SlideShare a Scribd company logo
Eng Ing Eng !

<Insert tada.wav here>
About The Speaker
• Name: Pandu Poluan
• Email: pandu@poluan.info
• Experience:
  – Senior Instructor (of instructors) for Cisco, Microsoft,
    Certified Ethical Hackers
  – IT Manager of Infrastructure,
    PT Panin Sekuritas Tbk
     • 25 branches, 500 employees, 1 domain
  – Systems Administration Manager,
    PT Carrefour Indonesia
     • 85 branches, 10’000+ employees, 2 domains
Active Directory
    An Introduction
What is Active Directory?
• Directory                  • Authentication
  – Database of Objects in     – Into the network
    the Domain                 – Uses “Kerberos”
     •   Users                   mechanism
     •   Computers
     •
                             • Privileges
         Printers
     •   Scanners              – For network resources
     •   Shares                – For admin tasks
     •   Refrigerators       • Active
     •   Coffee Makers
     •   Toilet
Why called “Active”
• Not just auth           • Policies
• Grouping (Many-to-        – Restrictions
  Many)                     – Forced settings
  – Based on Org Struct     – “Push” installation
  – Based on Functional   • Audit
    Team                  • Replication
  – Based on Ad Hoc
                            – One way & Two way
    needs
                            – Bandwidth-adapting
• Delegation
                          • ‘Trust’ Relationship
  – Of admin tasks
  – Of management tasks
Overview of AD Elements
• Domain Controllers
    – Writable & RODC
•   Schema
•   Security Groups
•   SYSVOL
•   Group Policy Objects (GPO)
•   Sites & Subnets
•   ... (and many others, but let’s just focus on the
    above for this “Introduction”)
Domain Controllers
• Where AD database(s) are kept
• Replicate between themselves
  – Two way with writeable DCs, One-way to RODCs
  – Also replicate “SYSVOL”
• MUST be secured at all costs!!
  – Physical security
  – Logical security  RODC
  – Hardening:
     • Allow only special ‘elevated’ accounts ‘administrator-level’
       access to the DCs
The AD “Schema”
• Definition of Objects in AD
  – Properties/Attributes
  – ‘Nature’ of Object
     • E.g., container, custom container, leaf object
• AMAT SANGAT VITAL SEKALI BANGET !!!
  – *IMMEDIATELY* replicated to other DCs
  – Feel free to commit suicide if someone gained
    Schema-editing ability … and botched the schema
Security Groups
• Used to manage privileges/permissions
  practically, systematically, and healthily
  – Managing privileges per user in a big
    enterprise is not good for your health
• Microsoft-recommended Best Practice:


   A G U DL P
   Account   Global   Universal   Domain Local   Permissions
A-P
• The Worst privilege-assignment strategy
  – Imagine having to give 1’000 users the same
    privileges …
  – … to 100 network shares


• Only suitable for … nothing
A-G-P
• NEVER assign permissions directly to
  accounts
• At least, assign permissions to Global SGs
• Then, gather user Accounts into Gs

• Only suitable for small domains
A-G-DL-P
• Good Enough™ for Most organizations
• In principle:
  – Gather Accounts into Groups
  – Assign Permissions onto Domain Locals
  – Associate Groups into Domain Locals


   A        G         DL           P
A-G-U-DL-P
• Necessary for huge organizations
  – Allows assignment of privileges for other ‘trusted’
    domains
• Similar to A-G-DL-P, but
  – Create Universal SGs spanning multi domains
  – Put Global SGs in a domain inside a U
  – Then, associate Us in DLs




                      U
    A        G                       DL            P
    A        G                       DL            P
SYSVOL
• The mysterious, enigmatic area where important AD
  thingies are kept
   – Group Policy Objects
   – Startup/Shutdown/Logon/Logoff Scripts
   – Other small-sized SysAdmin supporting files
• Employs mysterious “Junctions”
   – Must be hosted on NTFS
   – Please please please for the love of all things holy: Do not delete
     any directory in here if you don’t understand its structure
• Automatically replicated to other DCs
   – (Except SYSVOL on RODCs – won’t replicate, but will be
     overwritten instead)
   – FRS on Windows Server 2003, DFSR on Windows Server 2008
   – Please do not put anything too big in SYSVOL …
       • else, your NetAdmin is going to find you and hurt you…
Group Policy Objects
• A method to apply:
  – Common restrictions
  – Common settings
  – Common applications
• Attached to one (or more) “Organizational Units”
• Two kinds of policies
  – Machine policies – set on boot-complete
  – User policies – set on login
     • Machine policies *may* get re-applied when user login
• Can be selectively applied
Sites and Subnets
• Active Directory enables the definition of “sites”
   – Basically, a grouping of subnets in the enterprise
   – Also, a collection of DCs in those subnets
• Features enabled by “sites”
   –   Definition of replication topology
   –   Definition of replication connection “costs”
   –   Custom scheduling of replication
   –   Nearest-DC (for login, SYSVOL access, etc.)
Other Important Things You Should
   Know If You Are A Windows
      Systems Administrator
•   FSMO Roles
•   Time Synchronization
•   Deployment tools
•   Management tools
•   Diagnostic tools
Tararengkiyu !
Sesi Tanya
dan (semoga di-) Jawab
Active directory - an introduction

More Related Content

PDF
Hadoop operations
PPTX
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
PPTX
Storage for VDI
PPTX
Software defined storage real or bs-2014
PPTX
Building Storage for Clouds (ONUG Spring 2015)
PDF
Application Development with Apache Cassandra as a Service
PPT
Deep dive hadoop
PDF
DB12c: All You Need to Know About the Resource Manager
Hadoop operations
Citrix Synergy 2014 - Syn233 Building and operating a Dev Ops cloud: best pra...
Storage for VDI
Software defined storage real or bs-2014
Building Storage for Clouds (ONUG Spring 2015)
Application Development with Apache Cassandra as a Service
Deep dive hadoop
DB12c: All You Need to Know About the Resource Manager

What's hot (20)

PPTX
PEARC17: Cloud-enabling a Collaborative Research Platform: The GABBs Story
PPTX
2015 deploying flash in the data center
PDF
Database-as-a-Service with Oracle Enterprise Manager Cloud Control 12c and Or...
PPTX
Reaching the Cloud: The Architecture
PDF
KoprowskiT_SQLRelay2014#8_Birmingham_FromPlanToBackupToCloud
PPT
Life After Sharding: Monitoring and Management of a Complex Data Cloud
PDF
MongoDB webiner01
PPTX
Cloud Computing101 Azure, updated june 2017
PPTX
Multi-tenant, Multi-cluster and Multi-container Apache HBase Deployments
PPTX
Extending your data to the cloud
PDF
The Power of Postgres Plus Cloud Database
 
PPTX
Docker y azure container service
PDF
KoprowskiT_SQLRelay2014#1_Reading_FromPlanToBackupToCloud
PDF
(ATS4-PLAT06) Considerations for sizing and deployment
PDF
Database as a Service on the Oracle Database Appliance Platform
PDF
KoprowskiT - SQLBITS X - 2am a disaster just began
PDF
5 Postgres DBA Tips
 
PDF
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
PPTX
LVOUG meetup #2 - Forcing SQL Execution Plan Instability
PDF
Scalability, Availability & Stability Patterns
PEARC17: Cloud-enabling a Collaborative Research Platform: The GABBs Story
2015 deploying flash in the data center
Database-as-a-Service with Oracle Enterprise Manager Cloud Control 12c and Or...
Reaching the Cloud: The Architecture
KoprowskiT_SQLRelay2014#8_Birmingham_FromPlanToBackupToCloud
Life After Sharding: Monitoring and Management of a Complex Data Cloud
MongoDB webiner01
Cloud Computing101 Azure, updated june 2017
Multi-tenant, Multi-cluster and Multi-container Apache HBase Deployments
Extending your data to the cloud
The Power of Postgres Plus Cloud Database
 
Docker y azure container service
KoprowskiT_SQLRelay2014#1_Reading_FromPlanToBackupToCloud
(ATS4-PLAT06) Considerations for sizing and deployment
Database as a Service on the Oracle Database Appliance Platform
KoprowskiT - SQLBITS X - 2am a disaster just began
5 Postgres DBA Tips
 
Azure Boot Camp 21.04.2018 SQL Server in Azure Iaas PaaS on-prem Lars Platzdasch
LVOUG meetup #2 - Forcing SQL Execution Plan Instability
Scalability, Availability & Stability Patterns
Ad

Viewers also liked (8)

PPT
Active directory slides
PPT
Active directory and application
PDF
MCSA 70-410 5 introduction to active directory and basic installation
PPT
Active directory
PPTX
Microsoft Offical Course 20410C_02
PPT
1.2 active directory
PPTX
Introduction to Active Directory
PPT
Active Directory
Active directory slides
Active directory and application
MCSA 70-410 5 introduction to active directory and basic installation
Active directory
Microsoft Offical Course 20410C_02
1.2 active directory
Introduction to Active Directory
Active Directory
Ad

Similar to Active directory - an introduction (20)

PDF
Mtc learnings from isv & enterprise interaction
PPTX
Mtc learnings from isv & enterprise (dated - Dec -2014)
PDF
Docker in the Enterprise
PPTX
Securing Windows with Group Policy
PDF
Storage Systems For Scalable systems
PPT
Drupal -Introduction to Drupal
PPTX
BSides SG Practical Red Teaming Workshop
PDF
How to Build a Compute Cluster
PPTX
Drupal performance
PPTX
Nagios XI Best Practices
PPTX
Hafslund SESAM - Semantic integration in practice
PPTX
Cause 2013: A Flexible Approach to Creating an Enterprise Directory
PPTX
Operating OpenStack on a Budget
PPTX
Operating OpenStack on a Budget
PPTX
Deep thoughts from the real world of azure
PPTX
5 Things that Make Hadoop a Game Changer
PPT
Drupal intro
PPT
Drupal intro
PPT
Introduction_to_Active_Directory and Windows Server
ODP
MySQL for Oracle DBAs
Mtc learnings from isv & enterprise interaction
Mtc learnings from isv & enterprise (dated - Dec -2014)
Docker in the Enterprise
Securing Windows with Group Policy
Storage Systems For Scalable systems
Drupal -Introduction to Drupal
BSides SG Practical Red Teaming Workshop
How to Build a Compute Cluster
Drupal performance
Nagios XI Best Practices
Hafslund SESAM - Semantic integration in practice
Cause 2013: A Flexible Approach to Creating an Enterprise Directory
Operating OpenStack on a Budget
Operating OpenStack on a Budget
Deep thoughts from the real world of azure
5 Things that Make Hadoop a Game Changer
Drupal intro
Drupal intro
Introduction_to_Active_Directory and Windows Server
MySQL for Oracle DBAs

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectroscopy.pptx food analysis technology
Unlocking AI with Model Context Protocol (MCP)
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
sap open course for s4hana steps from ECC to s4
Advanced methodologies resolving dimensionality complications for autism neur...
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Active directory - an introduction

  • 1. Eng Ing Eng ! <Insert tada.wav here>
  • 2. About The Speaker • Name: Pandu Poluan • Email: pandu@poluan.info • Experience: – Senior Instructor (of instructors) for Cisco, Microsoft, Certified Ethical Hackers – IT Manager of Infrastructure, PT Panin Sekuritas Tbk • 25 branches, 500 employees, 1 domain – Systems Administration Manager, PT Carrefour Indonesia • 85 branches, 10’000+ employees, 2 domains
  • 3. Active Directory An Introduction
  • 4. What is Active Directory? • Directory • Authentication – Database of Objects in – Into the network the Domain – Uses “Kerberos” • Users mechanism • Computers • • Privileges Printers • Scanners – For network resources • Shares – For admin tasks • Refrigerators • Active • Coffee Makers • Toilet
  • 5. Why called “Active” • Not just auth • Policies • Grouping (Many-to- – Restrictions Many) – Forced settings – Based on Org Struct – “Push” installation – Based on Functional • Audit Team • Replication – Based on Ad Hoc – One way & Two way needs – Bandwidth-adapting • Delegation • ‘Trust’ Relationship – Of admin tasks – Of management tasks
  • 6. Overview of AD Elements • Domain Controllers – Writable & RODC • Schema • Security Groups • SYSVOL • Group Policy Objects (GPO) • Sites & Subnets • ... (and many others, but let’s just focus on the above for this “Introduction”)
  • 7. Domain Controllers • Where AD database(s) are kept • Replicate between themselves – Two way with writeable DCs, One-way to RODCs – Also replicate “SYSVOL” • MUST be secured at all costs!! – Physical security – Logical security  RODC – Hardening: • Allow only special ‘elevated’ accounts ‘administrator-level’ access to the DCs
  • 8. The AD “Schema” • Definition of Objects in AD – Properties/Attributes – ‘Nature’ of Object • E.g., container, custom container, leaf object • AMAT SANGAT VITAL SEKALI BANGET !!! – *IMMEDIATELY* replicated to other DCs – Feel free to commit suicide if someone gained Schema-editing ability … and botched the schema
  • 9. Security Groups • Used to manage privileges/permissions practically, systematically, and healthily – Managing privileges per user in a big enterprise is not good for your health • Microsoft-recommended Best Practice: A G U DL P Account Global Universal Domain Local Permissions
  • 10. A-P • The Worst privilege-assignment strategy – Imagine having to give 1’000 users the same privileges … – … to 100 network shares • Only suitable for … nothing
  • 11. A-G-P • NEVER assign permissions directly to accounts • At least, assign permissions to Global SGs • Then, gather user Accounts into Gs • Only suitable for small domains
  • 12. A-G-DL-P • Good Enough™ for Most organizations • In principle: – Gather Accounts into Groups – Assign Permissions onto Domain Locals – Associate Groups into Domain Locals A G DL P
  • 13. A-G-U-DL-P • Necessary for huge organizations – Allows assignment of privileges for other ‘trusted’ domains • Similar to A-G-DL-P, but – Create Universal SGs spanning multi domains – Put Global SGs in a domain inside a U – Then, associate Us in DLs U A G DL P A G DL P
  • 14. SYSVOL • The mysterious, enigmatic area where important AD thingies are kept – Group Policy Objects – Startup/Shutdown/Logon/Logoff Scripts – Other small-sized SysAdmin supporting files • Employs mysterious “Junctions” – Must be hosted on NTFS – Please please please for the love of all things holy: Do not delete any directory in here if you don’t understand its structure • Automatically replicated to other DCs – (Except SYSVOL on RODCs – won’t replicate, but will be overwritten instead) – FRS on Windows Server 2003, DFSR on Windows Server 2008 – Please do not put anything too big in SYSVOL … • else, your NetAdmin is going to find you and hurt you…
  • 15. Group Policy Objects • A method to apply: – Common restrictions – Common settings – Common applications • Attached to one (or more) “Organizational Units” • Two kinds of policies – Machine policies – set on boot-complete – User policies – set on login • Machine policies *may* get re-applied when user login • Can be selectively applied
  • 16. Sites and Subnets • Active Directory enables the definition of “sites” – Basically, a grouping of subnets in the enterprise – Also, a collection of DCs in those subnets • Features enabled by “sites” – Definition of replication topology – Definition of replication connection “costs” – Custom scheduling of replication – Nearest-DC (for login, SYSVOL access, etc.)
  • 17. Other Important Things You Should Know If You Are A Windows Systems Administrator • FSMO Roles • Time Synchronization • Deployment tools • Management tools • Diagnostic tools