ManageEngine x Forrester | Workforce Identity Platforms Landscape Report

Active Directory VideosAzure Active DirectoryAzure AD Management

How to create a group in Active Directory

Groups in Active Directory (AD) bring together users and devices that share common permissions, and access rights for easy management and efficient administration. Read on to learn how to create one.

Steps to create a group in AD:

  1. Launch the computer which has AD DS installed, go to “Start” and choose “Administrative tools”.
  2. Choose the tile that reads “Active directory Users and Computers”.
  3. Click on “Users” > “New” > “Group”.
  4. In the New object window that has opened, enter the specifications of the group in appropriate fields:
  • Group Name: Specify the name of the group
  • Group Description: Type in a description on the purpose of the group.
  • Group Scope: Global/Domain Local/Universal based on need.
  • Group Type: Select security or distribution based on need.
  1. Click “OK”.

Using Powershell : New-ADGroup Cmdlet

Cmdlets in Powershell are lightweight commands in the form of mini-scripts that are deployed to perform specific functions such as creating or modifying AD groups, files and more. Cmdlets are named based on nouns that describe their functions and one such example is the New-ADGroup cmdlet which is used to create a new group in AD.

Lets walk through an example to understand how the New-ADGroup cmdlet works.

Creating a new group and specifying its desired properties

-Name "GrowthMarketingGroup" 
-GroupScope Global 
-GroupCategory Security 
-Description "This group is for growth marketing department." 
-DisplayName "Growth Marketing Group" 
-HomePage "" 
-ManagedBy "CN=User,OU=Managers,DC=corp,DC=com" 
-SamAccountName "GrowthMarketingGroup" 
-Path "OU=Groups,DC=ManageEngine,DC=com" 
-AuthType Negotiate 
-Credential $credentials 

Creating a new group using the properties of an existing group

You can also use an existing group as a template when creating a new group. This ensures that the new group inherits the same properties as the template group, instead of manually entering them. The Get-ADGroup cmdlet is used to retrieve the attributes of the existing object and it is passed to the instance parameter of the New-ADGroup. Unwanted parameters from the existing group, if any, can be overridden.

# Retrieve an existing group object using Get-ADGroup

$existingGroup = Get-ADGroup -Identity "ExistingGroup"

 # Override specific properties of the new group as needed

New-ADGroup -Name "NewGroup" -GroupScope Global -GroupCategory Security -stance $existingGroup

 We see that New-ADGroup Cmdlet consists of parameters, which define the properties group to be created. A description of parameters used in the New-AD group cmdlet is summarised below. 

Parameter Name   

Data Type


Acceptable values



Allows users to preview the actions a cmdlet would take without actually executing the cmdlet to identify any  potential untinteded consequences.




Defines the method of authentication

Negotiate or Basic



Prompts confirmation from the user before the script excecution




Sets the user’s credentials for task execution.

Username and Password, by creating a PSCredential object through the Get -Credential cmdlet





Specifies information about the group to be created

A string of phrase(s) or sentence(s) describing the  purpose of the group in brief



States how the name of the group is displayed.

Human-readable title of the group as a string



States the type of group

Distribution or Security



Defines where the group can be applied and eligibility of objects under the group

DomainLocal  or Global or Universal




States the URL of the home page of the object

Address link of the webpage as a string



To create a new group using properties from an existing group as a template.




States the user or group in charge of managing the new group created

UPN /GUID of the user’s account or GUID of the group



Defines the name of the group

GUID of the group




Returns the newly created group object

True if the object needs to be returned and false otherwise



Defines the location of the group by stating the Organizational Unit [OU] and under which it is placed. Domain is represented as several Domain Components [DC]

OU= Name of OU

DC= Name of sub domain 1

DC = Name of subdomain2



States the Security Account Manager (SAM) account name of the group.

Name of SAM as a string

 Creating ad groups: PowerShell vs. Manual – which method to choose?

  • Using the manual method is beneficial for users who are unfamiliar with PowerShell scripting. Their progress and results of their actions are instantly shown for confirmation and further navigation, making it user-friendly.
  • However, when performing advanced tasks that involve managing multiple groups simultaneously, it becomes time-consuming and tedious.
  • Using powershell, such tasks are automated making it fit for large-scale AD environments. Nevertheless, Only systems with the Active Directory Domain Services role installed, can execute PowerShell scripts.
  • If further attributes need to be added, the script must be redone and If more than one group is to be formed, a new script will be required.
  • Maintaining accuracy in parameters and syntax, debugging of large-scripts, can be challenging.

The limitations of powershell can be overcome by a web-based GUI console, AD Manager Plus, that  can  be used to create, configure and manage users and groups in bulk, just in few clicks.


Check out a more detailed explanation in our article here 👇

For more such articles on Windows Server Management, visit our website 👇

To stay updated about industry trends and Active Directory best practices, subscribe to our monthly newsletter 👇

#groups #security #distribution #activedirectory

Related posts
Active Directory Videos

Cloud Services and its types

Active Directory Videos

Types of Cloud

Active Directory Videos

Types of DC

Active Directory Videos

Services Vs Application


There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.