Categories
Tags
579 words
3 minutes
Active Directory Objects
Active Directory Objects
What is an Active Directory Object?
In Active Directory, an object is any resource within the AD environment. This includes:
- Users
- Computers
- Printers
- Groups
- Organizational Units (OUs)
- Shared folders
- Domains
- Domain Controllers, and more.
Each object has a unique identity and a set of attributes. Some objects can contain other objects (these are called container objects), while others cannot (leaf objects).
Types of AD Objects
1. Users
- Definition: Represent individual accounts for people in the organization.
- Type: Leaf object (cannot contain other objects).
- Identifiers:
- SID (Security Identifier): Used to manage permissions and access.
- GUID (Globally Unique Identifier): Uniquely identifies the object across domains and forests.
- Attributes: Name, email, login time, password details, department, manager, address, etc.
- Security Principal: Yes. Users can log in and be granted permissions.
- Security Risk: Compromising even a low-privileged user account can allow attackers to access other resources or enumerate the AD environment.
2. Contacts
- Definition: Represent external people (e.g., vendors, customers) without login privileges.
- Type: Leaf object.
- Security Principal: ❌ No. Cannot log in or be granted permissions.
- Identifiers: Only a GUID.
- Attributes: First name, last name, email, phone number, etc.
3. Printers
- Definition: Point to a printer accessible via AD.
- Type: Leaf object.
- Security Principal: ❌ No.
- Identifiers: Only a GUID.
- Attributes: Printer name, driver, port info, etc.
4. Computers
- Definition: Any machine (workstation/server) joined to the AD.
- Type: Leaf object.
- Security Principal: ✅ Yes.
- Identifiers: SID and GUID.
- Purpose: Like users, computer accounts can authenticate and access network resources.
- Security Concern: If attackers gain NT AUTHORITY\SYSTEM access, they can perform many tasks like a regular user.
5. Shared Folders
- Definition: Points to folders on networked computers shared within the AD environment.
- Type: Leaf object.
- Security Principal: ❌ No.
- Identifiers: Only a GUID.
- Access Control:
- Open to all
- Only authenticated users
- Specific groups/users only
- Attributes: Folder name, path, access permissions.
6. Groups
- Definition: A container object used to manage multiple users/computers together.
- Type: Container object.
- Security Principal: ✅ Yes.
- Identifiers: SID and GUID.
- Use Cases:
- Assign permissions collectively (e.g., give helpdesk access to all members).
- Control software access, policy application, etc.
- Nested Groups:
- Groups can be members of other groups.
- Can lead to privilege escalation or misconfigured access.
- Tool: BloodHound is commonly used to visualize group relationships and discover attack paths.
7. Organizational Units (OUs)
- Definition: Container objects used to logically group AD objects for easier administration.
- Purpose:
- Delegate specific administrative rights (e.g., reset passwords only for users in Marketing OU).
- Apply Group Policy Objects (GPOs) to control settings and enforce security.
- Structure:
- Can have parent-child hierarchies (e.g., Employees ➝ Marketing, HR, IT).
- Attributes: Name, members, linked policies, security settings.
8. Domain
- Definition: The core boundary of an AD environment; defines a unique namespace and holds all objects.
- Purpose:
- Each domain has its own database, policies, and security boundary.
- Policies can control password complexity, access to apps, drive mappings, etc.
- Examples of policies:
- Enforce complex passwords
- Disable command prompt for non-admins
- Auto-map network drives
9. Domain Controllers (DCs)
- Definition: Servers that authenticate users and enforce security policies.
- Functions:
- Validate login requests
- Store the entire Active Directory database
- Replicate AD changes across the network
- Crucial Role: If DCs are down, users cannot authenticate, and network services fail.
10. Sites
- Definition: Grouping of computers based on IP subnets and network proximity.
- Purpose:
- Optimize replication traffic between DCs.
- Improve login speed by directing clients to the closest DC.
11. Built-in
- Definition: A default container created automatically when a domain is set up.
- Contains:
- Default groups like Administrators, Backup Operators, Users, etc.
- These have predefined rights and permissions.
12. Foreign Security Principals (FSPs)
- Definition: Placeholder objects in AD for users or groups from trusted external forests.
- Scenario:
- If you add a user from another domain/forest to a group in your domain, an FSP is created.
- Purpose:
- Store the foreign SID to ensure permissions work correctly via trust relationships.
- Location:
Stored in the container:
CN=ForeignSecurityPrincipals,DC=yourdomain,DC=com
Summary Table
Object Type | Container | Security Principal | SID | GUID | Common Use |
---|---|---|---|---|---|
User | ❌ | ✅ | ✅ | ✅ | Login and access |
Contact | ❌ | ❌ | ❌ | ✅ | Info-only external entity |
Printer | ❌ | ❌ | ❌ | ✅ | Networked printing |
Computer | ❌ | ✅ | ✅ | ✅ | Workstation/server object |
Shared Folder | ❌ | ❌ | ❌ | ✅ | Access-controlled file storage |
Group | ✅ | ✅ | ✅ | ✅ | Access control, nesting |
Organizational Unit (OU) | ✅ | ❌ | ❌ | ✅ | Delegation & policy grouping |
Domain | ✅ | ✅ | ✅ | ✅ | AD structure with unique DB |
Domain Controller | ✅ | ✅ | ✅ | ✅ | Authenticator and policy enforcer |
Site | ✅ | ❌ | ❌ | ✅ | Efficient replication |
Built-in | ✅ | ✅ | ✅ | ✅ | Default groups |
Foreign Security Principal | ❌ | ✅ (external) | ✅ | ✅ | External forest mapping |
Active Directory Objects
https://fuwari.vercel.app/posts/active-directory-objects/