How To Open AD Console

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email
Table of Contents

Work on server [Domain Controller] directly

Physically : domain controller is placed in data center  either physical server or  virtual as [Hyper-V or VMware virtual machine]

This first option to access  active directory is to work on server directly in data center : which nearly NOT sense

just skip it 

Work on server remotely RDP

The second option to work on server remotely through remote desktop protocol RDP

This is good solution but with some risk , since you will have full control on server [domain controller] as domain administrator [ administrator@Pioneers.lab ] 

This option require some additional steps like :

Enable RDP protocol in windows firewall with port 3389

On domain controller open control panel then select windows firewall

open control panel - select firewall
Select advance settings - inbound Rules
Enable 3 remote desktop services

Now it’s time to Enable remote desktop service and allow only administrator Users since  without administrator privileges you  will not be allowed access to the Active Directory regardless of the server tools or network management applications that are employed

Select my computer - properties - remote - select allow remote connection to this computer
Select users and make sure ONLY domain administrators are allowed

Please note that  both above steps [enable windows firewall and configure RDP ] could be done through Group Policy object GPO , which will be fully discussed  later

Since server in DMZ zone [servers farm ] then we have to open RDP port 389  on firewall [ PFsense ] between LAN subnet and DMZ subnet [Servers farm ]

Login to firewall PFsense as admin
Create new Rule that allow port from LAN to Servers Farm

Please note we are using network Firewall PFsense , but in your case à you have to configure your own firewall wither CISCO , SonicWALL or any firewall you are using

Finally on client computer open remote desktop connection  tool [mstsc.msc ] to connect to domain controller [in our case dc101.pioneers.lab or with IP address 172.16.10.101

open mstsc.exe and enter server name or IP

Once you login to domain controller :  open console [active directory users and computers]  or run [dsa.msc]    [the same thing  🙂 ]

 
open AD user and computer

secure RDP woth RDG [Remote Desktop Gateway]

We can provide additional security to RDP connection by force using [remote desktop gateway ] which will allow only specific computers in LAN to access domain controller

This option provide extra line of security , but unfortunately it’s NOT common techniques in IT culture

Later , We will fully discuss this securing RDP with RDG : since this article require more knowledge about certificate authority SSL ,

RSAT [ remote server admonition tools ]

RSAT structure

The fourth  option [most secure ] is to install RSAT [remote server admonition tools ] on client computers [mostly IT staff ] to access AD consoles 

RSAT is set of consoles [snap-in ] that installed on client employees computer [mostly IT staff ] to access services in on servers farm , the consoles are the following

  • RSAT: Active Directory Domain Services and Lightweight Directory Services Tools
  • RSAT: BitLocker Drive Encryption Administration Utilities
  • RSAT: Active Directory Certificate Services Tools
  • RSAT: DHCP Server Tools
  • RSAT: DNS Server Tools
  • RSAT: Failover Clustering Tools
  • RSAT: File Services Tools
  • RSAT: Group Policy Management Tools
  • RSAT: IP Address Management (IPAM) Client
  • RSAT: Data Center Bridging LLDP Tools
  • RSAT: Network Controller Management Tools
  • RSAT: Network Load Balancing Tools
  • RSAT: Remote Access Management Tools
  • RSAT: Remote Desktop Services Tools
  • RSAT: Server Manager
  • RSAT: Shielded VM Tools
  • RSAT: Storage Migration Service Management Tools
  • RSAT: Storage Replica Module for Windows PowerShell
  • RSAT: System Insights Module for Windows PowerShell
  • RSAT: Volume Activation Tools
  • RSAT: Windows Server Update Services Tools.

Currently we are concern with ONLY two consoles [Active Directory Domain Services and Lightweight Directory Services Tools] and [Group Policy Management Tools]

RSAT Steps

First of ALL :  since we have PFsense firewall that control traffic between Subnet LAN and Subnet servers farm à then we have to open some ports so RSAT will work properly on client computers  and also client computer can access domain controller properly

  • UDP Port 88 for Kerberos authentication
  • UDP and TCP Port 135 for domain controllers-to-domain controller and client to domain controller operations.
  • TCP Port 139 and UDP 138 for File Replication Service between domain controllers. – Needed?
  • UDP Port 389 for LDAP to handle normal queries from client computers to the domain controllers.
  • TCP and UDP Port 445 for File Replication Service – Needed?
  • TCP and UDP Port 464 for Kerberos Password Change
  • TCP Port 3268 and 3269 for Global Catalog from client to domain controller.
  • TCP and UDP Port 53 for DNS from client to domain controller and domain controller to domain controller

Then  login to client computer IT124.pioneers.lab as domain administrator or any privileged user account 

login to client computer IT124.pioneers.lab as domain administrator
• download RSAT from Microsoft site here
• select your desired edition
• After download competed run setup
accept license
RSAT installation finished > restart computer
• After restart client computer open start menu you will see administrative tools installed
• Select snap-in [ ADUC] then Snap-in will connect to DC and open AD

RSAT Need Delegation

Wait a minute:

 is it that easy??!!  Just install RSAT package and it will open active directory   on domain controller?!

Actually when run snap-in from client computer : domain controller will authenticate who will open active directory? 

[ which is domain administrator as seen above administrator@Pioneers.lab ] who has full control on domain controller and active directory  

So on order to allow other domain users [mostly IT staff ] to open active directory and doing administrative tasks like [join to AD , create user , manage users ,reset password , publish printer, delete object … etc. ] you need to make something called  delegation

Delegation  is process of grant domain users [mostly IT staff] some administrative right [but NOT full control ] on specific OU in Active Directory [ NOT whole domain area ]

We will create full article about delegation later , please keep in touch 

To clarify RSAT delegation , please have a look at pioneers.lab domain structure

Pioneers AD structure

as you see 

 frank@pioneers.lab is member of IT department  , and we have delegate frank to ONLY reset password for finance department users for example

When frank open snap-in [active directory user and computers ] from his computer IT124.pioneers.lab and try to delete user from finance department

undelegated user is unable to delete other account

Let have another example :

lara@pioneers.lab from IT department also , but has NOT delegated yet at ALL

she is unable to see even users properties [ most user attributes are hidden ] 

undelegated user is unable to display other account information
Share this post
Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email

About Me

Our Power in Numbers

 17 

Courses

321

Articles

3,882

Images
and All configurations images are proudly made in Pioneers Lab

Articles By Course

Recent Articles

Subscribe

Contact us

have a challenge ? don’t hesitate to contact us