Managing Objects in AD DS
Managing Objects in AD DS
Managing objects in AD DS
Module Overview
• Users accounts:
• Allow or deny access to sign into computers
• Grant access to processes and services
• Manage access to network resources
Group memberships
Home directory path
Profile path
Logon scripts
Password settings
Department
Manager
• Group types
• Group scopes
• Implementing group management
• Managing group membership by using Group
Policy
• Default groups
• Special identities
• Demonstration: Managing groups in Windows
Server
Group types
• Distribution groups
• Used only with email applications
• Not security enabled (no SID)
• Cannot be given permissions
• Security groups
• Security principal with a SID
• Can be given permissions
• Can also be email-enabled
I: Identities, users, or
computers,
which are members
of
Implementing group management
I: Identities, users, or
computers, which are
members of
G: Global groups, which Sales
(global group)
collect members based on
members’ roles, which are
members of
Auditors
(global group)
Implementing group management
I: Identities, users, or
computers, which are Sales
members of (global group) Auditors
(global group)
G: Global groups, which
collect members based on ACL_Sales_Read
members’ roles, which are (domain-local group)
members of
DL: Domain-local groups,
which provide management
such as resource access which
are
Implementing group management
I: Identities, users, or
computers, which are
members of Sales
Auditors
G: Global groups, which (global group)
(global group)
collect members based on
members’ roles, which are ACL_Sales_Read
members of (domain-local group)
Group Location
Enterprise Admins Users container of the forest root domain
Schema Admins Users container of the forest root domain
Administrators Built-in container of each domain
Domain Admins Users container of each domain
Server Operators Built-in container of each domain
Account Operators Built-in container of each domain
Backup Operators Built-in container of each domain
Print Operators Built-in container of each domain
Cert Publishers Users container of each domain
Special identities
• Special identities:
• Are groups for which membership is controlled by the
operating system
• Can be used by the Windows Server operating system
to provide access to resources Based on the type of
authentication or connection, not on the user account
• Divide OUs:
• By administration
• To facilitate configuration with Group
Policy
Controlling permissions to create computer accounts
Cmdlet Description
New-ADUser Creates user accounts
Set-ADUser Modifies properties of user accounts
Remove-ADUser Deletes user accounts
Set- Resets the password of a user account
ADAccountPassword
Set- Modifies the expiration date of a user
ADAccountExpiration account
Unlock-ADAccount Unlocks a user account after it has
become locked after too many incorrect
sign in attempts
Enable-ADAccount Enables a user account
Disable-ADAccount Disables a user account
New-ADUser "Sten Faerch" –AccountPassword (Read-Host
–AsSecureString "Enter password") -Department IT
Using Windows PowerShell cmdlets to manage groups
Cmdlet Description
New-ADGroup Creates new groups
Set-ADGroup Modifies properties of groups
Get-ADGroup Displays properties of groups
Remove-ADGroup Deletes groups
Add-ADGroupMember Adds members to groups
Get-ADGroupMember Displays membership of groups
Remove-ADGroupMember Removes members from groups
Add- Adds group membership to objects
ADPrincipalGroupMembership
Get- Displays group membership of objects
ADPrincipalGroupMembership
Remove- Removes group membership from an object
ADPrincipalGroupMembership
New-ADGroup –Name "CustomerManagement" –Path
"ou=managers,dc=adatum,dc=com" –GroupScope Global
–GroupCategory Security
Test-ComputerSecureChannel -Repair
Using Windows PowerShell cmdlets to manage OUs
Cmdlet Description
New-ADOrganizationalUnit Creates OUs
Set-ADOrganizationalUnit Modifies properties of OUs
Get-ADOrganizationalUnit Views properties of OUs
Remove-ADOrganizationalUnit Deletes OUs
Parameter Description
SearchBase Defines the AD DS path to begin searching
SearchScope Defines at what level below the SearchBase a search
should be performed
ResultSetSize Defines how many objects to return in response to a
query
Properties Defines which object properties to return and display
Filter Defines a filter by using PowerShell syntax
LDAPFilter Defines a filter by using LDAP query syntax
Descriptions of operators
-eq Equal to -gt Greater than
-ne Not equal to -ge Greater than or equal to
-lt Less than -like Uses wildcards for pattern
-le Less than or equal to matching
Querying objects with Windows PowerShell
Show all the user accounts in the Marketing OU and all its
subcontainers:
Get-ADUser –Filter * -SearchBase
"ou=Marketing,dc=adatum,dc=com" -SearchScope subtree
Show all of the user accounts with a last sign in date older
than a specific date:
Get-ADUser -Filter {lastlogondate -lt "January 1, 2016"}
• Planning OUs
• OU hierarchy considerations
• Considerations for using OUs
• AD DS permissions
• Delegating AD DS permissions
• Demonstration: Delegating administrative
permissions on an OU
Planning OUs
!
• Static
• Not static
• Easy to delegate
• Easy to delegate
administration
administration
• Easy to include
and separate new
tenants
OU hierarchy considerations