Back to blog
Windows

Active Directory in Practice: Users, Passwords, and Real Admin Tasks

Introduction

Understanding Active Directory is one thing. Actually using it is where it starts to click.

In this post, I go through the kinds of tasks you would actually do as an admin, like managing users, resetting passwords, organizing computers, and applying policies.

Creating and Managing Users

One of the most common tasks is managing user accounts.

Using Active Directory Users and Computers, you can:

  • create new users
  • disable accounts
  • reset passwords
  • update account details

For example, if a new employee joins, you create a user, assign them to the correct OU, and add them to the right groups. They instantly get the correct access.

Resetting Passwords (Very Common Task)

This is something you'll do all the time.

If a user forgets their password, you locate their account, reset the password, and optionally force them to change it at next login.

This can also be done with PowerShell:

Set-ADAccountPassword username -Reset -NewPassword (Read-Host -AsSecureString)
Set-ADUser -Identity username -ChangePasswordAtLogon $true

This is faster and useful for automation.

Organizing Users with OUs

As the environment grows, organization matters.

Instead of keeping everything in one place, you separate users by department and apply different policies.

Example:

  • Sales -> limited permissions
  • IT -> administrative access

This keeps things clean and easier to manage.

Managing Computers

By default, computers get dumped into one container, which isn't ideal.

A better setup is:

  • Workstations
  • Servers

This lets you apply different rules.

For example:

  • stricter policies on servers
  • user-focused policies on workstations

Delegating Tasks (Very Useful)

Not everything needs a full admin.

You can delegate specific actions, like:

  • allowing IT support to reset passwords
  • giving limited control over certain OUs

This reduces risk and follows least privilege.

Applying Group Policy in Practice

Group Policy is where you control behavior across systems.

Examples I tested:

  • blocking access to Control Panel
  • forcing screen lock after inactivity

Instead of configuring each computer, you create a GPO, link it to an OU, and it applies automatically.

If changes don't apply right away:

gpupdate /force

How Authentication Actually Happens

When a user logs in, their credentials are verified by the Domain Controller.

Modern systems use Kerberos, which works using tickets instead of sending passwords around.

Older systems may still use NTLM, but it's less secure.

The key idea is that your password isn't just checked locally, it's validated centrally.

Why This Matters in Real Work

These tasks come up constantly in IT roles:

  • unlocking accounts
  • fixing login issues
  • managing permissions
  • applying security policies

Once you understand how Active Directory works in practice, troubleshooting becomes much easier.

Conclusion

Active Directory isn't just theory. It's something you actively use to manage users, systems, and security every day.

The more you work with it, the more it starts to feel straightforward.

Instead of guessing, you start to understand exactly where problems come from and how to fix them.