Docs / Windows Server / Setting Up Active Directory on Windows Server

Setting Up Active Directory on Windows Server

By Admin · Mar 2, 2026 · Updated Apr 24, 2026 · 25 views · 3 min read

Setting Up Active Directory on Windows Server

Active Directory Domain Services (AD DS) is the cornerstone of Windows enterprise networking, providing centralized authentication, authorization, and directory services. This guide walks you through deploying a new Active Directory domain controller on your Kazepute Breeze running Windows Server.

Prerequisites

  • A Kazepute Breeze running Windows Server 2019 or 2022
  • A static IP address configured on the server
  • Administrator access
  • A planned domain name (e.g., corp.example.com)

Step 1: Set a Static IP Address

Active Directory requires a static IP. Configure one via PowerShell:

# View current network configuration
Get-NetIPConfiguration

# Set static IP (adjust values for your Breeze)
New-NetIPAddress -InterfaceAlias "Ethernet" -IPAddress 10.0.0.5 -PrefixLength 24 -DefaultGateway 10.0.0.1

# Set DNS to point to itself (required for AD)
Set-DnsClientServerAddress -InterfaceAlias "Ethernet" -ServerAddresses 10.0.0.5, 8.8.8.8

Step 2: Install the AD DS Role

# Install Active Directory Domain Services
Install-WindowsFeature -Name AD-Domain-Services -IncludeManagementTools

# Verify installation
Get-WindowsFeature AD-Domain-Services

Step 3: Promote to Domain Controller

After installing the role, promote the server to a domain controller:

# Create a new forest and domain
Install-ADDSForest `
    -DomainName "corp.example.com" `
    -DomainNetbiosName "CORP" `
    -ForestMode "WinThreshold" `
    -DomainMode "WinThreshold" `
    -InstallDns:$true `
    -DatabasePath "C:\Windows\NTDS" `
    -LogPath "C:\Windows\NTDS" `
    -SysvolPath "C:\Windows\SYSVOL" `
    -SafeModeAdministratorPassword (ConvertTo-SecureString "YourDSRMPassword123!" -AsPlainText -Force) `
    -Force:$true

The server will automatically reboot after promotion. Wait a few minutes before reconnecting.

Step 4: Verify Active Directory

After the reboot, log in with the domain administrator account and verify:

# Check AD services
Get-Service -Name NTDS, DNS, Kdc, Netlogon

# Verify the domain
Get-ADDomain

# Check the forest
Get-ADForest

# Test DNS resolution
Resolve-DnsName corp.example.com

Step 5: Create Organizational Units and Users

Organize your directory with OUs and add users:

# Create organizational units
New-ADOrganizationalUnit -Name "Staff" -Path "DC=corp,DC=example,DC=com"
New-ADOrganizationalUnit -Name "Servers" -Path "DC=corp,DC=example,DC=com"

# Create a new user
New-ADUser -Name "John Smith" `
    -GivenName "John" `
    -Surname "Smith" `
    -SamAccountName "jsmith" `
    -UserPrincipalName "jsmith@corp.example.com" `
    -Path "OU=Staff,DC=corp,DC=example,DC=com" `
    -AccountPassword (ConvertTo-SecureString "TempPass123!" -AsPlainText -Force) `
    -Enabled $true `
    -ChangePasswordAtLogon $true

# List all domain users
Get-ADUser -Filter * | Format-Table Name, SamAccountName, Enabled

Step 6: Configure Group Policy

Group Policy Objects (GPOs) let you enforce settings across your domain:

# List existing GPOs
Get-GPO -All

# Create a new GPO
New-GPO -Name "Password Policy" -Comment "Enforce strong passwords"

# Link a GPO to an OU
New-GPLink -Name "Password Policy" -Target "OU=Staff,DC=corp,DC=example,DC=com"

Best Practices

  • Always use a strong Directory Services Restore Mode (DSRM) password and store it securely.
  • Deploy at least two domain controllers for redundancy.
  • Keep the AD database and SYSVOL on fast storage.
  • Regularly back up Active Directory using Windows Server Backup.
  • Enable auditing for logon events, account changes, and group policy modifications.
  • Use separate admin accounts for day-to-day work versus domain administration.

Was this article helpful?