Active Directory Tutorial For Beginners
Active Directory Tutorial For Beginners
for Beginners
Table of contents
About Netwrix 18
In this Active Directory for beginners tutorial, we will show you how to install, how to configure and how to use
Active Directory. You can also get this Active Directory eBook PDF by providing your email address and the AD
tutorial will be emailed to you.
▪ Active Directory provides centralized authentication and authorization services that enable users to log in to
the network and access the resources that administrators have granted them access permissions for.
▪ Active Directory supports single sign-on (SSO), which allow users to access multiple resources across the
network without having to log in separately to each resource.
▪ AD includes Group Policy, which allows administrators to define and enforce security settings, configurations
and policies across multiple computers and users within the network.
▪ Active Directory serves as a central repository for managing network resources such as users, groups, com-
puters, printers and network devices.
▪ AD stores information about network objects such as users, groups, computers and printers in a structured
hierarchical database.
▪ Active Directory provides security features such as encryption, access controls and auditing to protect sensi-
tive information and ensure compliance with security standards.
▪ Active Directory is designed to scale with the growth of an organization, supporting thousands or even mil-
lions of users, computers, groups and other objects within a single directory.
▪ Active Directory seamlessly integrates with other Microsoft products and services, such as Microsoft Exchange
Server, SharePoint, Microsoft 365 (formerly Office 365) and Azure services, providing a unified identity and
access management solution across the Microsoft ecosystem.
▪ Authentication — Active Directory provides authentication, which is the process of verifying that users are
who they claim to be. Active Directory supports single sign-on, allowing users to authenticate once and then
access multiple resources across the network.
▪ Authorization — Active Directory also manages authorization, which is the process of determining whether to
allow a user to access requested resources using criteria such as their roles and security group membership.
▪ Resource management — Active Directory serves as a central repository for managing network resources
such as computers, servers, printers and network devices. It allows administrators to organize these resourc-
es into logical groupings, making it easier to manage and allocate resources within the network.
▪ Group Policy — AD includes Group Policy, which enables administrators to define and enforce security
policies, settings and configurations across multiple computers and users within the network. This ensures
consistency in configurations and helps enforce security standards.
▪ Directory services — Active Directory stores information about network objects such as users, groups, com-
puters and printers in a structured hierarchical database called the directory. This directory service provides
a scalable and efficient way to organize and access information about network resources.
▪ LDAP — Active Directory supports the Lightweight Directory Access Protocol (LDAP), which provides a stand-
ard method for accessing and querying directory data. LDAP enables applications and services to interact with
the directory for authentication, information retrieval and other purposes.
▪ DNS — Active Directory integrates with the Domain Name System (DNS) to provide name resolution services
within the network. DNS enables users and computers to locate domain controllers and other network re-
sources using friendly names (such as host names) rather than IP addresses.
▪ Trust relationships — Active Directory supports trust relationships between domains to enable users and
resources in one domain to access resources in another domain. Trust relationships are automatically estab-
lished between all domains in a forest, which enables users to seamlessly access resources across domains.
Administrators can also establish external trusts to enable users in one Active Directory domain to access
resources in another domain in a different forest.
▪ Trusts can be one-way or two-way. With a one-way trust, users in one domain can access resources in anoth-
er domain, but the reverse is not true. In a two-way trust, users in both domains can access resources in the
other domain. For example, an external two-way trusts might be established between partner organizations
to facilitate collaboration. Both types of trusts can be transitive or non-transitive. A non-transitive trust is lim-
ited to the specific domains involved. A transitive trust allows access to resources in other trusted domains in
the same forest. For example, suppose there is a transitive trust between Domain A and Domain B. If Domain
B trusts Domain C, then Domain A also trusts Domain C.
▪ Replication — Active Directory uses multi-master replication to ensure that directory data is synchronized
across all domain controllers within the domain. Replication ensures data consistency and fault tolerance,
allowing users to access directory information even if some domain controllers are unavailable.
▪ Forest — The forest is the top-level container in Active Directory and a security boundary. It contains one
or more domains, which all share a common schema, configurations and global catalog. The first domain
created in the forest is the forest root domain; domains added to the forest later are called child domains.
Organizations typically have a single forest, but they can have more.
▪ Tree — A tree is a hierarchical structure within an AD forest that consists of one or more domains arranged in
a contiguous namespace. The root domain of the tree is the first domain created within the tree. Subdomains
created under the root domain are called child domains, and additional child domains can be created under
these child domains, forming a hierarchical tree structure. Domains within the same tree share a contiguous
namespace and are connected by transitive trust relationships, allowing users and resources to access re-
sources across domains within the same tree.
▪ Domain — A domain is a group of users, computers and other objects that are stored in a single Active Di-
rectory database and can be managed together. Each domain has its own security policies, trust relationships
and domain controllers. For example, an organization might have a domain for each of its locations, which is
managed by the local IT team.
▪ Organizational unit (OU) — Organizational units are containers within a domain that are used to organize
and manage subsets of AD objects in that domain. For instance, the domain for a company’s San Francisco
branch might have OUs for each department there, such as Sales and Finance.
▪ AD object — Active Directory objects include user accounts, computer accounts, and security and distribution
groups. Each AD object has a set of attributes. For example, the attributes of a user account include its user-
name, password, contact information, roles and groups.
If a domain has multiple DCs, changes to the AD database on one DC are replicated to the others. This redundan-
cy provides fault tolerance in case a DC experiences problems.
▪ Install the Active Directory Domain Services (AD DS) role to a Windows Server machine.
▪ Promote the server to domain controller.
Install the Active Directory Domain Services Role on a Windows Server
1. Log in to the Windows Server using an account with administrative privileges. Open Server Manager by either
clicking on the Server Manager icon in the taskbar or by searching for "Server Manager" in the Start menu.
2. In the top menu, click Manage and select Add Roles and Features.
3. In the Add Roles and Features Wizard, select Role-based or feature-based installation and click Next.
4. Ensure that the correct server is selected and click Next.
5. On the “Select server roles” page, click Active Directory Domain Services. In the pop-up window, click Add
Features.
6. On the “Select features” page, do not select any additional features. Click Next.
7. On the “Active Directory Domain Services” page, review
the information and click Next.
3. Select the functional levels for the forest and its root
domain, add capabilities like DNS, and set the Directory
Services Restore Mode (DSRM) password. Click Next to
continue.
4. If you selected the DNS option, the “DNS Options” page
may display a warning. Since we are creating a new
forest, we can safely ignore this warning. Click Next to
continue.
3. Search for “RSAT” (or simply scroll down) and check the
box next to RSAT: Active Directory Domain Services
and Lightweight Directory Services Tools. Then click
Next.
Group Management
▪ Group creation/deletion: Event IDs 4727, 4731
▪ Group membership changes: Event IDs 4728, 4729, 4732, 4733.
Easily review the current state of your users and groups, including permissions
and membership
Keep tabs on all security and configuration changes in your Active Directory and
Group Policy with all the critical who, what, when and where details and before
and after values
Be notified about the most critical changes as they happen so you can respond
immediately
Quickly roll back unwanted changes without any downtime or having to restore
from backup
Next Steps