Lesson 16 of 60 intermediate

OUs, Groups & Group Policy

Central control without chaos

Open interactive version (quiz + challenge)

Real-world analogy

Think of AD as a skyscraper. OUs are floors, groups are team memberships, and GPOs are the building’s rules (‘no shoes on carpet floor 5, strict dress code on floor 10’). Well-designed floors + rules = a clean building. Messy floors + rules = a building where nothing works and everyone blames IT.

What is it?

OUs organize directory objects, groups collect identities for permissioning, and GPOs push consistent configuration. Together they turn AD from a phonebook into a policy engine that governs thousands of machines and users predictably.

Real-world relevance

A bank wants every branch laptop to enforce screen lock after 5 minutes, disable USB storage, and use a specific proxy. A GPO linked to the Branches OU does this once — instead of configuring 2000 machines manually. New branch laptops inherit automatically.

Key points

Code example

// Mini AD design for a fictional mid-size enterprise

contoso.local
 ├── OU=HQ
 │    ├── OU=Users
 │    └── OU=Computers
 ├── OU=Branches
 │    ├── OU=Dhaka
 │    ├── OU=Chattogram
 │    └── OU=Sylhet
 └── OU=IT-Admins
      ├── OU=HelpdeskAccounts
      └── OU=ServerAdmins

Groups (Global):
  G-Branches-Users, G-Branches-Computers, G-IT-Helpdesk

Groups (Domain Local / Resource):
  DL-FileShare-HR-RW, DL-FileShare-Finance-RO

Pattern: users -> G-* -> DL-* -> permission on share

GPOs:
  GPO-Baseline-All-Computers  (linked to Domain)
  GPO-Branch-Lockdown         (linked to OU=Branches)
  GPO-HR-MappedDrive          (security-filtered to G-HR)

Line-by-line walkthrough

  1. 1. Mini AD design example
  2. 2. Domain root
  3. 3. HQ floor
  4. 4. HQ users
  5. 5. HQ computers
  6. 6. Branches floor
  7. 7. Dhaka branch OU
  8. 8. Chattogram branch OU
  9. 9. Sylhet branch OU
  10. 10. IT admins floor
  11. 11. Helpdesk accounts
  12. 12. Server admins
  13. 13. Blank separator
  14. 14. Global groups heading
  15. 15. Role-focused global groups
  16. 16. Blank separator
  17. 17. Resource groups heading
  18. 18. Read-write HR file share group
  19. 19. Read-only Finance file share group
  20. 20. Blank separator
  21. 21. Design pattern line
  22. 22. Blank separator
  23. 23. GPO layer heading
  24. 24. Baseline GPO across domain
  25. 25. Branch lockdown GPO
  26. 26. HR-filtered drive map GPO

Spot the bug

GPO intended for Finance is accidentally linked to the Domain root.
Now the Finance desktop wallpaper appears on every machine company-wide.
Need a hint?
Which two settings let you fix the scope without unlinking?
Show answer
Either move the link to the OU=Finance OU (correct design), or apply Security Filtering so only the Finance security group gets the GPO, and/or use WMI filtering by OU/department attribute. Document the change and test with gpresult before announcing the fix.

Explain like I'm 5

OUs are floors in a building. Groups are teams. GPOs are the floor’s rules (lights out at 10 PM, no eating at desks). Put people on the right floor in the right team and the rules just work.

Fun fact

‘AGDLP’ (Accounts -> Global -> Domain Local -> Permissions) may sound like bureaucracy, but it’s the pattern that lets AD scale from 10 users to 500,000 without rewriting permissions every time someone changes role.

Hands-on challenge

Sketch an OU and GPO design for a fictional 3-branch company with HQ + IT admins + 2 business units. Mark which GPOs link where and which groups get which file-share permissions.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp