0

Active Directory Groups Types

A group in Active Directory is a collection of Active Directory objects. Users, computers, other groups, and AD objects can all be part of the group. The group is managed as a single item by the administrator. There are seven different types of groups in Windows: two domain group types, each with three scopes, and a local security group. In this post, we’ll go over the many types of Active Directory groups, their differences, group scopes, and how to build and manage AD groups in a variety of ways.

Active Directory Groups Types


You can utilise Active Directory groups in the following ways:

  • By assigning share (resource) access to a group rather than individual individuals, management is simplified. When you give a group permissions, all of its members have the same level of access to the resource.

  • To delegate power by utilising Group Policies to assign user rights to a group. You can add new members to the group in the future if they require the permissions granted by this group.

  • To make a mailing list for emails.

There are two types of AD groups:

  • Security Groups in Active Directory. This form of organisation is utilised to give people access to resources (security principal). You could want to provide a select group access to files on a network shared folder, for example. To do so, you’ll need to create an Active Directory Distribution Groups security group. 
  • Email distribution lists are made with this type of organisation (usually used in Microsoft Exchange Server). An e-mail sent to such a group will be received by all of the group’s users (recipients). Because they lack security, this type of group cannot be utilised to grant access to domain resources.
    Note. It is possible to assign an email attribute to a security group and use it in mailing lists (by converting it to a mail-enable security group), but it is not encouraged.

Distribution groups differ from Security Enabled groups in the groupType field by one bit. This attribute contains the SECURITY ENABLED bit for a Security group.

Each group type has three different scopes:

  • Local domain. Only in the domain where it was built, it was used to manage access permissions to various domain resources (NTFS permissions on files and folders, remote desktop access, providing Windows capabilities, employing in GPO security filtering, and so on). Other domains cannot use a local group (however, a local group may include users from another domain). A local group can be enclosed within another local group but not added to the global group;
  • Global. This group type can be used to grant access to resources that are located in a different domain. You can only add accounts from the same domain that the group was formed in to this group. Other global and local groups can be added to a global group;
  • Universal. It is suggested that big Active Directory forests use it. You can design responsibilities and manage resources that are dispersed across many domains using this group scope. If your network includes a lot of branches connected via WAN channels, you should only employ universal groups for groups that change occasionally. Because altering the universal group causes the Global Catalog to be reproduced across the whole organisation.

There are additional local organisations. These groups are formed in the computer’s local Security Accounts Administrator (SAM) database. Local groups differ from domain groups in that they work even if the domain controllers cannot be reached.

  • If the Global Security Group is not part of another global group, you can convert it to a Universal.
  • If another local domain group is not added to the list of its members, you can convert it to a universal domain group.
  • There are no constraints on converting a universal group to a local domain group.
  • If a universal group does not contain another universal group as a member, it can be turned into a global group.

AD Domain Groups by Default (Built-in)


Several predefined (built-in) security groups with a DomainLocal scope are generated when you create a new AD domain. On the domain level, these preset groups can be used to restrict access to shared resources and delegate certain administrative capabilities. Builtin has a unique AD container for default AD groups.

Only user accounts can be added to these groups: you cannot add built-in AD group to each other (group nesting), or add user-defined domain groups to them.

You can list the predefined AD group using PowerShell:

Get-ADGroup -SearchBase 'CN=Builtin,DC=solutionviews,DC=com' -Filter * | Format-Table Name,GroupScope,GroupCategory,SID -AutoSize

Administrators DomainLocal Security S-1-5-32-544

Users DomainLocal Security S-1-5-32-545

Guests DomainLocal Security S-1-5-32-546

Print Operators DomainLocal Security S-1-5-32-550

Backup Operators DomainLocal Security S-1-5-32-551

Replicator DomainLocal Security S-1-5-32-552

Remote Desktop Users DomainLocal Security S-1-5-32-555

Network Configuration Operators DomainLocal Security S-1-5-32-556

Performance Monitor Users DomainLocal Security S-1-5-32-558

Performance Log Users DomainLocal Security S-1-5-32-559

Distributed COM Users DomainLocal Security S-1-5-32-562

IIS_IUSRS DomainLocal Security S-1-5-32-568

Cryptographic Operators DomainLocal Security S-1-5-32-569

Event Log Readers DomainLocal Security S-1-5-32-573

Certificate Service DCOM Access DomainLocal Security S-1-5-32-574

RDS Remote Access Servers DomainLocal Security S-1-5-32-575

RDS Endpoint Servers DomainLocal Security S-1-5-32-576

RDS Management Servers DomainLocal Security S-1-5-32-577

Hyper-V Administrators DomainLocal Security S-1-5-32-578

Access Control Assistance Operators DomainLocal Security S-1-5-32-579

Remote Management Users DomainLocal Security S-1-5-32-580

Server Operators DomainLocal Security S-1-5-32-549

Account Operators DomainLocal Security S-1-5-32-548

Pre-Windows 2000 Compatible Access DomainLocal Security S-1-5-32-554

Incoming Forest Trust Builders DomainLocal Security S-1-5-32-557

Windows Authorization Access Group DomainLocal Security S-1-5-32-560

Terminal Server License Servers DomainLocal Security S-1-5-32-561

Please keep in mind that the built-in AD groups have a unique SID format: S-1-5-32-xxx (xxx from 500 to 1000). The SID for standard AD groups is S-1-5-21-yyy-zzz, where yyy is the domain identification and zzz is the relative ID (RID).

Putting Together a Group Putting the ADUC Snap-in to Work


Using the Active Directory Users and Computers graphical console is the simplest approach to create a new group in the AD domain. Select New > Group from the right-click menu of the AD organisational unit where you wish to create the group.

Specify a unique group name, select the group type and scope, and click OK.

To add a user to a group, go to the Active Directory Users and Computers console and double-click on the group name. Click the Members tab in the group properties box and use the Add button to add users, computers, or other groups.

When adding members to a group, only the following sorts of objects are searched for: Users, Groups, and Service Accounts. Click Object Types and tick the choices Contacts and Computers if you want to add an AD object to the security group (such as a computer or contact). You can now choose from a wide range of Active Directory items.

You can also add a user to a group by right-clicking on it and choosing Add to a group from the menu. This comes in handy when you need to add a large number of people to a group.

The Primary Group of any Active Directory user is configured on the Member tab, under the properties of any Active Directory user. The UNIX POSIX model was utilised to control access to resources, and the primary group ID was employed to support it. The RID (relative identification) of the group to which the user is to be assigned must be the PrimaryGroupID property for a user in Active Directory. The PrimaryGroupID of all Active Directory users is 513 by default (Domain User group).

The primary group might be defined as a global or universal security group. This means you can’t make the primary group a local domain or a distribution group.

A primary-group-id setting isn’t supported by all resources. Except in specific instances involving POSIX apps and Mac clients, you should not modify the Primary Group attribute in most cases.

How to Create and Modify Active Directory Groups Using PowerShell?

Use the PowerShell New-ADGroup cmdlet from the Active Directory for Windows PowerShell module to create Active Directory groups. Install the Active Directory PowerShell module and import the module cmdlets into your PowerShell session by following these steps:

Import-Module ActiveDirectory

The type of the Security or Distribution group is specified using the -GroupCategory argument. The scope of the group is specified using the –GroupScope parameter (valid values: DomainLocal, Global, or Universal).

To create a new global distribution group in the target OU, you can use the command

New-ADGroup -Path "OU=Groups,OU=Brasil,DC=solutionviews,DC=com" -Name "BrasilUsers" -GroupScope Global -GroupCategory Distribution

If you want to find all distribution groups in your domain, use the following cmdlet:

Get-ADGroup -Filter 'groupcategory -eq "Distribution"'

Using the following command, you can create a new security group:

New-ADGroup –Name RemoteAccessUsers  -GroupScope Universal -GroupCategory Security -Path "OU=Groups,OU=USA,DC=solutionviews,DC=com"

You can change Active Directory group attributes using the Set-ADGroup cmdlet. For example, you want to add a description to the security group you have created earlier:

Set-ADGroup RemoteAccessUsers –Description “Users that can access corporate network over DirectAccess and VPN server”

Now you can add users to this group using ADD-ADGroupMember cmdlet:

Add-ADGroupMember RemoteAccessUsers  -Members user1,user2,user3

To get all the information about the specified group, use the Get-ADGroup cmdlet:

get-adgroup 'domain admins’

DistinguishedName : CN=Domain Admins,CN=Users,DC=solutionviews,DC=com

GroupCategory : Security

GroupScope : Global

Name : Domain Admins

ObjectClass : group

ObjectGUID : f04fbf5d-c917-43fb-9235-b214f6ea4156

SamAccountName : Domain Admins

SID : S-1-5-21-3243688314-1360023605-3291231821-512

You can calculate the total number of users in the group:

(Get-ADGroupMember -Identity 'Domain Admin').Count

You can list (export) members of the Active Directory group using the Get-ADGroup cmdlet:

To list the AD groups that the user account belongs to (including nested groups), run the command:

Get-ADUser jbrion -properties memberof | select memberof -expandproperty memberof

Sometimes the task arises to copy a user’s membership in a large number of AD groups. If the user is a member of a large number of groups, doing it manually is very tedious. To copy all security groups from one domain user and add them to another user account, use the following PowerShell script:

$SourceADUser= “j.brion"

$TargetADUser=”b.semenov”

$SourceADGroups = Get-ADPrincipalGroupMembership -Identity $SourceADUser

Add-ADPrincipalGroupMembership -Identity $TargetADUser -MemberOf $SourceADGroups

Another useful example. Let’s try to find all AD groups containing *Admin* in the name, and display users who are members of these groups (to display only unique accounts, use the –uniq parameter):

Get-ADGroup -filter 'SamAccountName -like "*Admin*"' | Get-ADGroupMember -recursive|Select-Object -uniq

If the group includes users from other forests, the Get-ADGroupMember cmdlet will return an error:

Get-ADGroupMember : The specified directory service attribute or value does not exist

Hint. The Get-ADGroupMember cmdlet does not support cross-AD forest users.

If you want to get a Primary group ID, use the following PowerShell script:

$ADdomainSID = Get-ADDomain | Select-Object -ExpandProperty DomainSID | Select-Object -ExpandProperty Value

Get-ADGroup -Identity $($ADdomainSID + "-" + $primaryGroupID)

Donate! If you like this Article and saved your Day...
BTC Addres:
  • Send only BTC to this deposit address.
  • Ensure the network is BNB Smart Chain (BEP20).

Leave a Reply

Your email address will not be published. Required fields are marked *




Enter Captcha Here :