0% found this document useful (0 votes)
5 views14 pages

Active Directory

Active Directory (AD) is a Microsoft technology for identity management and access control, while a Domain Controller (DC) is the server that authenticates and authorizes users within AD. The document outlines steps to configure a Domain Controller and Active Directory, including changing server settings, installing roles, and promoting the server to a DC. This setup enhances security and streamlines user management in organizations.

Uploaded by

Unthuluwuxz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views14 pages

Active Directory

Active Directory (AD) is a Microsoft technology for identity management and access control, while a Domain Controller (DC) is the server that authenticates and authorizes users within AD. The document outlines steps to configure a Domain Controller and Active Directory, including changing server settings, installing roles, and promoting the server to a DC. This setup enhances security and streamlines user management in organizations.

Uploaded by

Unthuluwuxz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

What is Active Directory (AD)?

Active Directory (AD) is a Microsoft technology used for identity management and access control
within a network. It stores information about network resources, such as users, computers, and
printers, and enables administrators to manage permissions and security settings.

What is Domain Controller?


A Domain Controller (DC) is a server within the Active Directory that authenticates and authorizes
users and computers, ensuring they follow security policies. It manages user logins, assigns group
policies, and maintains the security of the network.
So, while AD is the directory service, the DC is the server that runs the AD service. It's like the
brain and the body working together to keep your network secure and organized.

STEPS TO CONFIGURE Domain Controller and Active Directory


Step1: First Change the name of the server
In this case I have changed it to DC.
Step 2: Change IP address, Subnet mask, Gateway and DNS
The DNS must be the same Ip address of the server.

Step 3: Configure Active Directory from Server Manager


Click Manage in top right and click Add Roles and Features
Click on Next.

Click on Role-based or feature-based installation and click on Next


Click on Select a server from the server pool and click on Next

Click on Active Directory Domain Services and Click Next


Click on Add Features

Click on Next
Click on Next

Click on Next
Click on Restart the destination server automatically if required and Click on Install
Now let’s wait until the feature installation is complete.

After the installation you will see the notification on the flag icon. Click on that

Click on Promote this server to a domain controller


Click on Add a new forest and give a domain name. Example: xyz.com and click next

Give the recovery password


Click on Next
Wait until you see your domain name appears.

Click on Next

Click on Install. It will take some time.


After installation it will give you option to sign out, just click on close

It will restart the server automatically and after successful installation you will see this screen to
login
Use domain name\administrator to login. Example if your domain is xyz.com just type
xyz\administrator

In server manager if you click on tools on top right corner, you will see Active Directory Users
and Computers. You have successfully configured Active Directory and in your domain controller
server
Summary:
Organizations need Active Directory and Domain Controllers to manage user access and security
efficiently. They provide centralized control over network resources, ensuring only authorized
users can access certain data and systems. This setup enhances security, streamlines user
management, and helps maintain compliance with IT policies. It's like having a powerful security
system and management tool in one.

You might also like