Active Directory (AD) is a directory service developed by Microsoft that stores and manages information about users, computers, and resources on a Windows network, and controls who can access what. It runs on Windows Server, was first released with Windows 2000, and is used by an estimated 90% of Fortune 1000 companies as the foundation of their identity and access management.
In practice, Active Directory answers two questions every time someone tries to use a corporate system: Who are you? (authentication) and What are you allowed to do? (authorization).
Administrators use Active Directory to manage thousands of users and devices from one place, enforce security policies across the organization, and give employees single sign-on access to the applications they need without configuring each machine individually.
Active Directory is used for six core functions in an enterprise IT environment:
Because AD underpins so many enterprise systems including Exchange, SharePoint, file shares, VPNs, and thousands of third-party applications, it is often described as the identity backbone of the modern enterprise.
Active Directory works by storing identity and resource information as objects in a hierarchical database that lives on specialized servers called domain controllers. When a user logs in, a domain controller verifies the credentials and issues a Kerberos ticket the user presents to access other systems on the network.
Here is the step-by-step flow of a typical AD login:
Active Directory relies on four core protocols:
Changes made on one domain controller are automatically replicated to all other domain controllers in the same domain, so the directory stays consistent across the network.
Active Directory is built from eight core components that work together:
"Active Directory" is an umbrella term for five related services, each with a distinct purpose:
| Service | Acronym | What it does |
| Active Directory Domain Services | AD DS | Core authentication, authorization, and directory service |
| Active Directory Lightweight Directory Services | AD LDS | Lightweight LDAP directory for applications that don't need a full domain |
| Active Directory Certificate Services | AD CS | Issues and manages digital certificates for encryption and identity |
| Active Directory Federation Services | AD FS | Enables single sign-on across organizations using identity federation |
| Active Directory Rights Management Services | AD RMS | Protects sensitive documents with encryption and usage policies |
When people say "Active Directory," they almost always mean AD DS, the foundation all the others build on.
Active Directory organizes resources in a three-level hierarchy:
Directory organizes resources in a three-level hierarchy:
Trust relationships between domains let users in one domain access resources in another, which is how large enterprises operate a unified identity system across business units, subsidiaries, and regions.
Active Directory and Microsoft Entra ID are different products with different architectures. Active Directory is an on-premises directory service; Microsoft Entra ID (renamed from Azure AD in 2023) is a cloud identity service.
| Attribute | Active Directory (AD DS) | Microsoft Entra ID |
| DeploymentOn-premises (Windows Server) | On-premises (Windows Server) | Cloud (SaaS) |
| Primary protocols | LDAP, Kerberos, NTLM | OAuth 2.0, OpenID Connect, SAML, SCIM |
| Manages | Domain-joined PCs, servers, file shares, on-prem apps | SaaS apps, Microsoft 365, cloud workloads |
| Structure | Forests, domains, OUs | Flat tenant (no OUs) |
| Policy tool | Group Policy (GPOs) | Conditional Access + Microsoft Intune |
| Best for | Traditional enterprise infrastructure | Cloud-first and hybrid environments |
Most enterprises today run a hybrid identity model — on-premises Active Directory federated to Microsoft Entra ID using Entra Connect; so users get one login for both legacy on-prem systems and modern cloud apps.
Active Directory is targeted in an estimated 9 out of 10 cyberattacks on enterprise networks, according to Microsoft, because compromising AD effectively hands attackers the keys to the entire organization. Cohesity’s Cyber Events Response Team (CERT) see that 95% of security incidents involve AD.
The most common attacks against Active Directory include:
When AD is compromised or destroyed, users cannot log in, applications cannot authenticate, and the business stops running — often for days or weeks.
A full Active Directory recovery is one of the most complex operations in enterprise IT. Rebuilding a compromised AD forest from scratch can take weeks, often with direct assistance from Microsoft. Because nearly every other system depends on AD, an AD outage is effectively a total business outage.
Modern Active Directory protection requires more than traditional backup. An enterprise-grade AD recovery strategy includes:
Cohesity helps organizations protect and rapidly recover Active Directory by hardening your identity infrastructure, continuously monitoring for identity threats, automating AD recoveries, and conducting post-breach forensics to close backdoors. Cohesity Identity Resilience can help organizations reduce the chances of a successful attack by 25% while also reducing time spent manually monitoring by 40%. It automates AD recoveries to a few clicks to decrease recovery times from identity-based attacks by up to 90%.
Follow these nine best practices to harden Active Directory against attack:
Cohesity Identity Resilience helps organizations detect, withstand, and recover from identity-based attacks. Cohesity and Semperis have long partnered to bring leading proven technologies with seamless integrations that continuously monitor, remediate threats, automate malware-free recoveries, and enable advanced post-breach forensics for Active Directory. It is a purpose-built solution designed to protect AD before, during, and after an attack and aligns to the real sequence of identity compromise.
Active Directory is Microsoft's service for managing who can sign in to a company's network and what they can access. It stores user accounts, computers, and resources in a central database and acts as both the phonebook and the security guard for a Windows environment.
Active Directory is used for authentication, authorization, centralized user and device management, Group Policy enforcement, single sign-on, and resource discovery across a Windows network.
No. Active Directory (AD DS) is an on-premises directory service running on Windows Server and using LDAP and Kerberos. Microsoft Entra ID (formerly Azure AD) is a cloud identity service using OAuth, OpenID Connect, and SAML. They are complementary, not identical, and most enterprises run both in a hybrid model.
A domain controller is a Windows Server running the Active Directory Domain Services role. It stores a copy of the AD database, authenticates users, enforces security policies, and replicates changes to other domain controllers.
A domain is one directory database with one security boundary. A tree is one or more domains sharing a contiguous DNS namespace. A forest is one or more trees sharing a schema, configuration, and Global Catalog — and is considered the ultimate security boundary in AD.
Active Directory uses LDAP for directory queries, Kerberos for authentication, DNS for locating services, and SMB and RPC for communication between systems.
Why do attackers target Active Directory? Attackers target Active Directory because it controls authentication and access across the entire network. Compromising AD allows ransomware and advanced threat groups to move laterally, escalate privileges, disable defenses, and block recovery.
To back up Active Directory, you protect the system state of every domain controller, which includes the AD database (NTDS.dit), SYSVOL, registry, and Group Policy. Enterprise environments should use a dedicated backup solution with immutable storage, object-level recovery, and automated forest recovery — Windows Server Backup alone is not sufficient for enterprise resilience.
Without a purpose-built recovery solution, recovering a compromised AD forest can take one to four weeks. With automated, isolated recovery tools like those offered by Cohesity, organizations can restore AD in a matter of hours.
For newer or fully cloud-native organizations, Microsoft Entra ID can replace many AD functions. However, because AD is still such a prevalent technology that has been used for decades, most enterprises still depend on on-premises AD for legacy applications, domain-joined devices, and file shares, and will continue to operate a hybrid identity model for the foreseeable future.
If Active Directory goes down, users cannot log in to domain-joined systems, applications that rely on AD authentication stops working, file shares become inaccessible, and most enterprise IT operations halt until AD is restored.
Enjoyed your demo? Experience the power of cloud backup and recovery—free for 30 days.