Active Directory Basics
Step 9 — Bonus Tasks (Highly Recommended)
These optional tasks mirror common real-world Active Directory responsibilities. They are not required to complete the lab, but they significantly deepen your understanding of how AD is used in production.
These tasks introduce concepts you’ll see daily in real environments. In production, changes like these are usually planned, reviewed, and documented. For this lab, you’re free to experiment.
1. Configure Password Policy (Domain-Wide)
Password policies are enforced at the domain level using Group Policy.
In real environments, the Default Domain Policy is usually kept minimal or replaced with fine-grained password policies. Editing it here is acceptable for learning purposes.
- Open Group Policy Management
- Expand Forest → Domains → lab.local
- Right-click Default Domain Policy → Edit
- Navigate to:
Computer Configuration → Policies → Windows Settings → Security Settings → Account Policies → Password Policy
- Configure Maximum password age
- Configure Minimum password length
2. Create a Basic Logon Script
Logon scripts execute automatically when users sign in and are commonly used to map network drives, set environment variables, or display messages.
SYSVOL is a special shared folder on every domain controller that stores files which must be accessible to all domain users — including Group Policy objects and logon scripts.
When a user logs in, their computer automatically pulls scripts and policies from SYSVOL.
- Create a new text file named
logon.bat - Add the following line:
echo Welcome to the domain
- Save the file to the domain’s SYSVOL share
- The full path will look like:
C:\Windows\SYSVOL\sysvol\lab.local\scripts
- Open Active Directory Users and Computers
- Open a user account
- On the Profile tab, enter
logon.batin the Logon script field
The script name is enough — Active Directory automatically looks for it inside the SYSVOL scripts folder.
While logon scripts are less common today, they are still frequently encountered in legacy and hybrid environments.
3. Delegate Password Reset Permissions to Helpdesk
Delegation allows non-admin users to perform limited administrative tasks.
- Right-click the branch Users OU (for example:
_Branches → Houston → Users) - Select Delegate Control
- Add the Helpdesk group
- Select the following tasks:
- Reset user passwords
- Force password change at next logon
This is one of the most common real-world delegation scenarios for helpdesk teams.
4. Move the Client Computer into the Correct Branch OU
By default, domain-joined computers are placed in the built-in Computers container.
- Open Active Directory Users and Computers
- Locate the computer account (e.g.,
CLIENT01) - Drag the computer into
_Branches → Houston → Workstations
This ensures the computer receives the correct Group Policy settings.
Why These Tasks Matter
- They reflect real daily Active Directory work
- They introduce delegation, policy, and structure concepts
- They prepare you for real troubleshooting scenarios
Completion Checkpoint
- Password policy changes are understood (even if reverted)
- Delegation is applied to the branch Users OU
- The client computer is placed in the correct branch OU
If you completed even one of these tasks, you’re already operating beyond beginner-level Active Directory knowledge.