AD Objects
User Objects
User accounts represent people who need access to network resources.
User Account Types:
Regular User Accounts:
Standard employee accounts for daily work
Limited privileges by default
Subject to password policies and restrictions
Administrative Accounts:
Elevated privileges for system management
Should be separate from regular user accounts
Require enhanced security measures
Service Accounts:
Used by applications and services for authentication
Often have "logon as a service" rights
May have elevated privileges for specific functions
System Accounts:
Built-in accounts like SYSTEM and LOCAL SERVICE
Used by Windows components and services
Cannot be deleted or significantly modified
Key User Attributes:
sAMAccountName: Pre-Windows 2000 logon name
userPrincipalName: Modern logon name (email format)
distinguishedName: Complete LDAP path to the object
objectSID: Unique security identifier
memberOf: Groups the user belongs to
lastLogon: Last successful authentication time
Computer Objects
Computer accounts represent domain-joined machines and enable them to participate in domain authentication and receive Group Policy.
Computer Account Functions:
Machine Authentication: Computers authenticate to domain using machine account
Secure Channel: Maintains encrypted communication with domain controllers
Group Policy Reception: Computers receive and apply computer policies
Resource Access: Machine accounts can access domain resources
Computer Account Security:
Passwords change automatically every 30 days
Computer accounts can be members of security groups
Local admins on computer can extract computer account credentials
Group Objects
Groups enable efficient permission management by allowing assignment of permissions to collections of users.
Group Types:
Security Groups:
Used for permission assignment and access control
Can contain users, computers, and other groups
Appear in access control lists (ACLs)
Distribution Groups:
Used for email distribution lists
No security functions
Cannot be assigned permissions
Group Scopes:
Domain Local Groups:
Membership: Can contain principals from any domain in the forest
Usage: Can only be assigned permissions within the local domain
Purpose: Assign permissions to domain resources
Global Groups:
Membership: Can only contain principals from the same domain
Usage: Can be assigned permissions anywhere in the forest
Purpose: Organize users by role or department
Universal Groups:
Membership: Can contain principals from any domain in the forest
Usage: Can be assigned permissions anywhere in the forest
Purpose: Cross-domain group membership (requires Global Catalog)
Built-in Administrative Groups:
Domain Admins:
Complete administrative control over the domain
Members automatically added to local Administrators group on all domain computers
Highest level of domain privileges
Enterprise Admins:
Forest-wide administrative privileges
Can modify forest-level configuration
Only exists in forest root domain
Schema Admins:
Can modify Active Directory schema
Extremely powerful permissions
Should have minimal membership
Service Principal Names (SPNs)
SPNs uniquely identify service instances for Kerberos authentication:
Format:
service/hostname:portExamples:
HTTP/webserver.company.com,MSSQLSvc/dbserver.company.com:1433Required for Kerberos authentication to services
Can be automatically or manually registered
Last updated
Was this helpful?