← All Learning Pathways

Active Directory

Domain Controllers, FSMO roles, replication, sites and services, UPN suffixes, Recycle Bin, Group Managed Service Accounts, trusts, and the day-two operations every AD admin runs - install, demote, audit, backup, restore.

30 articles • follow them in order

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
    Systems Admin

    Configure Active Directory to Support Additional Domain Names

    Add an alternative UPN suffix to your AD forest so users can sign in as user@abccorp.com without renaming the domain. Walks the optional internal DNS zone, the AD Domains and Trusts registration, the per-user assignment, and the Microsoft 365 hybrid pre-flight (domain verification, UPN audit, sign-in mode). Includes the Set-ADForest / Set-ADUser PowerShell equivalents and the common mistakes (wrong right-click, suffix vs email, forgetting public DNS validation).

  6. 6
  7. 7
  8. 8
  9. 9
    Systems Admin

    Configuring Group Managed Service Accounts (gMSA)

    Learn how to configure Group Managed Service Accounts (gMSA) in Active Directory. This step-by-step guide covers creating the KDS Root Key, creating and installing the gMSA with New-ADServiceAccount and Install-ADServiceAccount, verifying with Test-ADServiceAccount, and configuring Services.msc to use the account with automatic password rotation.

  10. 10
    Systems Admin

    Install Active Directory Domain Services on Windows Server

    Step-by-step guide to installing the Active Directory Domain Services (AD DS) role on Windows Server and promoting the machine to the first Domain Controller in a new forest. Covers the Add Roles and Features wizard, the Configuration Wizard, DSRM password, DNS delegation warning, paths, the auto-generated PowerShell script, and post-promotion verification.

  11. 11
    Systems Admin

    Add a Domain Controller to an Existing Domain

    Step-by-step walkthrough for adding a second Windows Server Domain Controller to an existing AD domain. Covers prerequisites, installing the AD DS role on the member server, promoting through the Configuration Wizard, replicating from the existing DC, cross-configuring DNS, and verifying replication health with repadmin /replsummary.

  12. 12
    Systems Admin

    Enable the Active Directory Recycle Bin

    Step-by-step guide to enabling the Active Directory Recycle Bin forest-wide using Active Directory Administrative Center. Covers prerequisites, the irreversible nature of the change, GUI and PowerShell verification, restoring deleted objects with Restore-ADObject, and follow-up hardening like Protect from accidental deletion.

  13. 13
    Systems Admin

    How to Check FSMO Roles in Active Directory

    Three reliable ways to check FSMO role holders in Active Directory: the netdom query FSMO command, the Get-ADForest/Get-ADDomain PowerShell cmdlets (and the Get-ADInfo.ps1 script), and the GUI walkthrough across Active Directory Schema, Active Directory Domains and Trusts, and Active Directory Users and Computers.

  14. 14
    Systems Admin

    Secure Active Directory Passwords from Breaches

    Audit and harden Active Directory against breached passwords using Lithnet Password Protection and the Have I Been Pwned compromised hash list. Covers installing Lithnet PP on a Domain Controller, syncing the HIBP store, running the Audit-Passwords.ps1 script to find pwned accounts, and configuring the GPO that rejects new pwned passwords on every set/change.

  15. 15
    Systems Admin

    Create Active Directory Users from CSV with PowerShell

    Bulk-create AD users from a CSV in seconds instead of clicking the ADUC wizard for hours. Covers designing the CSV template, generating strong passwords, finding the target OU's distinguishedName, importing the file with Import-Csv, and the Add-NewUsers.ps1 script that splats parameters into New-ADUser with a duplicate check and try/catch error handling.

  16. 16
    Systems Admin

    Get Active Directory Information with a PowerShell Script

    Get-ADInfo.ps1 is a single PowerShell script that prints ten Active Directory facts in one output: computer/workstation/server/user/group counts, forest and domain functional levels, schema version translated to a Windows Server release name, and all five FSMO role owners. The right script to run before a migration, an audit, or a tier-zero handover.

  17. 17
    Systems Admin

    Export Active Directory Users to CSV with PowerShell

    Export AD users to CSV using the three-cmdlet pipeline (Get-ADUser, Select-Object, Export-Csv). Covers scope selection (-Filter, -SearchBase, -SearchScope), the computed-property pattern for columns like Manager-DN-to-name and clean OU paths, a reusable function with parameters, and common variations (disabled accounts, stale logons, group membership exports).

  18. 18
    Systems Admin

    Check Active Directory Forest and Domain Functional Level

    How to read the current Active Directory forest functional level (FFL) and domain functional level (DFL), what each level unlocks, the pre-flight checklist before raising, and how to actually raise it with Set-ADForestMode / Set-ADDomainMode. Includes the schema-version-to-OS table, a decision flow for whether to raise, and the common pitfalls (forgotten DCs, Server 2019/2022 reporting Windows2016Forest, irreversibility).

  19. 19
    Systems Admin

    Change Users UPN with PowerShell

    Configure your on-premises Active Directory UPNs before syncing to Office 365. Add an alternative UPN suffix in AD Domains and Trusts, then bulk-change every user's UPN with Get-ADForest / Set-ADForest and Get-ADUser / Set-ADUser - either across the whole forest or scoped to a single OU. Verification commands included.

  20. 20
    Systems Admin

    Active Directory Health Check with PowerShell

    One PowerShell script that wraps dcdiag, Test-Connection, Resolve-DnsName, w32tm, Get-Service, and CIM into a single colored HTML report — one row per Domain Controller, 35 columns of pass/warn/fail per cell. Includes the full Get-ADHealth.ps1 source, what each dcdiag test actually catches (Connectivity, SysVolCheck, KccEvent, FSMOCheck, NCSecDesc, etc.), how to schedule a daily SMTP-emailed run, the MotW / Unblock-File / ExecutionPolicy gotchas, and the green-DNS-red-everything-else fingerprint that means a DC is offline.

  21. 21
    Systems Admin

    Configure a Domain Controller as a Global Catalog Server

    How to add the Global Catalog flag to an existing Domain Controller in Active Directory Sites and Services, and the PowerShell equivalent (one bit on the NTDS Settings options attribute via Set-ADObject). Walks the GUI three-click path, the Set-ADObject cmdlet, post-change verification with Get-ADDomainController IsGlobalCatalog / dsquery server -isgc / repadmin /options / Test-NetConnection on port 3268, the partial-attribute-set replication timing caveat, and the common pitfalls (right-clicking the wrong tree node, leaving only one GC, demoting accidentally).

  22. 22
    Systems Admin

    Universal Group Membership Caching

    How to enable Universal Group Membership Caching (UGMC) on a remote AD site so user logons no longer have to traverse a slow WAN to a Global Catalog. Walks the GUI three-click path (Sites and Services > site > NTDS Site Settings > Properties > Enable UGMC) with the actual screenshots, the Set-ADObject PowerShell equivalent (one bit on the NTDS Site Settings options attribute, 0x20), the design choice between UGMC and a local Global Catalog, the 8-hour cache refresh behaviour, and the common pitfalls (right-clicking the wrong node, first-logon needs the GC, stale cache after Universal Group changes).

  23. 23
  24. 24
    Systems Admin

    Active Directory Security Assessment with Purple Knight

    Run Semperis Purple Knight Community against an Active Directory forest to surface Indicators of Exposure (weak crypto, print spooler on DCs, AdminSDHolder drift, kerberoastable accounts, etc.) and produce a graded HTML/PDF report. Walks the download, MotW Unblock-File pre-flight, the wizard's six indicator categories (AD Delegation, Account Security, AD Infra, Group Policy, Kerberos, Hybrid), the Zerologon-skip nuance, the score-grade scale, the remediation-then-rescan loop, and the common pitfalls (running as DA, running on a DC, skipping updates, mass-fixing without reading).

  25. 25
    Systems Admin

    Change the IP Address of a Domain Controller

    Three GUI clicks to set a new IP, four CLI commands (ipconfig /flushdns, /registerdns, nltest /dsregdns, dcdiag /fix) to re-register with DNS, and one downstream-consumer audit afterwards. Walks the pre-flight (second DC, console access not RDP, replication health, downstream-consumers list), the GUI procedure with screenshots, the PowerShell-only equivalent (Remove-NetIPAddress / New-NetIPAddress / Set-DnsClientServerAddress), DNS-pointer trap (don't point at the DC's old IP), the SRV-records-need-nltest /dsregdns trap, and 7 common pitfalls (RDP'd into it, peer DCs caching old IP, stale scavenger window, FSMO concerns).

  26. 26
  27. 27
    Systems Admin

    Troubleshoot “The Specified Server Cannot Perform the Requested Operation” Error (0x3a)

    Domain join error 0x3a (The specified server cannot perform the requested operation) is almost always a TCP 389 LDAP connectivity problem dressed up in directory-layer language. This article walks the diagnostic path: confirm DNS and basic reachability, prove TCP 389 with Test-NetConnection, then narrow the block to the workstation host firewall, the DC host firewall, or the network ACL between them. Includes the multi-port sweep (53/88/135/389/445/464/3268), the residual-causes list when port 389 is open (AD DS service, time skew, stale computer object), and the common pitfalls (disabled firewall left off, public DNS resolver, 389-vs-636 confusion).

  28. 28
    Systems Admin

    Troubleshoot AD Promotion Stuck at “Creating the NTDS Settings Object”

    The Active Directory promotion wizard reaches Creating the NTDS Settings object and never advances. The Directory Service log on the candidate fills with events 1963 / 1962 / 1125. The cause is almost always one of two things: a credential mismatch (local Administrator password matches the domain Administrator password, or the wizard credential was supplied without a domain qualifier) or stale residue from a prior failed promotion. This article walks the five-step path: prerequisite check, fix the two credential mistakes, four-step residue cleanup (reboot, delete computer object, force-leave domain, uninstall AD DS role), retry the promotion, and only then chase the deeper network and DNS causes. Includes the LDAP port 389 sweep, SRV-record verification, and replication health check on the existing DC.

  29. 29
    Systems Admin

    Fixed: Trust Relationship Between Workstation and Domain Failed

    Every domain-joined Windows machine shares a machine-account password with the domain controller; the password rotates every 30 days, and when the local and DC copies drift apart the secure channel collapses and logon dies with: The trust relationship between this workstation and the primary domain failed. Four working fixes, ordered heaviest to lightest. Solution 1 - drop the machine to a workgroup and rejoin the domain (always works, two reboots). Solution 2 - Reset-ComputerMachinePassword -Credential from PowerShell (one command, no reboot, the cleanest fix). Solution 3 - cache a domain credential in Credential Manager (a workaround, not a fix - the underlying drift is still there). Solution 4 - right-click the computer object in dsa.msc and pick Reset Account, then reboot the client (the right answer when the desktop is unreachable). Includes the four root causes (long offline gap, snapshot restore, cloning without sysprep, replication lag) and which solution best matches each.

  30. 30
    Systems Admin

    Reset the Directory Services Restore Mode (DSRM) Password

    The DSRM password is the local-Administrator credential a domain controller uses when AD is offline - the only account that works during authoritative restores, ntds.dit corruption recovery, or last-DC rebuilds. Forgetting it means none of those recoveries work when you actually need them. This article walks the full reset + verify cycle on a real DC: rotate the password with ntdsutil (set dsrm password / reset password on server null - takes one minute, no reboot, no downtime), then prove the new credential works by rebooting into DSRM via F8 or 'bcdedit /set safeboot dsrepair', signing in as .\\administrator with the new password, observing the directory is offline (NTDS / Intersite Messaging / DFSR / KDC stopped, dsa.msc red-crossed), then rebooting back to normal with 'bcdedit /deletevalue safeboot'. Includes the multi-DC rotation pattern, the local-admin-vs-DSRM-vs-domain-admin distinction, and why storing the DSRM password in an AD-integrated vault is a circular dependency.