Tier 2 · SOP-008 · Module 08 of 09

Active Directory User Support

Create, modify, and unlock user accounts in Active Directory. Understand OUs, groups, and permissions. Every corporate IT role requires AD skills — this is non-negotiable.

Tier 2 — IT Support SOP-008 Intermediate Identity Management
🏢

Phase 1 — Learn IT

Understand Active Directory structure and the key tasks you'll perform as a Tier 2 IT support technician.

What Is Active Directory?

Active Directory (AD) is Microsoft's directory service for managing users, computers, groups, and policies in an enterprise network. Every corporate Windows environment uses it. As a Tier 2 tech, you'll use Active Directory Users and Computers (ADUC) to handle the majority of user account tasks.

Think of AD as the single source of truth for: who someone is, what groups they belong to, what resources they can access, and what policies apply to their computer. One account, controlled centrally.

AD ObjectWhat It IsCommon Tasks
User AccountIdentity for a person; has username, password, attributesCreate, disable, unlock, reset password, modify attributes
Computer AccountRepresents a domain-joined machineMove to correct OU; disable when decommissioned
Security GroupCollection of users; used to assign permissionsAdd/remove members; determine access rights
Distribution GroupEmail distribution list; no security permissionsAdd/remove for email routing
OU (Org Unit)Container to organize objects; GPOs apply at OU levelMove users to correct OU for correct GPO application
GPOGroup Policy Object; applies settings to users/computersLink/unlink GPOs; troubleshoot policy application with gpresult

What You'll Do Every Day

TaskWhenTool
Unlock accountUser locked out after too many bad passwordsADUC → right-click user → Unlock Account
Reset passwordUser forgot password or security reset requiredADUC → right-click user → Reset Password
Create user accountNew hire onboardingADUC → right-click OU → New → User
Disable accountEmployee offboarding or leave of absenceADUC → right-click user → Disable Account
Add to security groupUser needs access to a resourceADUC → user Properties → Member Of → Add
Check account expiryUser can't log in despite correct passwordADUC → user Properties → Account tab
Move user to OUDepartment change; incorrect GPO being appliedADUC → right-click user → Move
⚠️

Always Verify Identity Before Resetting Passwords

Before resetting any account password, verify the caller's identity using your organization's verification procedure (employee ID, manager confirmation, security questions). Social engineering attacks frequently target the help desk with requests to reset passwords for accounts the attacker doesn't own. No verification = no reset, regardless of how convincing the caller sounds.

Why Accounts Lock Out

Account lockout policies are configured in Group Policy. When a user enters the wrong password more than the configured threshold (commonly 5 attempts), the account locks. This prevents brute-force attacks but also creates a common help desk ticket.

💡

Common Cause: Cached Credentials on a Mobile Device

The most frequent cause of repeated lockouts isn't the user forgetting their password — it's a phone or tablet that has the old password cached and keeps trying to authenticate against Exchange or VPN. When you unlock the account and it locks again in 10 minutes, ask the user: "Do you have email set up on your phone? When did you last change your password?" The phone is almost always the culprit.

Key Terms

Domain Controller
A server running Active Directory Domain Services (AD DS). Authenticates all logins and replicates the AD database to other DCs.
SAM Account Name
The legacy pre-Windows 2000 username (DOMAIN\username). Still used by many systems and is what you enter in the "User logon name (pre-Windows 2000)" field in ADUC.
UPN
User Principal Name. Email-style login format (user@domain.com). Used for modern authentication. Often matches the user's email address.
Distinguished Name
The full LDAP path to an AD object. Example: CN=John Smith,OU=Staff,DC=company,DC=com. Used in scripts and LDAP queries.
ADUC
Active Directory Users and Computers. The primary GUI tool for managing AD objects. Run from Server Manager, Admin Tools, or via RSAT on a workstation.
RSAT
Remote Server Administration Tools. Windows feature that allows admin tools (ADUC, Group Policy, DNS) to run on a workstation instead of a server.
📋

Phase 2 — Do IT

Execute SOP-008. Verify identity, follow the procedure, document everything.

SOP-008 · ACTIVE DIRECTORY USER SUPPORT · REV 1.0

Active Directory Account Management

Use this procedure for account lockouts, password resets, new user creation, and account modifications. Identity verification is mandatory before any account change.

01

Verify the Requester's Identity

Before making any account change: verify identity per your organization's policy (employee ID, manager approval, challenge questions, or ticket submitted through authenticated portal). Document the verification method in your ticket. Never skip this step. For password resets, require the user to be present at their machine if possible.

02

Open ADUC and Locate the Account

Open Active Directory Users and Computers (dsa.msc or from Admin Tools). Use Action → Find (or Ctrl+F) to search for the user by name or username. Enable "Advanced Features" from the View menu if you need to see all tabs. Right-click the found account to see all available actions.

03

Unlock Account / Reset Password

To unlock: right-click user → Unlock Account (or go to Properties → Account tab → check "Unlock account"). To reset password: right-click user → Reset Password → set temporary password → check "User must change password at next logon." Communicate the temporary password to the user securely (never via unsecured email).

04

Check Account Expiry and Logon Restrictions

If the user can't log in despite a correct password: open user Properties → Account tab. Check: Account is locked out (checkbox), Account expires date, Logon hours restrictions, and "Account is disabled" checkbox. Also check the General tab for notes or account description that may indicate intentional restriction.

05

Manage Group Membership

To add user to a security group: open user Properties → Member Of tab → Add. Type the group name and click Check Names. To add multiple users to a group at once: find the group in ADUC → Properties → Members tab → Add. Document which groups were added and why in the ticket. Group membership changes take effect at next login (or when gpupdate /force is run).

06

Create New User Account

Navigate to the appropriate OU → right-click → New → User. Fill in: First name, Last name, User logon name (UPN format), and pre-Windows 2000 logon name (SAMAccountName). Set initial password → check "User must change password at next logon." After creation, immediately add the user to required security groups and verify the OU placement is correct for proper GPO application.

07

Disable Account (Offboarding)

For departing employees: right-click account → Disable Account. Do NOT delete immediately — maintain for 30–90 days per your retention policy (files and email access may be needed). Move the disabled account to a dedicated "Disabled Accounts" OU. Remove from all security groups. Note departure date in the Description field. Escalate if mailbox access or data export is needed.

Escalate When

  • Account keeps locking repeatedly even after unlock — investigate for cached credentials or potential attack
  • User needs Domain Admin or elevated privilege group membership
  • New OU or Group Policy changes are required
  • User cannot log in to a domain controller or sensitive system
  • Suspected account compromise — lock the account and escalate to security team immediately
  • Bulk account changes needed (onboarding multiple employees)

AD Tasks Cheat Sheet

TaskRight-Click MenuNotes
Unlock accountUnlock Account (or Account tab)Check for repeated lockouts afterward
Reset passwordReset PasswordAlways set "must change at next logon"
Disable accountDisable AccountMove to Disabled OU; don't delete yet
Add to groupProperties → Member Of → AddTakes effect at next login
Force policy updateN/A — run on user's PCgpupdate /force in elevated CMD
🎯

Phase 3 — Apply IT

Handle real AD scenarios. Identity verification and documentation are always required.

Practice Tickets

SCENARIO 01

The Lockout Loop

"I keep getting locked out every day. You unlock me and an hour later I'm locked out again. I've changed my password twice and it keeps happening."
Your Tasks
  • 1.Unlock the account. But before you close the ticket, what is the most common cause of repeated lockouts in a corporate environment?
  • 2.What specific question do you ask the user to quickly diagnose this?
  • 3.The user confirms they have email on their iPhone and last changed their password 3 days ago. What do they need to do and how do you guide them?
  • 4.After the fix, it happens again. What do you escalate and to whom?
SCENARIO 02

New Hire Onboarding

"We have a new hire starting Monday — Sarah Chen, joining the Finance team. Can you set up her account? She needs access to the Finance shared drive and the accounting software."
Your Tasks
  • 1.What information do you need before creating the account?
  • 2.Which OU do you create the account in and why does the OU matter?
  • 3.What password settings do you apply and how do you securely deliver the initial credentials?
  • 4.How do you grant access to the Finance shared drive and the accounting software?
SCENARIO 03

The Social Engineer

"Hi, this is Mark from sales. I'm locked out of my account. I'm at a client site and can't log in — I have a presentation in 10 minutes. Can you reset my password right now?"
Your Tasks
  • 1.The urgency is a social engineering technique. What is your protocol regardless of how urgent the request is?
  • 2.What verification methods can you use when the user is not physically present?
  • 3.The caller cannot answer the verification questions correctly. What do you do?
  • 4.The caller gets angry and says "just do it, I'm a manager." How do you respond?

Document Your Resolution

FieldYour Entry
Account Action
Identity Verified
Change Made
Groups Modified
User Notified

Questions You'll Face

Interview Question 01

"How do you handle a user who is repeatedly getting locked out of their Active Directory account?"

Strong Answer Framework

First I unlock the account in ADUC. Then — rather than just closing the ticket — I investigate the root cause. The most common cause of repeated lockouts is cached credentials on a mobile device that keeps trying to authenticate with an old password. I ask the user if they have email, VPN, or any work apps on their phone and when they last changed their password. If they changed it recently and have a phone, I guide them to update the mail settings on the device. If it persists, I use the Microsoft Lockout and Recovery tool (LockoutStatus or Event Viewer on the DC) to identify which machine is triggering the lockouts.

Interview Question 02

"What is an OU in Active Directory and why does it matter where a user account is placed?"

Strong Answer Framework

An OU (Organizational Unit) is a container in Active Directory used to organize objects like users, computers, and groups. The critical reason placement matters is Group Policy Objects (GPOs) — policies that control settings, software deployment, and security configuration — apply based on OU membership. A user in the Finance OU gets Finance policies; a user incorrectly placed in the IT OU gets IT policies, which may give them access or restrictions they shouldn't have. When creating a new user account, always confirm the correct OU with the manager or HR to ensure proper policy application from day one.

Interview Question 03

"A caller says they're an executive and urgently need a password reset. You can't verify their identity through normal channels. What do you do?"

Strong Answer Framework

I do not reset the password without verification, regardless of who the caller claims to be. Social engineering attacks specifically exploit urgency and authority — claiming to be an executive is a classic technique. I explain politely but firmly that our security policy requires identity verification before any account changes, and that this policy protects everyone, including them. I offer alternative verification paths: have their manager call in to confirm, or have them come to the help desk in person with an ID. If they are who they say they are, they will understand the policy. If they continue to pressure me to bypass it, I escalate to my supervisor — not bypass the policy.

Completion Checklist

I understand the six main AD object types and when I'd interact with each
I know how to unlock accounts and reset passwords in ADUC
I understand why mobile device cached credentials cause repeated lockouts
I can create a new user account with proper OU placement and group membership
I always verify identity before making account changes — no exceptions
I completed all three scenarios including the social engineering scenario

Continue Your Training

Module 08 · SOP-008
Finished all three phases? Mark this module complete.