Phase 2
Build a real-world AD structure with proper roles, groups, and least-privilege delegation.
Domain: TeamD.hello | Server: DC-TeamD
Press → or click Next
Each person gets 2 accounts, 1 department, 1 role, and group memberships
Every object has a specific home in the OU tree
NEVER place users at the domain root. Employee accounts go in department OUs. Admin accounts go in Admin Accounts OU.
Part 1
Press Win+R → type dsa.msc → Enter
Right-click TeamD.hello → New → Organizational Unit → name: TeamD Corp → OK
Expand TeamD.hello so you see TeamD Corp
Right-click TeamD Corp → New → Organizational Unit → name: Finance → OK
Repeat step 4 seven more times for:
Sales • HR • IT • Admin Accounts • Groups • Computers • Service Accounts
Verify: Click + next to TeamD Corp — all 8 OUs should appear.
Part 2
Copy this into your report
cfarrisD
first initial + lastname + D
cfarrisD.admin
employee username + .admin
Finance-Users-D
Department-Users-D
D-PC-Fin01
D-PC-DeptCode##
Part 3 — Employee Accounts
Each person goes into their department OU
Open dsa.msc → expand TeamD Corp → click IT
Right-click IT → New → User
Click Next → password: TempPass123!
Next → Finish
Repeat for each person — right-click their department OU:
| Hak Tang | htangD | Right-click Finance |
| Tony Hall | thallD | Right-click Sales |
| Johny D | jdD | Right-click HR |
| Tiffany M | tmD | Right-click HR |
Part 3 — Admin Accounts
ALL admin accounts go into Admin Accounts OU
In ADUC, click on Admin Accounts OU (inside TeamD Corp)
Right-click Admin Accounts → New → User
Click Next → password: AdminPass456! (DIFFERENT from employee)
Next → Finish. Repeat for: htangD.admin, thallD.admin, jdD.admin, tmD.admin
Parts 4 & 5
Who belongs to what — the complete picture
Click Groups OU → Right-click → New → Group
Repeat for: Sales-Users-D, HR-Users-D, IT-Users-D, IT-Helpdesk-D
Double-click Finance-Users-D → Members tab → Add... → type htangD → Check Names → OK → Apply
Repeat for each group:
| Sales-Users-D | Add thallD |
| HR-Users-D | Add jdD and tmD |
| IT-Users-D | Add cfarrisD |
| Domain Admins | Add cfarrisD.admin (find in Users container) |
| IT-Helpdesk-D | Add htangD.admin |
Part 6
Give IT-Helpdesk-D (Hak's admin account) specific powers (GUI wizard only)
Right-click "TeamD Corp" → Delegate Control... → Next
Click Add... → type IT-Helpdesk-D → Check Names → OK → Next
Check: ☑ Reset user passwords and force password change at next logon
Next → Finish
Right-click "TeamD Corp" again → Delegate Control... → Next
Add IT-Helpdesk-D → Next
Select "Create a custom task to delegate" → Next
Select "Only the following objects..." → check User objects → Next
Check Property-specific → find and check: ☑ Read lockoutTime and ☑ Write lockoutTime
Next → Finish
Screenshot the wizard summary before clicking Finish — required for your report!
Part 7
Prove each role works correctly — screenshot everything
| Test | Log in as | What to do | Expected |
|---|---|---|---|
| 1 | TeamD\cfarrisD | Log into Win10 VM | ✅ Success (change password prompt) |
| 2 | TeamD\cfarrisD.admin | Log into Win10 VM | ✅ Success |
| 3 | TeamD\htangD.admin | Reset thallD's password | ✅ Success (Helpdesk perm) |
| 4 | TeamD\htangD.admin | Unlock thallD's account | ✅ Success (Helpdesk perm) |
| 5 | TeamD\cfarrisD | Try to reset a password | ❌ Access Denied (correct!) |
| 6 | TeamD\htangD.admin | Try to create a new user | ❌ Access Denied (correct!) |
Log into Win10 as TeamD\htangD.admin
Open dsa.msc → find Tony Hall in Sales OU
Right-click Tony Hall → Reset Password... → enter new password → OK
On a Win10 VM, try logging as thallD with WRONG password 5+ times to lock it
Back as htangD.admin in ADUC, double-click Tony Hall → Account tab
Check ☑ Unlock account → Apply → OK
Log into Win10 as TeamD\cfarrisD (regular employee)
Open dsa.msc → try to reset someone's password → should get Access Denied
Part 8
What your team must submit
Draw.io / PowerPoint / Visio showing your full tree
Your 5-10 line standard (see slide 5)
OU structure organizes users, computers, and resources logically — making it easy to apply Group Policies and manage permissions as the network grows.
Separating admin and employee accounts limits damage if a daily-use account is compromised — attackers only get standard access, not domain control.
Least privilege gives users only the minimum permissions for their role. A helpdesk tech can reset passwords but not create users — limiting risk from mistakes or compromised accounts.
Everything in one copy-paste block
Your domain has a real-world AD structure with proper roles, groups, and least-privilege delegation.