Active Directory and Domain Controller
Domain:
A domain is a concept introduced in Windows NT whereby a user may be granted access to
a number of computer resources with the use of a single username and password combination.
Domain is a boundary, which all customised rules and principles are applies within.
Domain Controller:
The machine that running Windows server version of NT4 or better, where domain controller
features (name Services) are been installed. Domain controller is the main server (controller) for
the whole domain; this machine can be configured in 3 ways are
1. Active Directory (PDC)
2. Backup Domain Controller
3. Stand Alone Server
Active Directory (AD):
A service provided by Microsoft for domain network. Active Directory is a database that
keeps track of all the user accounts and passwords in your organization. It stores user accounts and
passwords in one protected location, improving your organization's security. It allow administrators
to manage these features to use it effectively to improve the stability and accuracy of IT
infrastructure. Also enables various features like remote administration, management and
automatic backup and restoration etc.
Benefits of Having an Active Directory:
Improve the stability and accuracy of IT infrastructure.
Centralized Management. Ease of
Single Username and Password can be used domain wide.
We can create various user groups based on departments or location.
Name based users (i.e. based on requirement, for particular user we may set different level
of authentication clearance).
Access control- We can restrict the access of users to particular resources such as shared
space (ex: If a shared folder had information that only specific people had clearance to view
the content, by ADDS we achieve these kind of requirements)
We may extend the access control to applications such as which user needs the particular
applications and others don’t. (Such as many people do not need applications like MS-paint,
Photoshop etc, hence it would increase the productivity, only those people required to use
that applications has access by logging in using their credentials.)
Deny access to our network/machine to those persons who are been resigned, fired or no
longer with our organization.
We can change the login credentials immediately, in case of compromised situations. ex-
admin credentials.(Note: on current setup we need to physically go to every workstation and
change password manually)
Automatically assign network printers for selected groups and department.
Set windows firewall setting for whole company from one controller. We can customize
these firewall settings department wise also, based on their requirements.
Roaming profile - user data kept on the server that follows the user regardless of the
computer he/she login.
Documents and Desktop folder redirection - keeping user data on the server. Files from the
desktop and documents folders can be kept on the server and connected to the user's
session automatically when he or she logs in to computer.
VPN - access from outside the company to file resources granted under the domain user
name
Remote installation of softwares using remote administration feature.
Automatic system update and backup and restorations for windows.
We can use AD authentications to login other features like SQL Server, CRM application, file
systems etc.
We can track the activities such as attempts made of unauthorised access.
Block USB mass storages (prevent any malicious content into company network and provide
data integrity, only trusted users can access it).
Rule based network access: restrict the workstations to use company network resources by
predefined (predesigned) rules. (ex: computers without latest anti-virus updates should not
be able to connect)
Disadvantages of Current Set-up:
Current set-up: All systems are individual systems that are part of a business network, not
having centralized control.
There is no such setup to manage or audit the infrastructure over companywide or location
wise.
If any changes need to be made, then technicians need to visit each machines manually.
Tracking and controlling of user action by remote is impossible.
The automation is not possible.
Less secured, because whenever administrative privilege granted for user machine, there is
good chance of spreading viruses.
Lack of user mobility (The document at one work station is not available for others until it
was shared, even though there is a fair chance of system crashing then all data will be
offline)
No possibility of tracing and blocking of the users who may misuse the data (data theft).
Obtaining details of users, such as email address etc are difficult.
Review:
The implementation of Active Directory has many advantages compared to the use of
the workgroup. Thanks to the AD domain, the company can gain more stability and security towards
manage its IT environment, adjust the operational requirements, plan and make changes to a much
greater pace.
Remarks:
* Microsoft suggested workgroup size is max 20-25 workstations. So AD implementation is essential
for the network of this size.
* Microsoft strongly recommends single DC for whole organization is not a best practice. So a
backup server is necessarily employed for Data center.
* File server is very much required.
Proposed Setup:
Multi domain Architecture
NAS
Active Directory
Domain Services
BDC
&
Domain Controller
(PDC/DNS)
Child Domain Child Domain Child Domain Child Domain
controller 1 controller 2 controller 2 controller N
(CDC) and (CDC) and (CDC) and (CDC) and
....….
Fileserver 1 Fileserver 2 Fileserver 2 Fileserver N
location1 location2 location3 location N
General Requirements:
OS – Windows server 2012 R2
Dell Power edge series server
Intel Xeon E processor 3.5 GHz
32 GB Physical Memory
Raid 5