Lab - Implementing identity services and Group Policy
Lab - Implementing identity services and Group Policy
Scenario
Lab: Implementing identity services and Group
Objectives Policy
Estimated time:
45 minutes Scenario
Lab setup You are working as an administrator at Contoso Ltd. The company is expanding its business with several new
locations. The Active Directory Domain Services (AD DS) Administration team is currently evaluating methods
Exercise 1:
Deploying a available in Windows Server for a non-interactive, remote domain controller deployment. The team is also
new domain searching for a way to automate certain AD DS administrative tasks. Additionally, the team wants to establish
controller on
Server Core configuration management based on Group Policy Objects (GPO).
Exercise 2: Note: An interactive lab simulation is available that allows you to click through this lab at your own pace. You
Configuring may find slight differences between the interactive simulation and the hosted lab, but the core concepts and
Group Policy
ideas being demonstrated are the same.
Objectives
After completing this lab, you’ll be able to:
Lab setup
Virtual machines: AZ-800T00A-SEA-DC1, AZ-800T00A-ADM1, and AZ-800T00A-SEA-SVR1 must be running.
Other VMs can be running, but they aren’t required for this lab.
❕ Note: AZ-800T00A-SEA-DC1, AZ-800T00A-ADM1, and AZ-800T00A-SEA-SVR1 virtual machines are hosting the
installation of SEA-DC1, SEA-SVR1, and SEA-ADM1.
1. Select SEA-ADM1.
Username: Administrator
Password: Pa55w.rd
Domain: CONTOSO
Scenario
As a part of business restructuring, Contoso wants to deploy new domain controllers in remote sites with
minimal engagement of IT in remote locations. You need to use DC deployment to deploy new domain
controllers.
❕ Note: If you centrally manage your servers, you will not usually need GUI tools on each server. If you want to install them,
you need to specify the AD DS tools by running the Add-WindowsFeature cmdlet with the RSAT-ADDS command.
❕ Note: You might need to wait after the installation process completes before verifying that the AD DS role has installed. If
you do not observe the expected results from the Get-WindowsFeature command, you can try again after a few minutes.
1. On SEA-ADM1, from Server Manager, on the All Servers node, add SEA-SVR1 as a managed server.
2. On SEA-ADM1, from Server Manager, configure SEA-SVR1 as an AD DS domain controller by using the
following settings:
Delete the comment lines, which begin with the number sign (#).
Remove the Import-Module line.
Remove the grave accents (`) at the end of each line.
Remove the line breaks.
5. Now that the Install-ADDSDomainController command and all the parameters are on one line, copy the
command.
6. Switch to Windows PowerShell, and then at the command prompt, enter the following command:
Code Copy
7. Paste the copied command between the braces ({ }) and run the resulting command to start the installation.
The complete command should have the following format:
Code Copy
Username: CONTOSO\\Administrator
Password: Pa55w.rd
https://microsoftlearning.github.io/AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure/Instructions/Labs/LAB_01_Implementing_identity_services_and_Group_Policy.html 2/5
2/12/25, 11:37 AM AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure
2. To create an organizational unit (OU) called Seattle, in the Windows PowerShell console, run the
following command:
Code Copy
3. To create a user account for Ty Carlson in the Seattle OU, run the following command:
Code Copy
Code Copy
Set-ADAccountPassword Ty
Code Copy
Enable-ADAccount Ty
2. To create a domain global group named SeattleBranchUsers, run the following command:
Code Copy
3. To add the Ty user account to the newly created group, run the following command:
Code Copy
4. To confirm that the user is in the group, run the following command:
Code Copy
5. To add the user to the local Administrators group, run the following command:
https://microsoftlearning.github.io/AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure/Instructions/Labs/LAB_01_Implementing_identity_services_and_Group_Policy.html 3/5
2/12/25, 11:37 AM AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure
Code Copy
❕ Note: This is necessary to allow sign in with the CONTOSO\Ty user account to SEA-ADM1.
Results
After this exercise, you should have successfully created a new domain controller and managed objects in AD DS.
Scenario
As a part of Group Policy implementation, you want to import custom administrative templates for Office apps
and configure settings.
1. On SEA-ADM1, from Server Manager, open the Group Policy Management console.
2. Create a GPO named Contoso Standards in the Group Policy Objects container.
3. Open the Contoso Standards GPO in the Group Policy Management Editor, and then browse to User
Configuration\Policies\Administrative Templates\System.
4. Enable the Prevent access to registry editing tools policy setting.
5. Browse to the User Configuration\Policies\Administrative Templates\Control Panel\Personalization
folder, and then configure the Screen saver timeout policy to 600 seconds.
6. Enable the Password protect the screen saver policy setting, and then close the Group Policy
Management Editor window.
1. On SEA-ADM1, in the Group Policy Management console, create a new GPO named Seattle Application
Override that is linked to the Seattle OU.
2. Configure the Screen saver timeout policy setting to be disabled, and then close the Group Policy
Management Editor window.
1. On SEA-ADM1, from Server Manager, open the Group Policy Management console.
https://microsoftlearning.github.io/AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure/Instructions/Labs/LAB_01_Implementing_identity_services_and_Group_Policy.html 4/5
2/12/25, 11:37 AM AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure
2. In the Group Policy Management Console tree, select the Seattle OU.
3. Select the Group Policy Inheritance tab and review its content.
❕ Note: The Seattle Application Override GPO has higher precedence than the CONTOSO Standards GPO. The screen
saver time-out policy setting that you just configured in the Seattle Application Override GPO is applied after the
setting in the CONTOSO Standards GPO. Therefore, the new setting will overwrite the CONTOSO Standards GPO
setting. Screen saver time-out will be disabled for users within the scope of the Seattle Application Override GPO.
1. On SEA-ADM1, in the Group Policy Management console, select the Seattle Application Override GPO.
Notice that in the Security Filtering section, the GPO applies by default to all authenticated users.
2. In the Security Filtering section, first remove Authenticated Users, and then add the SeattleBranchUsers
group and the SEA-ADM1 computer account.
1. In Group Policy Management, in the navigation pane, select Group Policy Modeling.
2. Launch the Group Policy Modeling Wizard.
3. Set the target user and computer to the CONTOSO\Ty user account and the CONTOSO\SEA-ADM1
computer, respectively.
4. Step through the remaining pages of the wizard, review the default settings without modifying them, and
complete the wizard, which will generate a report containing its outcome.
5. After the report is created, in the details pane, select the Details tab, and then select show all.
6. In the report, scroll down until you locate the User Details section, and then locate the Control
Panel/Personalization section. You should notice that the Screen saver timeout settings are obtained
from the Seattle Application Override GPO.
7. Close the Group Policy Management console.
Results
After this exercise, you should have successfully created and configured GPOs.
https://microsoftlearning.github.io/AZ-800-Administering-Windows-Server-Hybrid-Core-Infrastructure/Instructions/Labs/LAB_01_Implementing_identity_services_and_Group_Policy.html 5/5