Windows Domains & Active Directory: A Simplified Overview
This note summarizes key concepts of Windows domains and Active Directory (AD), focusing on practical application.
1. Why Domains?
Managing a small network is easy (manual user accounts, individual settings). But scaling up is difficult:
- Overwhelming workload: Manual configuration becomes time-consuming and error-prone.
- Inconsistent settings: Maintaining uniformity across many computers is challenging.
- Security risks: Individual policy management is less secure.
- Inefficient support: On-site support across multiple locations is impractical.
Solution: Windows Domains and Active Directory (AD) centralize management.
graph LR
A[Small Network] --> B(Manual Management);
C[Large Network] --> D(Windows Domain & AD);
D --> E{Centralized Management};
D --> F{Improved Security};
D --> G{Simplified Administration};
2. Active Directory (AD)
AD is the central database of a Windows domain, storing information about: users, computers, groups, printers, etc. Key AD objects:
- Users: Represent people (employees) or services (e.g., IIS, SQL Server). They are security principals (can access resources).
- Computers: Each domain-joined computer has a machine account (e.g.,
PC-Name$
). It’s a local administrator on that machine. - Security Groups: Combine users/computers to manage permissions easily. (e.g., “Domain Admins,” “Sales Team”).
- Organizational Units (OUs): Containers for organizing users and computers. Used to apply policies to groups of users or computers. A user belongs to only one OU.
graph LR
A[Active Directory] --> B(Users);
A --> C(Computers);
A --> D(Security Groups);
A --> E(Organizational Units);
B --> F{Security Principal};
C --> F;
D --> F;
OUs vs. Security Groups: OUs manage policies, security groups manage permissions. A user can be in multiple security groups.
3. Managing Users & Computers in AD
- Managing Users: Create, delete, modify user accounts in Active Directory Users and Computers (ADUC).
- Delegation: Grant specific users limited AD control (e.g., allowing the IT Help Desk to reset passwords).
- Managing Computers: Organize computers into OUs (e.g., “Workstations,” “Servers”) for easier policy management.
4. Group Policy Objects (GPOs)
GPOs are collections of settings applied to OUs. They can target users or computers.
- Creating GPOs: Create a GPO, configure settings (e.g., password policy, control panel access), and link it to the desired OU(s).
- GPO Distribution: GPOs are distributed via the
SYSVOL
share on the Domain Controller. Usegpupdate /force
to force immediate update.
5. Authentication
- Kerberos: The default and most secure authentication protocol in modern Windows domains.
- NetNTLM: An older protocol, maintained for backward compatibility.
6. Trees, Forests, and Trusts (brief)
- Tree: A single AD database.
- Forest: Multiple trees, allowing for organizational separation.
- Trusts: Relationships between domains or forests, enabling access across different organizational structures.
This simplified overview provides a foundational understanding of Windows domains and AD for managing networks of all sizes. For detailed information, refer to the official Microsoft documentation.