Active Directory Domain Services (AD DS) are the core functions in Active Directory that manage users and computers and allow sysadmins to organize the data into logical hierarchies. Show AD DS provides for security certificates, Single Sign-On (SSO), LDAP, and rights management. Understanding AD DS is a top priority for Incident Response (IR) and cybersecurity practitioners because all cyberattacks will affect AD, and you need to know what to look for and how to respond to attacks when they happen. Benefits of Active Directory Domain ServicesThere are several benefits to using AD DS for your basic network user and computer management.
Active Directory Domain Services Terms to KnowIn order to understand AD DS, there are some key terms to define.
What Services are Provided in Active Directory Domain Services?Here are the services that AD DS provides as the core functionality required by a centralized user management system.
Role of Domain Controllers with Active Directory Domain ServicesDomain Controllers (DC) are the servers in your network that host AD DS. DCs respond to authentication requests and store AD DS data. DCs host other services that are complementary to AD DS as well. Those are:
AD must have at least one Domain Controller. DCs are the containers for the domains. Each domain is part of an AD Forest, which can include one or more domains organized in Organizational Units. AD DS manages trusts between multiple domains, so you can provide access rights to users in one domain to others in your forest. The most important concept to understand is that AD DS is a framework for domain management, and the computer that users use to access AD is the DC Modern cybersecurity depends on a deep understanding of Active Directory. Active Directory is central to attackers’ capabilities for infiltration, lateral movement, and data exfiltration. No matter how stealthy or clever they are, attackers leave breadcrumbs in AD logs as they move through your network. Varonis monitors AD for those breadcrumbs, as well as file activity, DNS calls, VPN activity, and more. Varonis correlates that data into a full picture for each user and computer in AD, compares the current activity to a normalized baseline and a catalog of data security threat models, and proactively identifies potential threats to your data. Want to learn more about AD security? Check out our on-demand webinar “4 Tips to Secure Active Directory.”
The Default Domain Controllers OU is just one OU present when Active Directory is first installed. This OU is used to organize and administer the domain’s domain controllers. Over time, the domain administrator can create an infinite number of OUs for the domain, but having too many OUs might make management difficult.
The following objects will be organized mostly using OUs:
Yes, OUs can be used to organize shared folders and printers, however, controlling these items from within an OU isn’t very popular or practical. Domain Controller OUDomain controllers’ computer objects are automatically added to the Domain Controller OU when they are added to the domain. This OU has a set of policies that are applied by default. We recommend that you do not move the domain controllers’ computer objects out of this OU to ensure that these policies are applied equally to all domain controllers. A domain controller’s ability to function properly can be jeopardized if the default policies are not followed. By default, the service administrators control this OU. Do not delegate control of this OU to individuals other than the service administrators. Other Built-in Containers in Active DirectoryA common set of containers and organizational units (OUs) are established during the installation of Active Directory Domain Services in every Active Directory domain (AD DS). The following are some of them:
These default containers and OUs are managed by the forest owner.
View Profile Since 2012, Jonathan Blackwell, an engineer and innovator, has provided engineering leadership that has put GroupID at the forefront of group and user management for Active Directory and Azure AD environments. His experience in development, marketing, and sales allows Jonathan to fully understand the Identity market and how buyers think. |