<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Active Directory on Mexicali IT</title><link>https://mxlit.com/technologies/active-directory/</link><description>Recent content in Active Directory on Mexicali IT</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 08 Mar 2026 17:00:00 -0700</lastBuildDate><atom:link href="https://mxlit.com/technologies/active-directory/index.xml" rel="self" type="application/rss+xml"/><item><title>Active Directory: How to Check Active Directory Health and Force Replication</title><link>https://mxlit.com/kb-00051/</link><pubDate>Sun, 08 Mar 2026 17:00:00 -0700</pubDate><guid>https://mxlit.com/kb-00051/</guid><description>&lt;p&gt;A healthy Active Directory (AD) environment is the backbone of any Windows-based enterprise network. When Domain Controllers (DCs) stop communicating or fail to replicate changes properly, you will experience bizarre authentication issues, missing user accounts, and erratic GPO behaviors.&lt;/p&gt;
&lt;p&gt;As a system administrator, knowing how to quickly diagnose AD health and manually force replication is a critical skill. This guide outlines the most essential CMD and PowerShell commands used to verify Active Directory status, assess replication health, and manually trigger synchronization between servers.&lt;/p&gt;</description></item><item><title>Active Directory: Adding Windows Core as a Domain Controller.</title><link>https://mxlit.com/kb-00040/</link><pubDate>Wed, 04 Mar 2026 12:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00040/</guid><description>&lt;h2 id="domain-controller-in-windows-core"&gt;Domain Controller in Windows Core&lt;/h2&gt;
&lt;p&gt;If you&amp;rsquo;ve followed this series, you already know how to set up a primary and a secondary Domain Controller using the graphical interface (Desktop Experience). But, if we really want to take our infrastructure to the next level and minimize risks,&lt;/p&gt;
&lt;p&gt;In this third and final installment, we&amp;rsquo;re going to deploy a Domain Controller using Windows Server Core and purely the command line (PowerShell).&lt;/p&gt;
&lt;h3 id="why-choose-server-core-for-your-active-directory"&gt;&lt;strong&gt;Why Choose Server Core for Your Active Directory?&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;If you&amp;rsquo;re wondering why you should forgo the visual convenience of a graphical interface for such a critical role, the answer boils down to three fundamental pillars for any business environment:&lt;/p&gt;</description></item><item><title>Moving FSMO Roles</title><link>https://mxlit.com/kb-00038/</link><pubDate>Fri, 20 Feb 2026 21:14:14 -0800</pubDate><guid>https://mxlit.com/kb-00038/</guid><description>&lt;h2 id="why-is-it-necessary-to-move-fsmo-roles"&gt;&lt;strong&gt;Why is it necessary to move FSMO roles?&lt;/strong&gt;&lt;/h2&gt;
&lt;p&gt;In an Active Directory environment, not all Domain Controllers (DCs) are the same. Although most tasks are replicated multidirectionally, there are five critical roles called FSMO (Flexible Single Master Operation) that can only be run by one server at a time to prevent write conflicts and corruption in the ntds.dit database.&lt;/p&gt;
&lt;p&gt;Moving these roles is not just an administrative whim; It is an operational necessity in the following scenarios:&lt;/p&gt;</description></item><item><title>FSMO Role Function</title><link>https://mxlit.com/kb-00037/</link><pubDate>Fri, 20 Feb 2026 15:14:14 -0800</pubDate><guid>https://mxlit.com/kb-00037/</guid><description>&lt;p&gt;FSMO (Flexible Single Master Operations) roles are critical roles in an Active Directory environment that are assigned to one or more domain controllers to ensure that certain administrative and replication tasks are handled centrally. There are five FSMO roles, each with a specific function in the operation of Active Directory. Below, I detail the purpose of each:&lt;/p&gt;
&lt;h3 id="1-pdc-emulator"&gt;1. &lt;strong&gt;PDC Emulator&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: This role is responsible for emulating the behavior of a Windows NT Domain Controller (PDC) and is primarily used in mixed environments with earlier versions of Windows Server (such as Windows NT 4.0).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Password Authentication&lt;/strong&gt;: When a user changes their password, the PDC Emulator is responsible for updating the password database.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Time Synchronization&lt;/strong&gt;: The PDC Emulator is the primary server for time synchronization in the domain, as it is assumed to be the time source for the entire domain.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Group Policies&lt;/strong&gt;: It is responsible for managing certain types of group policies and password administration.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Master Password Change Copy&lt;/strong&gt;: This is the only server authorized to receive password changes across the entire domain. This means that if other domain controllers experience replication issues, passwords will not be synchronized correctly.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="2-rid-master"&gt;2. &lt;strong&gt;RID Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The RID Master is responsible for assigning &lt;strong&gt;ranges of unique identifiers (RIDs)&lt;/strong&gt; to domain controllers within the domain. RIDs are part of the unique identifier of an object in Active Directory (such as a user or group).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;RID Assignment&lt;/strong&gt;: Every object in Active Directory has a unique RID that is assigned when the object is created. The RID Master is the only one that can assign blocks of RIDs to other domain controllers.&lt;/li&gt;
&lt;li&gt;If the RID Master is offline for a period of time, other domain controllers will not be able to create new objects in the directory because they will not be able to obtain new RIDs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="3-infrastructure-master"&gt;3. &lt;strong&gt;Infrastructure Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Infrastructure Master is responsible for maintaining references to objects in other domains within Active Directory. This role is essential for trust relationships between domains.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cross-domain references&lt;/strong&gt;: If an object in one domain has a reference to an object in another domain (for example, if a user is in a group in another domain), the Infrastructure Master ensures that these references are up to date.&lt;/li&gt;
&lt;li&gt;If the Infrastructure Master is in a domain that is also a &lt;strong&gt;Global Catalog Server&lt;/strong&gt;, it will not be able to perform its job correctly, as the Global Catalog already manages object information for the entire forest.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="4-schema-master"&gt;4. &lt;strong&gt;Schema Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Schema Master is responsible for managing changes to the Active Directory schema. The schema is the definition of all object types and attributes that can be stored in Active Directory.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Schema Modifications&lt;/strong&gt;: If you want to add a new type of object or attribute to Active Directory (for example, a new account type or a new property for users), that change must be made through the Schema Master.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Schema Modifications&lt;/strong&gt;: Only a domain controller with the Schema Master role can apply changes to the schema. Other domain controllers cannot.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="5-domain-naming-master"&gt;5. &lt;strong&gt;Domain Naming Master&lt;/strong&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Main Function&lt;/strong&gt;: The Domain Naming Master is responsible for managing domain name changes within the Active Directory forest.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Specific Functions&lt;/strong&gt;:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Creating and Deleting Domains&lt;/strong&gt;: If you need to add a new domain or delete one in the Active Directory forest, the Domain Naming Master is the role responsible for this process.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Domain Name Changes&lt;/strong&gt;: Any attempt to change a domain name or domain structure within a forest is performed through the Domain Naming Master.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="summary-of-fsmo-role-functions"&gt;Summary of FSMO Role Functions&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;strong&gt;Role&lt;/strong&gt;&lt;/th&gt;
 &lt;th&gt;&lt;strong&gt;Main Function&lt;/strong&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PDC Emulator&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Time synchronization, password management, group policies, and PDC emulation in mixed environments.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;RID Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Assigns blocks of RIDs to domain controllers to create objects.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Infrastructure Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Maintains object references across domains.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Schema Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Makes modifications to the Active Directory schema (adding new attributes or object classes).&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Domain Naming Master&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;Manages the creation and deletion of domains in a forest.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="how-many-domain-controllers-should-have-these-roles"&gt;How Many Domain Controllers Should Have These Roles?&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Ideally, there should only be one domain controller with each of these roles within a domain or forest&lt;/strong&gt; to avoid conflicts and ensure that operations are performed centrally.&lt;/li&gt;
&lt;li&gt;However, in large or complex environments, &lt;strong&gt;FSMO roles can be moved&lt;/strong&gt; to other domain controllers if necessary for availability or performance reasons. This is usually done using tools such as &lt;strong&gt;&lt;code&gt;ntdsutil&lt;/code&gt;&lt;/strong&gt; or &lt;strong&gt;PowerShell&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="fsmo-role-verification"&gt;FSMO Role Verification&lt;/h3&gt;
&lt;p&gt;To verify which server is managing each FSMO role, you can use the following PowerShell command:&lt;/p&gt;</description></item><item><title>Active Directory: SYSVOL Folder not replicating</title><link>https://mxlit.com/kb-00028/</link><pubDate>Mon, 13 Feb 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00028/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The SYSVOL directory is a folder on Windows domain controllers that contains information and data necessary for the logon system and other Active Directory functions to work correctly. SYSVOL is essential for domain controller replication and the consistency of Active Directory data across the domain.&lt;/p&gt;
&lt;p&gt;When SYSVOL replication fails between domain controllers, it can cause serious problems with Active Directory functionality, such as the failure to create Group Policy Objects (GPOs). If these GPOs are not reflected across the different domain controllers, it can become a major issue.&lt;/p&gt;</description></item><item><title>Active Directory: Password Settings Objects (PSOs)</title><link>https://mxlit.com/kb-00027/</link><pubDate>Fri, 13 Jan 2023 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00027/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Active Directory (AD) is a Microsoft directory service that allows system administrators to centralize the management of users, groups, and resources on a network.&lt;/p&gt;
&lt;p&gt;One of AD&amp;rsquo;s features is the ability to configure Password Settings Objects (PSOs) to establish security policies for user passwords.&lt;/p&gt;








&lt;blockquote class="blockquote-regular"&gt;
 &lt;p&gt;Password Security Objects (PSOs) are different from password policies that can be added via Group Policy Objects (GPOs). PSOs can be used for specific purposes, such as setting a password shorter than the one specified by your domain&amp;rsquo;s password policy. This can be helpful if you have a system that doesn&amp;rsquo;t support the currently configured password policy. PSOs can also be used to strengthen passwords for a particular group, such as by increasing the password length or locking users after a single failed login attempt. The options are numerous and should be tailored to your specific needs.&lt;/p&gt;</description></item><item><title>ADDS: Configure and Promote a Second Domain Controller</title><link>https://mxlit.com/kb-00019/</link><pubDate>Fri, 31 Dec 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00019/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to configure and promote a second domain controller.&lt;/p&gt;
&lt;p&gt;Having a second domain controller is crucial, as it serves as a backup in case the primary controller fails. Redundancy is always beneficial; without an extra domain controller, if the primary controller fails, all users could lose access to the various systems.&lt;/p&gt;
&lt;p&gt;To avoid this, we&amp;rsquo;ll walk you through this task step by step. While this isn&amp;rsquo;t limited to just a second controller, you can also follow the same steps to add additional controllers.&lt;/p&gt;</description></item><item><title>GPO: How to Configure Password Policies</title><link>https://mxlit.com/kb-00009/</link><pubDate>Thu, 02 Sep 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00009/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, I will show you how to create a GPO to meet the minimum requirements for password policies.&lt;/p&gt;
&lt;p&gt;The first step is to access Group Policy Management.&lt;/p&gt;
&lt;h2 id="group-policy-management"&gt;Group Policy Management&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Right-click on Group Policy Objects and select New.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Give it a name related to what you want to do.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-2.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Select the created GPO, right-click, and select Edit.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00009/image-3.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Within the computer settings, expand the following options: Policies, Windows Settings, Security Settings, Account Policies, and select Password Policy.&lt;/p&gt;</description></item><item><title>ADDS: Install, Configure, and Promote a Domain Controller</title><link>https://mxlit.com/kb-00006/</link><pubDate>Sat, 28 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00006/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In this post, we&amp;rsquo;ll see how to install the ADDS (Active Directory Domain Services) role and how to promote our new domain controller.&lt;/p&gt;
&lt;p&gt;A domain controller will help us manage user authentication, apply policies, assign roles, and create administrative groups within our company.&lt;/p&gt;
&lt;p&gt;To do this, it&amp;rsquo;s recommended to follow some prerequisites before continuing with the role installation.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ll need to assign a descriptive name to our domain controller.&lt;/p&gt;</description></item><item><title>GPO: Enable script execution.</title><link>https://mxlit.com/kb-00007/</link><pubDate>Sat, 28 Aug 2021 22:39:01 -0800</pubDate><guid>https://mxlit.com/kb-00007/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;PowerShell script execution is disabled by default on domain-joined computers. If you attempt to run a script, you will receive a message stating that the policy is restricted.&lt;/p&gt;
&lt;h2 id="disallowed-scripts"&gt;Disallowed Scripts&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00007/image.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://mxlit.com/kb-00007/image-1.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;As administrators, we may want to implement scheduled tasks to perform certain automations, so it is necessary to be able to run scripts without restrictions.&lt;/p&gt;
&lt;p&gt;While it&amp;rsquo;s true that we can manually modify these values â€‹â€‹within the computer or bypass the script as shown in the image.&lt;/p&gt;</description></item><item><title>Active Directory: Delegation of Control.</title><link>https://mxlit.com/kb-00004/</link><pubDate>Thu, 19 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00004/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;h2 id="scenario"&gt;Scenario&lt;/h2&gt;
&lt;p&gt;Delegation of control in Active Directory can be very helpful when managing a large number of users from different locations. System administrators can delegate permissions to IT staff in different branches so they can manage users in their city. This is especially useful when permissions are delegated and your company doesn&amp;rsquo;t need everything centralized.&lt;/p&gt;
&lt;p&gt;For this example, let&amp;rsquo;s consider the following: My organization is divided into three cities: Ensenada, Tijuana, and Mexicali, with the latter being the main headquarters. Each city has IT staff, and we, as IT administrators, want to delegate user responsibility to the IT staff in Tijuana and Ensenada. To do this, I&amp;rsquo;ve created a security group for each city: IT-Tijuana and IT-Ensenada. Within these groups, I&amp;rsquo;ve added the corresponding staff for each city. These groups will serve as the basis for delegating control to the desired OUs (Organizational Units).&lt;/p&gt;</description></item><item><title>GPO: Maintain the Domain Admins group or other groups as local administrators within computers.</title><link>https://mxlit.com/kb-00003/</link><pubDate>Thu, 19 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00003/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;h2 id="situation"&gt;Situation&lt;/h2&gt;
&lt;p&gt;This is something I&amp;rsquo;ve seen in different places: sometimes, certain users with administrator privileges on a domain-joined computer delete the Domain Admins group or other groups required by the organization, whether for checking the computer&amp;rsquo;s status or for deploying software like SCCM.&lt;/p&gt;
&lt;p&gt;One of the basic rules is: Never make users local administrators. However, if it&amp;rsquo;s necessary and you want to ensure that the desired group always has local administrator privileges on your computer, the solution is to apply a Group Policy Object (GPO) to handle this automatically. It doesn&amp;rsquo;t matter if the user deletes the local administrator group(s) from their computer; when a GPO is applied, it will automatically add the required groups back to the computer&amp;rsquo;s administrators group.&lt;/p&gt;</description></item><item><title>PowerShell: How to add all users from an OU to a security group</title><link>https://mxlit.com/kb-00001/</link><pubDate>Sat, 14 Aug 2021 14:00:00 -0800</pubDate><guid>https://mxlit.com/kb-00001/</guid><description>&lt;h2 id="introduction"&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Sometimes it&amp;rsquo;s necessary to add all members of an Organizational Unit (OU) to a security group in Active Directory, but how can we do this using PowerShell?&lt;/p&gt;
&lt;h2 id="solution"&gt;Solution&lt;/h2&gt;
&lt;p&gt;Run the following command:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-powershell" data-lang="powershell"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Get-ADUser -SearchBase &lt;span style="color:#e6db74"&gt;&amp;#34;OU=IT,OU=Networkingzone_Users,DC=NETWORKINGZONE,DC=NET&amp;#34;&lt;/span&gt; -Filter * |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;ForEach-Object {Add-ADGroupMember -Identity &lt;span style="color:#e6db74"&gt;&amp;#39;Security-Test-Group&amp;#39;&lt;/span&gt; -Members $_}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;&lt;img src="https://mxlit.com/kb-00001/001.png" alt="Descripción del Paso 1"&gt;&lt;/p&gt;
&lt;p&gt;As you can see in the image, I only have 7 users within the IT OU and in this example all users from that OU will be added to the “Security-Test-Group”.&lt;/p&gt;</description></item></channel></rss>