope of a group determines both the range of a
group’s abilities or permissions and the group
membership. There are four group scopes:
o You can assign abilities and permissions on local resources only, meaning on the local computer.
o You can assign abilities and permissions on domain-local resources only, which means on all
computers in the local domain.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-13
o Members can be from the local domain only and can include users, computers, and global groups
from the local domain.
Universal. You use this type of group most often in multidomain networks because it combines the
characteristics of both domain-local groups and global groups. Specifically, the important
characteristics of universal groups are:
o You can assign abilities and permissions anywhere in the forest, as with global groups.
Can be assigned
Group scope Can include members from Can be converted to
permissions to
Domain-local Domain users, domain computers, Local domain Universal groups (if no
global groups, and universal resources only other domain-local
groups from any domain in the groups exist as members)
forest
Domain-local groups from the
same domain
Global Domain users, domain computers, Any domain Universal groups (if it is
and global groups from the same resource in the not a member of any
domain forest other global groups)
MCT USE ONLY. STUDENT USE PROHIBITED
2-14 Managing objects in AD DS
Can be assigned
Group scope Can include members from Can be converted to
permissions to
Universal Domain users, domain computers, Any domain Domain-local groups and
global groups, and universal resource in the global groups (if no other
groups from any domain in the forest universal groups exist as
forest members)
Identities
Global groups
Domain-local groups
Access
Identities (user and computer accounts) are members of global groups, which represent business roles.
Global groups (also known as role groups) are members of domain-local groups, which represent
management rules; for example, determining who has Read permission to a specific collection of
folders.
Domain-local groups (also known as rule groups) are granted access to resources. In the case of a
shared folder, you grant access by adding the domain-local group to the folder’s ACL, with a
permission that provides the appropriate level of access.
In a multidomain forest, the best practice for group nesting is known as IGUDLA. The additional letter U
stands for universal groups:
Identities
Global groups
Universal groups
Domain-local groups
Access
In this case, global groups from multiple domains are members of a single universal group. That universal
group is a member of domain-local groups in multiple domains.
IGDLA example
The figure on the slide represents a group implementation that reflects the technical view of group
management best practices (IGDLA) and the business view of role-based, rule-based management.
Consider the following scenario.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-15
The sales force at Contoso, Ltd. has just completed its fiscal year. Sales files from the previous year are in a
folder called Sales. The sales force needs Read access to the Sales folder. Additionally, a team of auditors
from Woodgrove Bank, a potential investor, require Read access to the Sales folder to perform the audit.
You can implement the security for this scenario by following these steps:
1. Assign users with common job responsibilities or other business characteristics to role groups, which
are implemented as global security groups. Do this separately in each domain. Add salespeople at
Contoso Ltd. to a Sales role group; add auditors at Woodgrove Bank to an Auditors role group.
2. Create a group to manage access to the Sales folders with Read permission. You implement this in the
domain that contains the resource that is being managed. In this case, the Sales folder is in the
Contoso domain. Therefore, you create the resource access management rule group as a domain-local
group named ACL_Sales _Read.
3. Add the role groups to the resource access management rule group to represent the management
rule. These groups can come from any domain in the forest or from a trusted domain, such as
Woodgrove Bank. Global groups from trusted external domains, or from any domain in the same
forest, can be members of a domain-local group.
4. Assign the permission that implements the required level of access. In this case, grant the Allow Read
permission to the domain-local group.
This strategy results in two single points of management, thereby reducing the management burden. One
point of management defines who is in Sales, and the other point of management defines who is an
Auditor. Because these roles are likely to have access to a variety of resources beyond the Sales folder, you
have another single point of management to determine who has Read access to the Sales folder.
Furthermore, the Sales folder might not be a single folder on a single server; it could be a collection of
folders across multiple servers, each of which assigns the Allow Read permission to the single domain-local
group.
Group Policy provides a setting called Restricted Groups that enables you to control the membership of
local groups on domain-joined computers. This setting also enables you to control the membership of
AD DS groups by configuring a GPO and assigning that GPO to the OU holding those computer accounts.
You can find the Restricted Groups setting in the Computer Configuration policy under Windows
Settings, and then under Security Settings. It contains no groups by default.
Note: To configure membership in AD DS groups, you must assign the GPO to the OU that
holds the Domain Controllers computer accounts.
You can also configure group nesting by using the Restricted Groups setting. For example, you could use
Restricted Groups to nest global groups into universal groups. All the rules governing group nesting still
apply when using Restricted Groups.
Note: The Restricted Groups setting is only available in domain-level group policies. It does
not exist in local group policies on Windows client and server operating systems.
Note: The only exception to this rule is that the local default Administrator account can
never be removed from the local Administrators group.
Policy removal
If the group policy object that you used to configure the restricted group membership is unlinked from the
container holding the computer accounts, or if you delete the restricted group entry from the GPO, then
the group memberships that it assigned are not removed. You must modify those group memberships
manually.
Default groups
Windows Server 2016 creates several groups
automatically. These are called default local groups,
and they include well-known groups such as
Administrators, Backup Operators, and Remote
Desktop Users. Windows Servers 2016 creates
additional groups automatically in a domain, both
in the Built-in container and the Users container,
including Domain Admins, Enterprise Admins,
and Schema Admins.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-17
Enterprise Admins (in the Users container of the forest root domain). This group is a member of the
Administrators group in every domain in the forest, which gives it complete access to the
configuration of all domain controllers. It also owns the Configuration partition of the directory and
has full control of the domain-naming context in all forest domains.
Schema Admins (Users container of the forest root domain). This group owns and has full control of
the Active Directory schema.
Administrators (Built-in container of each domain). Members of this group have complete control
over all domain controllers and data in the domain-naming context. They can change the membership
of all other administrative groups in the domain, and the Administrators group in the forest root
domain can change the membership of Enterprise Admins, Schema Admins, and Domain Admins.
The Administrators group in the forest root domain is the most powerful service administration group
in the forest.
Domain Admins (Users container of each domain). This group is added to the Administrators group
of its domain. It therefore inherits all the capabilities of the Administrators group. It is also, by default,
added to the local Administrators group of each domain member computer, thus giving Domain
Admins ownership of all domain computers.
Server Operators (Built-in container of each domain). Members of this group can perform
maintenance tasks on domain controllers. They have the right to sign in locally, start and stop services,
perform backup and restore operations, format disks, create or delete shares, and shut down domain
controllers. By default, this group has no members.
Account Operators (Built-in container of each domain). Members of this group can create, modify,
and delete accounts for users, groups, and computers located in any OU in the domain (except the
Domain Controllers OU) and in the Users and Computers containers. Account Operators group
members cannot modify accounts that are members of the Administrators or Domain Admins
groups, nor can they modify those groups. Account Operators group members also can sign in locally
to domain controllers. By default, this group has no members.
Backup Operators (Built-in container of each domain). Members of this group can perform backup
and restore operations on domain controllers and can sign in locally and shut down domain
controllers. By default, this group has no members.
Print Operators (Built-in container of each domain). Members of this group can maintain print queues
on domain controllers. They also can sign in locally and shut down domain controllers. By default, this
group has no members.
Cert Publishers (Users container of each domain). Members of this group can publish certificates to
the directory. By default, this group has no members.
The Account Operators group is a good example of this. If you examine the capabilities of the Account
Operators group in the preceding list, you can see that members of this group have very broad rights—
they can even sign in locally to a domain controller. In very small networks, you might assign such rights to
one or two individuals who are typically domain administrators anyway. However, in large enterprises, the
rights and permissions granted to Account Operators are usually far too broad. Additionally, the Account
Operators group is, like the other administrative groups, a protected group.
Protected groups
The operating system defines protected groups, which cannot be unprotected. Members of a protected
group become protected by association and no longer inherit permissions (ACLs) from their OU, but
instead receive a copy of an ACL from the protected group. This protected group ACL offers considerable
protection to the members. For example, if you add Jeff Ford to the Account Operators group, his account
becomes protected. The help desk, which has rights to reset all other user passwords in the Employees OU,
cannot reset Jeff Ford’s password. Protected groups include:
Account Operators
Administrators
Backup Operators
Cert Publishers
Domain Admins
Enterprise Admins
Krbtgt
Print Operators
Replicator
Server Operators
Custom groups
You should avoid adding users to the groups that do not have members by default (Account Operators,
Backup Operators, Server Operators, and Print Operators). Instead, create custom groups to which you
assign permissions and user rights that achieve your business and administrative requirements.
For example, Scott Mitchell should be able to perform backup operations on a domain controller but
should not be able to perform restore operations that could lead to database rollback or corruption. In
addition, Scott should not be able to shut down a domain controller, so do not put Scott in the Backup
Operators group. Instead, create a local group and assign it only the Back up files and directories user
right, and then create a global group and add Scott as a member. Then add that global group to the local
group.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-19
Special identities
Windows and AD DS also support special
identities, which are groups in which the operating
system controls membership. You cannot view the
groups in any list (in Active Directory Users and
Computers, for example), view or modify the
membership of these special identities, and or add
them to other groups. You can, however, use these
groups to assign rights and permissions.
Authenticated Users. This identity represents authenticated identities. This group does not include the
Guest account, even if it has a password.
Everyone. This identity includes Authenticated Users and the Guest account.
Interactive. This identity represents users who access a resource while signed in locally to the computer
that is hosting the resource, as opposed to accessing the resource over the network. When a user
accesses any resource on a computer on which the user has signed in locally, the user is added
automatically to the Interactive group for that resource. The Interactive identity also includes users who
sign in through a Remote Desktop Connection (RDC).
Network. This identity represents users who access a resource over the network, as opposed to users
who sign in locally at the computer that is hosting the resource. When a user accesses any resource
over the network, the user is added automatically to the Network group for that resource.
Creator Owner. This identity represents the security principal that created an object. The Creator
Owner automatically has full control permission on the object by virtue of being the entity that created
the object.
The importance of these special identities is that you can use them to provide access to resources based on
the type of authentication or connection, rather than the user account. For example, you could create a
folder on a system that allows users to view its contents when they sign in locally to the system but that
does not allow the same users to view the contents from a mapped drive over the network. You could
achieve this by assigning permissions to the Interactive special identity.
A common scenario for the Creator Owner group is when you set NTFS permissions on a root folder to
allow users to create subfolders, such as home directories. The Creator Owner group grants users full
control permission on those home directories because the user created the subfolder.
MCT USE ONLY. STUDENT USE PROHIBITED
2-20 Managing objects in AD DS
Demonstration Steps
o Beth Burke
o Logan Boyle
Lesson 3
Managing computer objects in AD DS
Computers, like users, are security principals, in that:
They have an account with a logon name and password that Windows Server changes automatically on
a periodic basis.
They can belong to groups and have access to resources, and you can configure them by using Group
Policy.
A computer account begins its lifecycle when you create it and join it to your domain. Thereafter,
day-to-day administrative tasks include:
Renaming, resetting, disabling, enabling, and eventually deleting the computer object.
If you know how to perform these computer-management tasks, then you can configure and maintain the
computer objects within your organization.
Lesson Objectives
After completing this lesson, you will be able to:
also cannot link a GPO to a container. Therefore, we recommend that you create custom OUs to host
computer objects, instead of using the Computers container.
Your administrative model might require you to divide your client and server OUs into smaller groups.
Many organizations create sub-OUs beneath a server OU to classify and manage specific types of servers.
For example, you might create an OU for file and print servers, an OU for database servers, or any number
of OUs that categorize the server types in your organization. By doing so, you can delegate permissions to
manage computer objects in the appropriate OU to the team of administrators for each type of server.
Similarly, geographically distributed organizations with local desktop support teams often divide a parent
OU for clients into sub-OUs for each site. This approach enables each site’s support team to create
computer objects in the site for client computers and then use those computer objects to join computers to
the domain. Your OU structure should reflect your administrative model, so that your OUs can provide
single points of management for delegating administration.
Additionally, by using separate OUs, you can create various baseline configurations by using different GPOs
that are linked to the client and the server OUs. With Group Policy, you can specify configuration for
collections of computers by linking GPOs that contain configuration instructions to OUs. It is common for
organizations to separate clients into desktop and laptop OUs. You then can link GPOs that specify desktop
or laptop configuration to the appropriate OUs.
Note: You can use the redircmp command-line tool to reconfigure the default container for
computers. For example, if you want to change the default container for computers to an OU
called mycomputers, use the following syntax:
redircmp ou=mycomputers,DC=contoso,dc=com
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-23
You must not have exceeded the maximum number of computer accounts that you can add to the
domain. By default, users can add a maximum of 10 computers to the domain; this value is known as
the machine account quota and is controlled by the MS DS MachineQuota value. You can modify this
value by using the Active Directory Services Interfaces Editor (ADSI Edit) snap-in.
Note: We recommend that you pre-create the computer account in the correct OU prior to
joining the computer to the domain. This allows the computer to receive the appropriate group
policies immediately. If you do not pre-create the computer account, the computer account will be
created in the Computers container.
Delegating permissions
By default, the Enterprise Admins, Domain Admins, Administrators, and Account Operators groups
have permission to create computer objects in any new OU. However, as discussed earlier, we recommend
that you tightly restrict membership in the first three groups. In addition, we recommend that you not add
users who are members of the Enterprise Admins, Domain Admins, or Administrators groups to the
Account Operators group. Instead, you should delegate the permission to create computer objects to
appropriate administrators or support personnel. This permission, which you assign to the group to which
you are delegating administration, allows group members to create computer objects in a specified OU. For
example, you might allow your desktop support team to create computer objects in the clients OU and
allow your file server administrators to create computer objects in the file servers OU.
To delegate permissions to create computer accounts, you can use the Delegation of Control Wizard to
choose a custom task to delegate. When you delegate permissions to manage computer accounts, you
might consider granting additional permissions beyond those required to create computer accounts. For
example, you might decide to allow a delegated administrator to manage the properties of existing
computer accounts, to delete the computer account, or to move the computer account.
MCT USE ONLY. STUDENT USE PROHIBITED
2-24 Managing objects in AD DS
Note: If you move a computer from the domain to a workgroup, ensure that you know the
credentials of a local account that has admin rights on the local computer.
After reinstalling the operating system on a workstation, the workstation cannot authenticate, even
though the technician used the same computer name used in the previous installation. Because the
new installation generated a new SID, and because the new computer does not know the original
computer account password in the domain, it does not belong to the domain and cannot authenticate
to the domain.
A computer has not been in use for an extended period, perhaps because the user was working away
from the office or the computer was prebuilt as a spare. During this period, an administrator might
have reset or deleted the computer account.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-25
A computer’s LSA secret gets out of synchronization with the password that the domain knows. You
can think of this as the computer forgetting its password. The computer and the domain do not agree
on the correct password. When this happens, the computer cannot authenticate and the secure
channel cannot be created.
The next topic discusses the steps that you should take in these scenarios.
Error messages or events in the event log indicate similar problems or suggest that passwords, trusts,
secure channels, or relationships with the domain or a domain controller have failed. One such error is
NETLOGON Event ID 3210: Failed To Authenticate, which appears in the computer’s event log.
When the secure channel fails, you must reset it. Many administrators do this by removing the computer
from the domain, putting it in a workgroup, and then rejoining the computer to the domain. Removing the
computer from the domain disables the computer account in AD DS. When you rejoin the computer to the
domain, it reuses the same computer account, but loses its group memberships. Do not rename the
computer when you rejoin it to the domain.
You also can reset the secure channel between a domain member and the domain by using:
If you reset the account, the computer’s SID remains the same, and the computer maintains its group
memberships.
To reset the secure channel by using Active Directory Users and Computers or Active Directory
Administrative Center, follow this procedure:
3. Rejoin the computer to the domain, and then restart the computer.
MCT USE ONLY. STUDENT USE PROHIBITED
2-26 Managing objects in AD DS
2. Rejoin the computer to the domain, and then restart the computer.
To reset the secure channel by using netdom, type the following command at a command prompt, where
the credentials belong to the local Administrators group of the computer:
This command resets the secure channel by attempting to reset the password on both the computer and
the domain, so it does not require rejoining or rebooting.
To reset the secure channel by using nltest, on the computer that has lost its trust, type the following
command at a command prompt:
You also can use the Active Directory module for Windows PowerShell to reset a computer account. To
reset the secure channel between the local computer and its domain, run this command on the local
computer:
Test‐ComputerSecureChannel ‐Repair
Use the command-line tool djoin to perform an offline domain join. This generates a domain-join file and
then imports it to the client computer. When you perform an offline domain join, you need to specify the
following information:
The name of the savefile that you are transferring to the target of the offline domain join.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-27
1. To provision a computer account in the domain and create the domain-join file, open an elevated
command prompt and use the djoin command with the /provision option. The format for this
command is:
For example, to join the computer Canberra to the domain adatum.com by using the savefile
Canberra‐join.txt, type the following command:
If the computer account is not prestaged, it will be created in the Computers container. If the computer
account is prestaged, then you must include the /reuse option in the djoin command.
2. To transfer the savefile to the provisioned computer, use the djoin command with the /requestODJ
option. The format for this command is:
Optionally, you can perform the import on an online operating system by using the /localOS option. If
you are using the /localOS option, then set the /WindowsPath option to %systemroot% or
%windir%. For example, to transfer the savefile Canberra-join.txt to the computer Canberra, type
the following command on Canberra:
Question: What causes a computer to lose its trust relationship with the domain?
MCT USE ONLY. STUDENT USE PROHIBITED
2-28 Managing objects in AD DS
To begin deployment of the new branch office, you are preparing AD DS objects. As part of this
preparation, you need to create users and groups for the new branch office that will house the Research
department. Finally, you need to reset the secure channel for a computer account that has lost connectivity
to the domain in the branch office.
Objectives
After completing this lab, you will have:
Lab Setup
Estimated Time: 45 minutes
Password: Pa55w.rd
For this lab, you need to use the available VM environment. Before you begin the lab, you must complete
the following steps:
1. On the host computer, start Hyper-V Manager.
2. In Hyper-V Manager, click 20742B-LON-DC1, and then in the Actions pane, click Start.
o Password: Pa55w.rd
o Domain: Adatum
5. Repeat steps 1 through 3 for 20742B-LON-CL1. Do not sign in to LON-CL1 until instructed to do so in
the lab steps.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-29
o In the Research OU, create a global distribution group named Research Mail.
4. Provide Cai Chu with the right to update the group membership list.
5. In the Research OU, create a new global security group named Research Managers.
2. Create new users for the Research branch office based on the template.
Task 1: Create and configure a user template for the Research department
1. Create a new user in the Research OU with the following properties:
o Name: _Research Template
o Password: Pa55w.rd
o Department: Research
o Company: Adatum
Task 2: Create new users for the Research branch office based on the template
1. Use Active Directory Users and Computers to copy the _Research Template account.
2. Create the new user from the template with the following properties:
o Password: Pa55w.rd
o Account status: Enabled
o Company: Adatum
2. Start an elevated session of Windows PowerShell, and then run the following command:
Test-ComputerSecureChannel –Repair
3. Sign out of LON-CL1, and then attempt to sign in as Adatum\Adam. The sign in will succeed now.
Question: What credentials are necessary for any computer to join a domain?
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-33
Lesson 4
Using Windows PowerShell for AD DS administration
You can use Windows PowerShell to automate AD DS administration. Automating administration speeds
up processes that you might otherwise perform manually. Windows PowerShell includes cmdlets for
performing AD DS administration and for performing bulk operations. You can use bulk operations to
change many AD DS objects in a single step, rather than updating each object manually.
Lesson Objectives
After completing this lesson, you will be able to:
Cmdlet Description
Cmdlet Description
If you do not use the -AccountPassword parameter, then no password is set and the user account is
disabled. You cannot set the Enabled parameter as $true when no password is set.
If you use the -AccountPassword parameter to specify a password, then you must specify a variable
that contains the password as a secure string or choose to receive a prompt for the password. A secure
string is encrypted in memory. If you set a password, then you can enable the user account by setting
the -Enabled parameter as $true.
The following table lists commonly used parameters for the New ADUser cmdlet.
Parameter Description
HomeDirectory Defines the location of the home directory for a user account.
HomeDrive Defines the drive letters that map to the home directory for a user
account.
The following command is an example of a command that you could use to create a user account with a
prompt for a password:
Cmdlet Description
Parameter Description
GroupScope Defines the scope of the group as DomainLocal, Global, or Universal. You
must provide this parameter.
DisplayName Defines the Lightweight Directory Access Protocol (LDAP) display name for
the object.
Parameter Description
The following command is an example of what you could type at a Windows PowerShell prompt to create a
new group:
The *-ADGroupMember cmdlets modify the membership of a group. For example, you add or
remove members of a group.
Note: Piping is a common process in scripting languages that allows you to use the output of
one cmdlet as input for the next cmdlet in the command. For example, this command creates a
user account and then enables the account:
Cmdlet Description
Parameter Description
Enabled Defines whether the computer account is enabled or disabled. By default, the
computer account is enabled and a random password is generated.
The following is an example of a command that you can use to create a computer account:
Cmdlet Description
Parameters Description
The following is an example of a command that you can use when you want to create a new OU:
Disable all user accounts that no one has used in the past six months.
Change the department name for all users belonging to a given department.
You can perform bulk operations with graphical tools, at a command prompt, or by using scripts. Each
method for performing bulk operations has different capabilities. Consider that:
There are limits to the properties that graphical tools can modify.
Command-line tools are more flexible than graphical tools when defining queries, and they have more
options for modifying object properties.
Scripts can combine multiple command-line actions for the most complexity and flexibility.
Demonstration Steps
1. Open Active Directory Users and Computers, and then select the Research OU.
2. Sort the object by Type, and then select all the User objects.
4. Check the General tab in the properties of one of the users to ensure the update has occurred.
Parameter Description
SearchBase Defines the AD DS path to begin searching; for example, the domain or an
OU.
SearchScope Defines at what level below SearchBase to perform the search. You can
choose to search in the base only, one level down, or in the entire subtree.
ResultSetSize Defines how many objects to return in response to a query. To ensure that
all objects are returned, set this to $null.
Properties Defines which object properties to return and display. To return all
properties, type an asterisk (*). You do not need to use this parameter to
use a property for filtering.
Create a query
You can use the Filter parameter or the LDAPFilter parameter to create queries for objects with the
Get-AD* cmdlets. Use the Filter parameter for queries that you write in Windows PowerShell, and use the
LDAPFilter parameter for queries that you write as LDAP query strings.
Windows PowerShell is preferable because:
Operator Description
-eq Equal to
Operator Description
Filter
As previously mentioned, you can use the Filter parameter to filter data that a Get-* cmdlet retrieves. The
Filter parameter uses the same syntax as the Where-Object cmdlet in Windows PowerShell. As an
example, the following is a command that retrieves all user accounts with Smith as their last name, followed
by the output of the command:
The Get-* cmdlets that you use to retrieve data from AD DS do not always return all properties for the
objects that they retrieve. For instance, looking at the output above you see only some of the properties
that a user account has in AD DS. You do not see the mail property, for instance. You can use the
-Properties parameters to retrieve properties not returned by default when you run Get-* cmdlets. For
example, the code below returns the same list of users, but with the mail and PasswordLastSet properties:
SID : S-1-5-21-322346712-1256085132-1900709958-1408
Surname : Smith
UserPrincipalName : [email protected]
Use the following command to display all the properties for a user account:
Use the following command to return all the user accounts in the Marketing OU and all its child OUs:
Use the following command to show all the user accounts with a last sign-in date before a specific date:
Use the following command to show all the user accounts in the Marketing department that have a last
sign-in date before a specific date:
Get‐ADUser ‐Filter {(lastlogondate ‐lt "January 1, 2016") ‐and (department ‐eq "Marketing")}
LDAPFilter
You can also use the LDAPFilter parameter to filter data that a Get-* cmdlet retrieves. The LDAPFilter
parameter takes a string value that uses the same syntax that you use to build an LDAP query. For example,
this command retrieves all users whose last name is Smith:
Search-ADAccount
One of the disadvantages of the Get-AD* cmdlets is how they deal with the UserAccountControl
property. This property is a 4-byte bitmap, where each bit corresponds to a different property linked to an
Active Directory account. The table below shows some of the bits in the bit map.
Additional Reading: For more information, refer to: “How to use the UserAccountControl
flags to manipulate user account properties” at: http://aka.ms/Mxt8a1
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-43
When you read the UserAccountControl property, you receive a numerical value, not a group of true/false
values per individual flag. For example, the following code shows the UserAccountControl property for all
users whose last name begins with Sm:
Imagine that you need to retrieve a list of all disabled accounts in AD DS. To do that, you need to retrieve all
accounts in which the UserAccountControl property has the second-to-last bit enabled. You can do this
by using this code:
Memorizing, or even looking up, flags in the UserAccountControl property is a time-consuming job. Of
course, you can create scripts that already have the code built in and just reuse them. However, it would be
better to have a command that abstracts all that work for you, which is what the Search-ADAccount
cmdlet does. You can retrieve a list of disabled accounts by using the Search-ADAccount cmdlet as
follows:
That is much easier than using Get-ADUser. The following table lists the parameters that the
Search-ADAccount cmdlet uses.
Parameter Description
AuthType Specifies the authentication type used when running this command.
AccountExpiring Retrieves a list of accounts that expire within a given time span.
AccountInactive Retrieves a list of accounts that will become inactive within a given
time span.
PasswordExpiring Retrieves a list of accounts that have passwords that will expire within
a period.
PasswordNeverExpires Retrieves a list of accounts that have passwords that never expire.
Parameter Description
Additional Reading: For more information, refer to: “Set-ADUser” at: http://aka.ms/K34c8d
As another example, to generate a list of user accounts that have not signed in since a specific date, and
then disable those accounts, you could use the following command:
This is a possible command that you could use to disable the user accounts listed in a text file:
FirstName,LastName,Department
Greg,Guzik,IT
Robin,Young,Research
Qiong,Wu,Marketing
In many cases, you will create scripts that you will reuse for multiple .csv files, and you will not know how
many rows there are in each .csv file. In these cases, you can use a foreach loop to process each row in a
.csv file. You do not need to know how many rows there are. During each iteration of the foreach loop, a
row from the .csv is imported into a variable that is then processed.
Use this command to import a .csv file into a variable, and use a foreach loop to display the first name from
each row in a .csv file:
The execution policy on a server determines whether scripts can run. The default execution policy on
Windows Server 2016 is RemoteSigned. This means that local scripts can run without being signed
digitally. You can control the execution policy by using the Set-ExecutionPolicy cmdlet.
Demonstration Steps
Note: Notice that this command filters by using brackets rather than quotes and uses the
Set-ADUser cmdlet rather than a foreach loop.
Create a new OU
In the Administrator: Windows PowerShell window, run the following command:
Verify that the user accounts were created and that the accounts were modified
In Active Directory Users and Computers, confirm that:
Lesson 5
Implementing and managing OUs
When you design your OU structure, planning the Active Directory administrative tasks delegation model is
essential. Although you can use OUs to apply group policies, partition objects, or represent your
organization’s business structure, this model is the most important design consideration for the OU
structure. The administrative tasks delegation model depends on the processes and administrative
requirements in your organization. In this lesson, you will learn about planning and considerations for OU
structure, how permissions work for OUs, and how to delegate permissions for administrative tasks.
Lesson Objectives
After completing this lesson, you will be able to:
Plan OUs.
Explain AD DS permissions.
Delegate AD DS permissions.
Planning OUs
As an important administrative component in your
Active Directory domain, OUs enable you to
partition and organize domain objects into a
hierarchical structure. OUs can help you to:
There are several strategies for designing OU structures. The following OU design strategies are the most
common.
Location-based strategy
This strategy uses locations for each top-level OU in the root of the domain. These location-based OUs are
the main organizational element of the OU structure. For example, A. Datum Corporation might use a
location-based strategy to create OUs for each of its physical locations—in London, Toronto, and Sydney—
and then create additional OUs for their branch distribution centers. Each AD DS resource (such as users,
groups, and computers) is located in the OU that corresponds to the location where the resource resides.
The location-based strategy is common when each location operates relatively independently or when
many tasks are delegated to decentralized administrators. For example, the administrative staff in London
can perform the main administrative duties. Administrators in Sydney or Toronto who have some delegated
rights can access their users, groups, and computers quickly. It is advantageous for the local staff to fulfill
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-49
some administrative duties across different types of objects in the same branch. In addition, you do not
have to move objects frequently between the top-level OUs, unless the objects move to another physical
location. Moving objects to another physical location likely requires moving home folders or Microsoft
Exchange Server mailboxes. The location-based strategy also works well for organizations that expect to
expand into new locations, because you can add new locations easily to the OU structure.
Resource-based strategy
This strategy relates to the functions of resources that are in the OU structure. Typically, you separate
resources by function (or objects by type), and you create OUs to represent these functions. For example,
some common top-level OUs are Servers, Workstations, Groups, and Users. The resource-based strategy is
common in smaller organizations, in organizations that administrative staff maintain centrally, and where
administrative delegation is based on the object type, rather than on the location or department. Examples
of these administrative groups include User Helpdesk, Client Support, Virtualization Administration,
and Application-Specific Support. In large organizations, it is likely that those top-level OUs are more
defined in the next subordinate level. For example, the Servers OU might contain child OUs named after
their applications, such as Microsoft Exchange Server or Microsoft SQL Server.
Organization-based strategy
This strategy reflects the structure of an organization’s business logic. Top-level OUs represent departments
within the organization, such as Sales, Research, or Finance. This strategy works well if resources move
frequently or if they are not affiliated with a physical location, and if there are few employee changes
between departments. You should consider this strategy when administrative tasks are delegated on a per-
department basis rather than a per-location basis. For example, an organization with traveling sales teams
and other units that are not location-bound would benefit from an organization-based strategy. However,
this strategy is not a good choice for organizations that frequently realign their business model or that
encourage employees to shift between roles.
Multitenancy-based strategy
This strategy is suitable for organizations that provide the Active Directory infrastructure as a service (IaaS)
to other organizations. This might be a group of affiliated organizations that share the same domain, a
hosted environment, an outsourced environment, or even a private or public cloud provider. This strategy is
appropriate when one organization maintains the Active Directory infrastructure while another
organization manages certain Active Directory objects, or if the first organization relies completely on the
administration of the hosting organization. For example, A. Datum might maintain AD DS for Trey Research
and Contoso, Ltd. Trey Research might want to administer their Users, Groups, and Computers OUs
independently, but might not want to manage Active Directory replication and DNS. Contoso, Ltd. relies
fully on the IT staff from A. Datum for all these tasks. In this scenario, A. Datum would create a top-level OU
for ITServices, where they maintain all administrative accounts and groups, and top-level OUs named
ADatum, Contoso, Ltd., and TreyResearch for each of the managed organizations. Under these OUs, regular
user, group, workstations, and perhaps server accounts are represented as deeper levels. The IT staff of Trey
Research would maintain their own accounts as designed. In the multitenancy-based strategy, it is possible
to allow different tenants to work together or to create privacy settings so that each organization sees its
own resources only. In this strategy, including or separating new organizations can be a straightforward
process.
Hybrid strategy
This strategy uses a combination of OUs based on location, organization, and resources. The multitenancy-
based strategy is also a hybrid strategy. Other hybrid strategies might assign the location at the top level
and separate object types on the next level. The structure of the hybrid strategy depends on the
organizational requirements. For example, the Servers OU could contain OUs for FileServers, IIS, SQL Server,
Exchange Server, and other application servers. The Users OU might contain location or departmental OUs,
MCT USE ONLY. STUDENT USE PROHIBITED
2-50 Managing objects in AD DS
the Workstations OU might distinguish between Desktops and Laptops, and the Groups OU could
incorporate departmental, location, project, or application-specific groups.
Regardless of which strategy you use to design your OU structure, always remember that the main purpose
is to enable the implementation of an Active Directory administrative tasks model. A second priority might
be Group Policy. We also recommend separating administrative accounts and groups from regular user
accounts and groups that delegated administrators might administer.
OU hierarchy considerations
When planning Active Directory functionality, you
should consider the following high-level aspects of
OU design:
Inheritance. Inheritance is an important aspect of OU functionality, both for delegation of control and
GPO application. You should design the OU structure to include objects that require the same
administrative control or Group Policy settings within the same OU structure. This way, you can assign
the delegation of control or the GPO setting only once at a higher level in the OU structure, rather than
individually at each child level. Remember that you can block inheritance for certain child OUs if you
do not want AD DS to apply the settings for a higher OU level to certain child OUs.
Change. Design your OU structure to accommodate change. After you implement an OU structure, it
can be difficult to change, especially if you also change design strategies, such as changing from an
organization-based strategy to a resource-based strategy. Ensure that your OU structure leaves room
for organizational growth and a reasonable level of structural change.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-51
OU creation
You can create OUs by using graphical tools such
as Active Directory Users and Computers or Active
Directory Administrative Center. You can also
create OUs by using command-line tools such as
Windows PowerShell.
Administrators cannot accidentally delete OUs. If they want to delete an OU intentionally, they must
remove the protection prior to deleting the OU.
OUs that you have newly created by using Active Directory Administrative Center or Active Directory
Users and Computers in Windows Server 2008 or newer have automatic protection against accidental
deletion.
You can enable or disable the protection from accidental deletion in the Active Directory Administrative
Center in the properties dialog box of the OU. You can also use Active Directory Users and Computers
to enable or disable the protection from accidental deletion on the Object tab in the OU Properties
dialog box.
Note: You must enable the advanced view in Active Directory Users and Computers before
you can see the Object tab in the OU properties dialog box.
You can also use Windows PowerShell to enable or disable protection. For example, you can search for OUs
that are not protected and enable protection with the following command:
The object will inherit new permissions from its new OU and will lose any inherited permissions from
the previous OU.
Delete_Child permission on the source OU (or Delete permission on the object that you are moving).
Write_Prop permission on the object for the relative distinguished name (RDN), distinguished name
(DN), and common name (CN) properties.
AD DS permissions
You implement the Active Directory administrative
delegation model by merging the OU design with
the permissions on the OUs. This enables
delegated administrators to fulfil administrative
tasks. To create the administrative task model and
design the OU structure to support it, you must
understand how Active Directory administrative
delegation works. You must also understand the
options for delegating administrative control.
In Windows operating systems, many objects (such as files, folders, registry keys, processes, and Active
Directory objects) contain a security descriptor. Based on the SID, the security descriptor defines which
rights are granted or denied and to whom.
When a user browses files and folders or registry keys, or navigates through the Active Directory domain
structure, the system compares the list of SIDs in the token with the list of SIDs in the security descriptor. If
there are any matching SIDs, the system validates the type of access and allows or prohibits the current
operation.
defines and whether inheritance is blocked at a lower level. New objects obtain default security settings
(which the schema class defines) and inherit security settings from their parents. For example, in the OU
schema definition, Account Operators has full rights to create and delete objects for computer accounts,
user accounts, group objects, and inetOrgPerson objects. Therefore, if you remove the default Account
Operators group from the security permissions of an OU, and then create a child OU, the child OU retains
the explicit security settings of the Account Operators.
An optional DACL. The optional DACL contains permissions for granting or denying access.
An optional SACL. The optional SACL contains the auditing permissions when you have enabled
Success or Failure auditing.
The DACL and SACL are containers that contain one or more access control entries (ACEs). An ACE stores
the following information:
Who (which security principal, such as a user or group) is allowed or denied access.
What permissions are granted to the security principal— Read, Write, Create, or Delete.
At what sublevels can an action be performed (on the OU level only, on objects only in the OU, or
objects in any sub-OU).
In the OU properties dialog box, you use the Security tab—in particular, the Advanced Security dialog
box—to verify or adjust security settings. The Security Delegation Wizard assists with some common
tasks, but you cannot use it to review the security settings.
Delegating AD DS permissions
Domain administrators have full rights to all
objects in the domain. Other default built-in
groups have limited rights to objects in the
domain. For example, the Account Operators
group has full rights over Users, Computers, and
Group objects, but not other types of objects. If
you want certain users or groups to have
permission to perform only specific tasks in
specific areas of the directory, then you must
delegate those tasks.
attribute of a specific object type, such as group account descriptions or their members. Except in rare cases
(such as service accounts), you should always grant administrative control to groups rather than users. Even
if the group contains only one user, this individual might leave the organization, and determining where
that individual had permissions is harder than changing the appropriate group memberships.
There are two methods for delegating administrative control over Active Directory domain resources:
Object-type delegation. In this delegation model, you can delegate various levels of control to groups
based on the objects that the groups control. An example of an object-type delegation would be if you
delegated control to the Toronto Admins group for objects within the Toronto OU. In this case, the
Toronto Admins group is likely responsible for most administrative tasks within the Toronto OU.
You typically use object-type delegation if there are only a few administrators or if minor delegation is
required. This type of delegation also works well if many administrators require the same level of
control, typically over most of the domain structure.
We do not recommend object-type delegation in an environment where different users require various
levels of control over different objects, because it can be difficult to determine which level of control to
grant to which users for a specific object.
Role-based delegation. This delegation model involves creating several specific groups to which you
delegate administrative control. These groups usually relate to a specific resource (or resources), and
you can name groups for the level of control that you assign to them. Unlike object-based delegation,
role-based delegation involves granting permissions to modify only some of the attributes of an
object. For example, you could create the role-based group Change Finance User Password, and
then assign permissions to that group to change passwords for any users in the Finance OU.
To ensure that your role-based delegation is effective, all functions or roles within the Active Directory
domain structure should have an associated group. This level of specificity can help you to determine
which level of control you have assigned to an individual user, because you simply examine the role-
based groups to which the user belongs.
Role-based delegation can take longer to implement than object-type delegation. However, if you
design the OU and group structure properly, role-based delegation saves administrative effort and
frustration, especially for larger organizations.
To start the Delegation of Control Wizard, right-click the container, and then click Delegate Control.
Select the user or group that you wish to assign rights to, and then select the tasks that you want them to
perform.
Note: Running the Delegation of Control Wizard at the domain level provides a common
task to Join a computer to the domain. This task only appears when the wizard runs at the
domain level.
Demonstration Steps
Create a new OU
Use Active Directory Users and Computers to create a new OU named Human Resources in
Adatum.com.
2. Select the Helpdesk group, and then assign the following tasks:
Assign the Research group the right to modify user addresses and job titles in the
Research OU
1. Turn on Advanced Features.
Lab B: Administering AD DS
Scenario
You have been working for the A. Datum Corporation as a desktop support specialist and have performed
troubleshooting tasks on desktop computers to resolve application and network problems. You recently
accepted a promotion to the server support team. One of your first assignments is to configure the
infrastructure service for a new branch office.
To begin the deployment of the new branch office, you are preparing AD DS objects. As part of this
preparation, you need to create an OU for the branch office and delegate permission to manage it. Also,
you need to evaluate Windows PowerShell to manage AD DS more efficiently.
Objectives
After completing this lab, you will have:
Lab Setup
Estimated Time: 45 minutes
Password: Pa55w.rd
For this lab, you need to use the available VM environment. Before you begin the lab, you must complete
the following steps:
2. In Hyper-V Manager, click 20742B-LON-DC1, and then in the Actions pane, click Start.
o Password: Pa55w.rd
o Domain: Adatum
6. Repeat steps 1 through 3 for 20742B-LON-CL1. Do not sign in to LON-CL1 until instructed to do so in
the lab steps.
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-57
Task 2: Create groups for branch administrators and branch help-desk personnel
In the London OU, create the following global security groups:
o London Admins
o London Helpdesk
2. Set permissions on the Security tab of the London OU properties to give the London Admins group
Full Control.
3. Use the Delegation of Control Wizard to grant Full Control over User objects in the London OU to
the London Helpdesk group.
4. Click the London OU, and then notice that those icons are available now.
3. Select the London OU. Notice that the only available icon is the create user icon.
Installed Active Directory Domain Services (AD DS) tools and tested permissions.
3. Create a user account for Ty Carlson in the London OU by running the following command:
Set-ADAccountPassword Ty
Enable-ADAccount Ty
6. Test the account by switching to LON-CL1, and then sign in as Ty with the password Pa55w.rd.
2. Confirm that the user is in the group by running the following command:
Get‐ADGroupMember LondonBranchUsers
FirstName,LastName,Department,DefaultPassword
2. Save the file, and then close the Administrator: Windows PowerShell (ISE) window.
MCT USE ONLY. STUDENT USE PROHIBITED
2-60 Managing objects in AD DS
4. Run the following command to ensure that you created the users:
2. In the Virtual Machines list, right-click 20742B-LON-DC1, and then click Revert.
Question: Why are the users that this script created enabled?
Question: What is the status of accounts that the New-ADUser cmdlet creates?
MCT USE ONLY. STUDENT USE PROHIBITED
Identity with Windows Server 2016 2-61
Tools
The following table lists the tools that this module references.
Active Directory Users and Performing day-to-day In Server Manager, under the
Computers administrative tasks in AD DS. Tools menu, or in Control
Panel in Administrative
Tools.
Best Practice
Consider the following best practices for AD DS administration:
Avoid using the built-in groups to delegate administrative access unless you understand all the
permissions that the group membership grants.
Create specialized administrative groups and assign them only the rights and permissions required to
complete the tasks assigned.
Do not sign in with your administrative account for day-to-day activities. Only use it when you need to
perform an administrative task.