Windows Active Directory
  • Active Directory
    Report

    ManageEngine among notable vendors in Forrester's report

    Insights and analysis from the latest Forrester landscape report.

    Read Report
    AD Domain Services
    • Architecture & Design
    • Directory Objects & Identity
    • Authentication & Protocols
    • Replication, Sites & DC
    • Operations & Troubleshooting
    • Security Hardening
    • DNS & Name Resolution
    • AD Certificate Services & PKI
    Group/EndPoint Policy & Automation
    • Scripts & Templates
    • GPO Fundamentals
  • Security
    Security Strategy

    5 ways to mitigate the rising threat of identity sprawl

    Learn how to regain control over distributed identities and secure your perimeter.

    Read Article
    Security Ops for Identity
    • Attack Techniques & Threat Modeling
    • Detection Engineering
    • Incident Response Playbooks
    • Zero Trust for Identity
    News
    • Identity news & updates
  • Azure
    Hybrid Security

    6-step guide to Enhance Hybrid IT Security

    Implement CISA's recommendations to fortify your hybrid infrastructure.

    Read Guide
    Microsoft Entra ID
    • Tenant & Directory Administration
    • Authentication Methods
    • Identity Governance
    • Identity Protection & Risk
    • Conditional Access
    • External Identities
    Hybrid Id & Federation
    • AD Federation Services
    • Entra Connect/Cloud Sync
  • Toolkit
    Watch & Listen
    • AD - How to
    • On-Prem
    • Cloud
    • Podcast
    AD Tools
    • Management
    • Reporting
    • Security
    • Health
    Most Popular

    SysAdmin Toolkit

    The essential CLI pack for every admin. Free forever.

    Download Now
  • Resources
    E-books
    • Sysadmins survival guide for endpoint security
    • Saving IT from cybersecurity burnout
    • IT Admin's roadmap to Zero Trust
    • Automated User Provisioning in Healthcare
    Webinars
    • NIST CyberSecurity Framework
    • Prevent AD Password attacks
    • 5-step cybersecurity strategy
    • AI's impact on Zero Trust
    Latest PDF

    Group Policy Guide

    Best practices for GPO precedence and troubleshooting.

    Read Ebook
Identitude
Site Search
Search for guides, tools, and tutorials.
Subscribe to get the latest updates straight to your inbox.
Please enter a valid business email.
Please select a country.
Please select a state or province.
By clicking 'Become an insider', you agree to processing of personal data according to ManageEngine's Privacy Policy.
Menu
  • Active Directory
    Architecture & Design
Identitude Newsletter
Subscribe Free

Browsing category

Group Policy & Endpoint Policy

81 posts
GPO FundamentalsGroup Policy & Endpoint Policy

How to design nested groups for application access control

October 17, 2025
Designing nested groups for application access control Nested groups are one of the most powerful (and most misunderstood) primitives in Active Directory access control. When designed well, they let you express business intent once and reuse it everywhere: applications, file shares, databases, SaaS connectors, and privileged workflows. When…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to use OU structure to mirror organizational hierarchy

October 17, 2025
Using OU structure to mirror organizational hierarchy Organizational Units (OUs) feel like the “obvious” place to represent how a company is shaped: divisions, departments, regions, and teams. In Active Directory, that instinct is half right and half dangerous. The part that’s right: a good OU design makes administration predictable, delegation…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to secure OU and group changes with audit trails

October 17, 2025
Securing OU and group changes with audit trails Organizational Units (OUs) and security groups are two of the most powerful “control surfaces” in Active Directory. OUs decide where objects live, what policies apply, who can administer what, and how delegation is structured. Groups decide who can access what (file shares, apps, GPO filtering…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Using groups for licensing control in Microsoft 365

October 17, 2025
If you’re still assigning Microsoft 365 licenses user-by-user, you’re doing identity operations the hard way. Group-based licensing flips the model: instead of asking “What does Alice need?”, you decide “What does a Sales Analyst get?” and make group membership the single source of truth for licensing. This approach scales, reduces mistakes (missing…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

AD group expiration and recertification best practices

October 17, 2025
AD group expiration and recertification best practices Active Directory groups are one of the most powerful—and most quietly dangerous—access control primitives in Windows environments. They’re easy to create, easy to nest, and easy to forget. The result is predictable: groups that outlive their projects, privileged memberships that never…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Mapping users to OUs via dynamic properties

October 17, 2025
Mapping users to OUs via dynamic properties Active Directory (AD) works best when Organizational Units (OUs) reflect how you operate: how you delegate, how you apply policy, and how you lifecycle identities. The problem is that people and org charts don’t stay still. Departments rename, locations split, teams merge, contractors come and go…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Tools for visualizing OU and group structures

October 17, 2025
Tools for visualizing OU and group structures Active Directory gets difficult to reason about long before it gets “big.” A few years of organic growth—new teams, acquisitions, hybrid identity, app-specific groups, delegated admins—turns OUs into a maze and groups into a web. The hard part isn’t knowing what an OU or a security group is.
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

Group cleanup scripts with usage analysis

October 17, 2025
Group cleanup scripts with usage analysis Active Directory group sprawl is not just “messy directory hygiene”—it directly affects access risk, troubleshooting time, audit outcomes, and even authentication performance at scale. The hard part isn’t deleting groups; it’s proving that a group is no longer needed, and doing it without…
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to detect privileged group membership changes

October 3, 2025
Detecting privileged group membership changes Privileged group membership is one of the highest-leverage control points in Active Directory. If an attacker can add an account (or a computer, service principal, or nested group) to a privileged group, they often don’t need a “loud” exploit anymore—access becomes legitimate by definition.
Read more
GPO FundamentalsGroup Policy & Endpoint Policy

How to sync AD groups to cloud services securely

October 3, 2025
How to sync AD groups to cloud services securely Syncing Active Directory (AD) groups to cloud services sounds simple: “make the same groups appear in the cloud.” In practice, it’s one of the easiest ways to accidentally leak access, expand blast radius, or create hard-to-audit privilege paths across environments. This guide walks through the…
Read more
Page 2 of 9«12345...»Last »
  • Featured Posts

    • What is Azure Data Factory (ADF)? 

      April 10, 2023
    • How to demote a Domain Controller: A step-by-step guide

      August 22, 2022
    • Healthcare data Breaches down almost 50 percent in the first month of 2021

      March 3, 2021
  • Popular with Readers

    AD Domain ServicesDirectory Objects & Identity Data

    Active Directory Users and Computers (ADUC) - An introduction and installation guide

    February 4, 2021
    AD Domain ServicesArchitecture & Design

    Active Directory Sites

    February 4, 2021
    GPO FundamentalsGroup Policy & Endpoint Policy

    Active Directory Password Policy

    March 3, 2021
  • Recently Added

    • ADUC: Complete Guide to Active Directory Users and Computers for Windows Server Admins

      March 29, 2026
    • How to deploying network settings with GPO

      March 29, 2026
    • How to redirect Documents and Desktop via GPO

      March 29, 2026

  • English