Categories
Tags
2fa aboutme access-control Active Directory active directory active-directory ad-blocking administration admission-control adr advanced-threats ai ai-cybersecurity ai-detection ai-powered-scoring ai-threat-detection ai-threat-hunting alert-consolidation alert-fatigue alerting amd-sev amtd analysis analytics anomaly-detection ansible api api-design api-gateway api-management api-security apparmor apple applescript application-security applications apt-detection arch-linux architecture architecture-patterns argocd arm-trustzone assemblyscript Async attestation authentication Authentication authorization auto-reboot automated-monitoring automated-response automation Automation autoscaling AWS aws aya Aya azure backend background-services backstage backup bare-metal baseline-analysis bash bcc behavioral-analysis behavioral-analytics benchmarking Best Practices best-practices BestPractices bind-mounts blockchain Blogging blue-green blue-team bluechi bochs bpftrace broadcom browser build build-configuration busybox byzantine c calico canary Career cdc centos certificate-authority certificates chartmuseum check_wmi_plus choreography ci-cd CICD cicd cilium circuit-breaker cis cis-benchmark cka cleanup cli-tools cloud cloud-native cloud-providers cloud-security cloudflare cloudflared CloudNative cluster cluster-deployment cluster-health cluster-management cluster-setup cmd cni code management communication-patterns compensation compliance compliance-automation compliance-reporting compression confidential-computing configmaps configuration configuration-management consensus consul container Container Orchestration container-management container-monitoring container-orchestration container-runtime container-security containerization Containerization containers Containers contract-testing controller controller-manager coredns coreos correlation correlation-rules cpp cqrs crd cri-o cronjob cronjobs cross-cloud Cross-Platform cryptography csharp custom linux custom-decoders customization Customization cybersec Cybersecurity cybersecurity daemonsets dashboard dashboards data-architecture data-consistency data-fetcher data-governance data-management data-masking data-migration data-pipelines data-prepper data-processing database dba debian decoders defense defensive-security Demo dep deployment Deployment design-patterns desktop-development detection detection-accuracy developer-portal developer-portals development devops DevOps DevSecOps devtools devtron diagrams disaster-recovery discovery disk-provisioning distributed-security distributed-systems distributed-transactions distro distrobox dkim dmarc dnf dns docker Docker documentation domain-administration domain-driven-design dx-operational-observability eBPF ebpf ECS edge-computing edge-devices edge-security edr elasticsearch elgato email embedded linux embedded-systems encryption endpoint-security enterprise Enterprise Enterprise Security enterprise-architecture enterprise-clustering enterprise-governance enterprise-security environment-variables envoy etcd eureka event-driven event-driven-architecture event-sourcing event-streaming Example exploit-prevention exploitation falco Fargate fault-tolerance feature-flags federation fedora fedora-coreos ffmpeg file-integrity filebeat fips fips-203 firewall fluentbit flux forensics ftp FTP Fuwari gcp gcs git github gitlab gitops go golang google-authenticator google-cloud governance gpt grafana graphical interface group-policy grpc gui guide hardening hardware hardware-acceleration hardware-security hashicorp health-probes helm helm-charts high-availability hirte history homebrew homelab hpa hsm https hybrid-cloud hypothesis-driven IaC icinga ide identity management identity-governance identity-management ignition IIS incident-response index index-management indexer industrial-iot industrial-security Infopercept infrastructure Infrastructure infrastructure-as-code ingress insider-threats installation instrumentation integration integration-testing intel-sgx internet interoperability intrusion-detection inventory Invinsense iot isa istio iterators jasmin java javascript jest jsonpath jwt JWT k8s kafka kannel kaslr keepalive kernel Kernel kernel-security key-management keycloak KIND kms kprobe kpti kubeadm kubectl kubernetes Kubernetes kubernetes-security kustomize kyber labels lattice-cryptography launchd legacy-systems libvirt lightweight distro linkding linkerd linux Linux linux development linux from scratch linux kernel linux kernel compilation linux system linux-kernel linux-security liveness lkl llm load-testing log log-analysis log-ingestion log-management log-parsing logging logs lsm lunarvim machine-learning macos macOS malware-analysis malware-detection malware-protection management manifest maps markdown Markdown master-keys mdm memory-safety mermaid message-queue messaging metrics metrics-server MFA mfa micro-segmentation micromdm microservices Microservices microsoft-copilot microwindows migration minimalistic os minio mitigation mitre-attack ml-integration ml-kem mlops mobile-device-management monitoring Monitoring morphisec mtls multi-cloud multi-cluster multi-tenancy multi-tenant multipass musl nagios Namespaces nano-x nats neovim netdata netflix Network network-access network-correlation network-security networking Networking neural-networks neuvector nfs nginx nist-standards node-affinity node-exporter Node.js nodejs noisy-neighbors notifications oauth2 OAuth2 object-storage objective-c observability oci-runtime offensive-security oidc open source open-xdr opensearch openssh openssl OpenSSL opentelemetry openvpn operating system operating-systems operators optimization oracle oracle23c orchestration organizational-charts ot-ics owasp OXDR package-management packaging packet-capture packet-processing pact partitioning patterns pbft performance performance-benchmarking performance-optimization persistentvolumeclaims persistentvolumes php pihole pixie pkcs11 PKI pki Platform Development Platform Engineering platform-engineering plugin plugins pmp pod-security podman pods polyglot-persistence post-quantum-cryptography postgresql powershell priority-management process-exporter processor production Production production-deployment productivity programming prometheus proxy Pulumi python qemu quadlet quadlets quality-assurance quantum-computing quantum-resistance quantum-resistant quic rabbitmq raft ransomware-defense rbac RBAC rdp react readiness real-time real-time-analytics red-team reference regulatory-compliance ReplicaSet repository management resilience resilience4j resource-management rest-api restore risc-v risk-based-alerting rocky-linux rolling-updates rootkit rootless rootless-containers rpm-ostree rsyslog rule-engine rules runtime-protection runtime-security Rust rust safari safety-critical saga-pattern sandboxed-execution sandboxing scalability sched_ext scheduler scheduling scim scripting sdlc search search-engine seccomp secrets secrets-management secure-boot secure-coding secure-element secure-enclaves security Security Security Platform security-analytics security-architecture security-automation security-commands security-monitoring security-orchestration security-platform security-runtimes security-systems security-testing security-tools selinux seo server-setup service mesh service-accounts service-discovery service-mesh Services sharing shell shell-configuration shell-scripting shellcode siem SIEM sigstore single-node sinkhole site-speed slsa smack smallstep smpp sms sms-gateway smtp snapshot soar software development software-attestations software-testing spf spiffe spire squarespace sre ssh ssl SSL/TLS starship stepca storage storageclass streaming supply-chain-security swift sysadmin sysmon system services system-administration system-calls system-design system-extension system-maintenance system-programming systemd systems-programming taints tcp terminal terminal-services Terraform terraform testcontainers testing tetragon threading threat-detection threat-hunting threat-modeling threat-prevention threat-remediation threshold-cryptography tinyemu tls TLS toast-notifications token-flow Tokio tolerations tomcat tools tpm tracee tracing troubleshooting trusted-execution trusted-execution-environments trusted-publishing tunnel tunneling turing tutorial ubuntu udp ui uninstallation unisolation unix utilities upgrade uprobes usb-control use-cases user accounts user-experience user-monitoring user-session utm-stack vault vendor-lock-in version control version-control Video violation-detection virtualization visualization vmware volumes vpn vsftp vulnerabilities vulnerability vulnerability-analysis vulnerability-detection wasi wasm wazuh Wazuh Web Development web-development web-filtering web-infrastructure web-performance webassembly white-labeling windows windows admin center Windows Server 2019 Windows Services windows updates windows-10-iot windows-api windows-monitoring windows-security winexe winrt wmi worker-nodes workflow-automation workload-identity xdp XDP xdr XDR xdr-platform xdr-testing xpc xprotect yaml zero-copy zero-day zero-trust zsh ztna
177 words
1 minute
Active Directory Setup on Windows Server 2019
Windows Server 2019 - Active Directory Setup#

Organizing Objects with Organization Units (OU)#
The main task for Active Directory is to group objects such as users, groups, contacts, computers, printers, and shared folders into Organization Units (OU) and manage access rights for each object.
Organization Unit Structure#
- Organization Unit: Main unit for grouping objects.
- Sub-OU: Sub-unit within an Organization Unit.
- Group: Group of objects (e.g., Users).


User Account Management#
Begin by mapping the company structure in units, sub-units, and groups within Active Directory.

- Create Organization Units:
- When creating an OU, consider protecting it from accidental deletion. If protection is enabled, PowerShell commands are required to remove it.
- Example PowerShell command to remove protection and delete an OU:
Terminal window 1Get-ADOrganizationalUnit -Identity 'OU=Cloud,OU=INSTAR_Shenzhen,OU=INSTAR,DC=instar,DC=local' | Set-ADObject -ProtectedFromAccidentalDeletion:$false -PassThru | Remove-ADOrganizationalUnit -Confirm:$false

- Finish the hierarchy by adding groups and users to map structures based on offices, projects, etc.

This setup allows for efficient organization and management of objects within Active Directory.
Active Directory Setup on Windows Server 2019
https://mranv.pages.dev/posts/active-directory-setup-windows-server-2019/