Active Directory (AD) is Microsoft’s directory service that provides centralized authentication and authorization for Windows environments.
What is Active Directory?
Active Directory is a distributed database that stores information about network objects such as users, groups, computers, and resources, and provides authentication and authorization services.
Main Components
Domain Controller (DC)
- Domain controller: Server that runs Active Directory
- Authentication: Verifies user credentials
- Authorization: Determines access permissions
- Replication: Synchronizes data between controllers
Domain
- Domain: Basic administrative unit
- Namespace: Unique namespace
- Policies: Group policy application
- Security: Security boundaries
Forest
- Forest: Collection of domains
- Trust: Trust relationships between domains
- Schema: Shared global schema
- Global Catalog: Global object catalog
Organizational Unit (OU)
- Organizational unit: Logical container
- Delegation: Administration delegation
- Policies: GPO application
- Structure: Hierarchical organization
Active Directory Services
Authentication
- Kerberos: Authentication protocol
- NTLM: Legacy protocol
- LDAP: Lightweight Directory Access Protocol
- SSO: Single Sign-On
Authorization
- ACLs: Access control lists
- Permissions: Object permissions
- Groups: User groups
- Roles: Administrative roles
Identity Management
- User Management: User management
- Group Management: Group management
- Computer Management: Computer management
- Service Accounts: Service accounts
Active Directory Structure
Main Objects
- Users: System users
- Groups: User groups
- Computers: Domain computers
- Organizational Units: Organizational units
User Attributes
Active Directory Groups
- Security Groups: Security groups
- Distribution Groups: Distribution groups
- Universal Groups: Universal groups
- Domain Local Groups: Domain local groups
Group Policies (GPO)
GPO Configuration
Common Policies
- Password Policy: Password policy
- Account Lockout: Account lockout
- Audit Policy: Audit policy
- Security Settings: Security settings
Security in Active Directory
Strong Authentication
- Multi-Factor Authentication: Multi-factor authentication
- Smart Cards: Smart cards
- Certificate Authentication: Certificate authentication
- Biometric Authentication: Biometric authentication
Account Protection
- Privileged Access Management: Privileged access management
- Just-In-Time Access: Just-in-time access
- Account Monitoring: Account monitoring
- Anomaly Detection: Anomaly detection
Hardening
- Least Privilege: Principle of least privilege
- Regular Audits: Regular audits
- Patch Management: Patch management
- Monitoring: Continuous monitoring
Administration Tools
PowerShell
RSAT (Remote Server Administration Tools)
- Active Directory Users and Computers: Graphical management
- Group Policy Management: GPO management
- Active Directory Sites and Services: Site management
- ADSI Edit: ADSI editor
Third-Party
- ADManager Plus: Management tool
- Quest Active Roles: Advanced management
- ManageEngine ADManager: Enterprise solution
- SolarWinds Server & Application Monitor: Monitoring
Monitoring and Auditing
Security Events
- Logon Events: Logon events
- Logoff Events: Logoff events
- Account Lockout: Account lockout
- Privilege Escalation: Privilege escalation
Monitoring Tools
SIEM Integration
- Splunk: Splunk integration
- QRadar: IBM QRadar integration
- ArcSight: ArcSight integration
- LogRhythm: LogRhythm integration
Troubleshooting
Common Problems
- Authentication Failures: Authentication failures
- Replication Issues: Replication issues
- DNS Issues: DNS issues
- Time Synchronization: Time synchronization
Diagnostic Tools
Best Practices
Design
- Single Domain: Single domain when possible
- OU Structure: Logical OU structure
- Naming Convention: Naming conventions
- Documentation: Complete documentation
Security
- Regular Audits: Regular audits
- Principle of Least Privilege: Least privilege
- Monitoring: Continuous monitoring
- Training: Staff training
Maintenance
- Backup: Regular backups
- Updates: Regular updates
- Monitoring: Performance monitoring
- Documentation: Updated documentation
Related Concepts
- CISO - Role that manages AD security
- Hardening - Hardening of AD servers
- SIEM - System that monitors AD events
- SOAR - Automation of responses in AD
- EDR - Endpoint protection with AD
- Credentials - Credential management in AD
- Security Breaches - Incidents that affect AD
- Attack Vectors - Attacks targeting AD
- APT - Persistent threats against AD
- Incident Response - Response to AD incidents
- Logs - AD authentication logs
- Dashboards - AD status visualization