domain: managed group of usrs/computers, active directory (ad) - win mgmt system, domain controller (dc) - ad server
benefits: centralized id mgmt (manage all usrs), managing sec policies: apply to all usrs/machines
ad domain service (ad ds) - db of network objects:
$ security group description
============== ===========
domain admin full domain admin access, including all computers/dc's
server operators can manage dcs but not change admin groups
backup operators can access any file regardless of perms for backup purposes
account operators can create/modify domain accounts
domain users all user accounts in domain
domain computers all computers in domain
domain controllers all dc-s in domain
how to access/manage usrs in ad: sign in to dc (main server) > ad users/computers
========================
default containers in ad
========================
built-in default groups for any windows host
computers default location for new machines
domain controllers ou containing network dc's
users default domain-wide users/groups
managed service accounts service accounts for domain
organizational units (OUs): allow admins to apply policies to usr/computer groups (users can belong to only 1 OU)
security groups: control resource access (example: managing folder perms)
delegation: grants specific users ad group mgmt capabilities w/out full admin access
Set-ADAccountPassword sophie -Reset -NewPassword (Read-Host -AsSecureString -Prompt 'New Password') -Verbose
Set-ADUser -ChangePasswordAtLogon $true -Identity sophie -Verbose
3 main types of computers in ad: