Lab - 1 Active Directory Installation
Lab - 1 Active Directory Installation
Server Manager
2. Here you see the Server manager dashboard. Now go to Manage tab and click Add
Roles and Features.
Active Directory
Installation Type
4. Let the default Role based or feature base installation has selected and click Next.
Active Directory Destination Server
5. In the Select destination server page, select the server you want to install AD and
click Next.
Active Directory Server Roles
6. Now select the Active Directory Domain Services from Roles list in order to install it.
When prompt to add the required features for Active Directory Domain Services within
a new window, click Add Features.
Active Directory Domain Services
7. Now the Active Directory Domain Services has been selected and ready to install. Just
click Next.
Windows Server 2012 R2 Features
8. Leave the Windows Features page by default and click Next.
AD DS Information
9. Now, you may need to read some information about Active Director domain service. In
this page read once and click Next.
Confirm Installation of AD DS
10. In the Confirm Installation selections page click Install to begin installation of AD DS.
Active Directory Installation Progress
Be patient, the installation process will take a few minutes to complete.
System will restart automatically when the installation has complete successfully.
Installed Server Roles
You will see the installed roles from Tools tab of Server Manager dashboard
There are many ways to open the Active Directory Users and Computers for create object.
But the simple and easy is to type dsa.msc an press enter in Windows Run. (Windows+R)
Active Directory Users and Computers
You see the Active Directory Users and Computers graphical interface. If you don’t know
how to install AD in Windows Server 2012 R2, read the step by step installation and
configuration here.
1. Let’s create our first object Organizational Unit (OU) the container of objects in Active
Directory.
You can create Organizational Unit as much as you need in your Network.
2. So try to create User object in Marketing Team. Just click the icon’s of User or right
click domain name then New and click User.
Create User in Active Directory
In the New Object User window, fill out the form with User information
like First name, Last name, and User Logon name then click Next.
Lab:3
Active
Directory Module for Windows PowerShell
If you close the current PowerShell window, the Active Directory module will also exit and
unload from PowerShell.
Loaded modules
To see and list all active directory commands (CmdLet), just type ‘Get-Command -Module
activedirectory’ and press enter then once explore all commands.
Active Directory PowerShell Commands
New-ADUser Command
Get-ADUser Command
For getting full information about a user, type ‘Get-ADUser -Identity -Properties *’ then
press enter.
That’s all, simple and easy. But it’s better to know the below Active Directory CmdLets
for managing user account also.
OK. Now you can create, modify, enable, disable, and delete a user account from active
directory with Windows PowerShell within Windows Servers. Hope you enjoy to create user
account using PowerShell
Group policy
Through Control Panel, you can control all aspects of your computer. So, by
moderating who has access to the computer, you can keep data and other
generates both a LAN Manager hash (LM hash) and a Windows NT hash (NT hash)
of passwords. It stores them in the local Security Accounts Manager (SAM) database
or Active Directory.
The LM hash is weak and prone to hacking. Therefore, you should prevent Windows
from storing an LM hash of your passwords. Perform the following steps to do so:
1. In Group Policy Management Editor window (opened for a custom GPO),
go to “Computer Configuration” “Windows Settings” “Security Settings”
“Local Policies” “Security Options”.
2. In the right pane, double-click “Network security: Do not store LAN
Manager hash value on next password change” policy.
3. Select “Define this policy setting” checkbox and click “Enabled.
4. Click “Apply” and “OK”.
users and evade other restrictions on the system. So, to ensure system resources’
After you have disabled Command Prompt and someone tries to open a command
window, the system will display a message stating that some settings are
you were working on your computer and Windows displays a message stating that
In many cases, if you fail to notice the message or take some time to respond, the
computer restarts automatically, and you lose important, unsaved work. To disable
affect the entire network. Similarly, DVDs, CDs and Floppy Drives are prone to
infection.
It is therefore best to disable all these drives entirely. Perform the following steps to
do so:
1. In Group Policy Management Editor window (opened for a custom GPO),
go to “User Configuration” “Policies” “Administrative Templates” “System”
“Removable Storage Access”.
2. In the right pane, double-click “All removable storage classes: Deny all
accesses” policy
3. Click “Enabled” to enable the policy.
4. Click “Apply” and “OK”.
apps that compromise your system. System admins will usually have to routinely do
maintenance and cleaning of such systems. To be on the safe side, it’s advisable to
grant access to a Windows computer and do not require a password. Enabling this
account means anyone can misuse and abuse access to your systems.
Thankfully, these accounts are disabled by default. It’s best to check that this is the
case in your IT environment as, if this account is enabled in your domain, disabling
accounts at least 12 characters. Setting a lower value for minimum password length
creates unnecessary risk. The default setting is “zero” characters, so you will have to
specify a number:
1. In Group Policy Management Editor window (opened for a custom GPO),
go to “Computer Configuration” “Windows Settings” “Security Settings”
“Account Policies” “Password Policy”.
2. In the right pane, double-click “Minimum password length” policy, select
“Define this policy setting” checkbox.
3. Specify a value for the password length.
4. Click “Apply” and “OK”.
have to change it very frequently, which means it’s more likely a password could get
screenshot shows the policy setting used for configuring “Maximum Password Age”.
including Users, Groups and others, called Security Identifiers (SID) numbers. In
older Windows versions, users could query the SIDs to identify important users and
If you get these Group Policy settings correct, your organization’s security will
automatically be in a better state. Please make sure to apply the modified Group
Policy Object to everyone and update the Group Policies to reflect them on all