Lesson 14 of 60 intermediate

What Active Directory Actually Does

Why AD is the backbone of most enterprises

Open interactive version (quiz + challenge)

Real-world analogy

Active Directory is the company’s phonebook + badge office + policy manual, all in one. Every person, every device, every group, every rule — stored centrally, authenticated against, and logged.

What is it?

Active Directory Domain Services (AD DS) is Microsoft’s directory for identities, devices, groups, and policies. It enables centralized authentication, authorization, and configuration across a Windows enterprise.

Real-world relevance

A bank has 200 branches. Without AD, each branch manages its own users. With AD, a single account grants access everywhere it should and nowhere it shouldn’t — and policy changes propagate to all 10,000 machines in hours.

Key points

Code example

// AD building blocks (mental model)

Forest
 └── Tree (one namespace)
      └── Domain  (contoso.local)
           ├── OU=Headquarters
           │    ├── OU=Users
           │    └── OU=Computers
           ├── OU=Branches
           ├── Groups (Global / Domain Local / Universal)
           └── Domain Controllers
                ├── DC01  (Authoritative)
                └── DC02  (Replica)

Authentication paths:
  Kerberos (primary)   -> tickets, tight clock tolerance
  NTLM     (fallback)  -> weaker, phased out where possible

Policy:
  GPO linked to OU  -> applies to users/computers within

Line-by-line walkthrough

  1. 1. Mental model diagram of AD
  2. 2. Forest wraps everything
  3. 3. Tree — one namespace
  4. 4. Domain — administrative boundary
  5. 5. Organizational Unit for HQ
  6. 6. Users OU under HQ
  7. 7. Computers OU under HQ
  8. 8. OU for branch sites
  9. 9. Groups of different scopes
  10. 10. Domain Controllers container
  11. 11. Primary DC
  12. 12. Replica DC
  13. 13. Blank separator
  14. 14. Authentication paths header
  15. 15. Kerberos primary path
  16. 16. NTLM fallback
  17. 17. Blank separator
  18. 18. Policy container explanation
  19. 19. GPO application rule

Spot the bug

A company has 1 domain, 1 DC, and no backup DC.
DC01 hard disk fails on Friday night.
On Monday, no user can log in to their Windows machines.
Need a hint?
What was the structural mistake, and what is the right design?
Show answer
Single DC is a single point of failure. Best practice: at least 2 DCs per site, proper replication, regular System State backups, and documented AD recovery procedure. Treat the recovered DC as priority-1 incident; meanwhile local cached credentials may allow some logins but not new ones.

Explain like I'm 5

AD is one big company address book that everyone must agree with: who you are, what team you’re on, which doors open for you, and what rules your laptop follows.

Fun fact

Kerberos — the primary AD authentication protocol — is named after the three-headed dog guarding the underworld in Greek myth. It has three ‘heads’: client, service, and key distribution center (KDC).

Hands-on challenge

Sketch the forest/domain/OU structure of a fictional mid-size bank with HQ and 5 branches. Mark where DCs live, which OU holds which users and computers, and which groups control file-share access.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp