| 90%+ of Fortune 500 companies rely on Active Directory as their primary identity platform | ~4,000 configurable settings in a modern Group Policy Object | #1 Target AD is the primary target in nearly every enterprise ransomware attack | 10 min how fast a misconfigured AD can be fully compromised via known privilege escalation paths |
Here’s a scenario most MSPs will recognise. A client’s Active Directory has been in production for eight years, touched by three admins who’ve since left, and inherited by an IT manager who deals with it reactively. The Users OU contains computers. The default Computers container has hundreds of objects. There are forty-odd GPOs, half named things like ‘New Policy 3’ and ‘Test April 2019.’ Domain Admins has twelve members including a service account called ‘SQLSvc.’ Nobody’s quite sure what applies to whom.
Sound familiar? This isn’t an edge case — it’s a fairly normal state for real-world AD environments. And it’s not just an administrative mess; it’s a security problem. Tools like BloodHound exist specifically to map the attack paths that a disorganised directory creates, and they find them in minutes. This article walks through AD structure, OU design, GPO processing, the security settings that matter most, and the attack paths MSPs need to understand.
Active Directory Domain Services (AD DS) is Microsoft’s hierarchical directory — a database of objects representing users, computers, groups, and policies, plus the relationships between them. At its core, it solves two problems: authentication (who you are) and authorisation (what you can access). It runs on three foundational standards: LDAP for directory queries, Kerberos for authentication, and DNS for domain controller location. When clients report ‘AD issues,’ DNS is almost always the root cause.
AD’s logical structure has four components worth being precise about: the Domain (the administrative boundary, with its own controllers and database), the Tree (domains sharing a contiguous DNS namespace), the Forest (the actual security boundary — not the domain, despite common belief), and the Organisational Unit (a management container for GPO application and delegation, not a security boundary).
| Forest vs. Domain — The Boundary That Matters The forest is AD’s security boundary, not the domain. An Enterprise Admin in one domain has the ability to compromise all other domains in the same forest — by design. If your client has ‘separated’ HR and Finance into different domains but they share a forest, there is no true security boundary between them. Real separation requires separate forests. |
OUs are management containers — the hooks where Group Policy gets applied and where administrative delegation is scoped. They are not security objects. You cannot control access to a file share or application by putting something in a particular OU; that’s what security groups are for. The most common structural mistake in AD design is using OUs for access control, which results in an OU for every application, trees dozens of levels deep, and a management nightmare.
OUs do exactly two things: scope GPO application (a GPO linked to an OU applies to all objects in that OU and its children, subject to filtering), and scope administrative delegation (you can grant a group password-reset rights over a specific OU without giving domain-wide access). That’s it.
OU Design: The Hybrid Model
There are three standard approaches — geographic (top-level by site), object type-based (top-level by Users/Computers/Servers), and function-based (top-level by department). Most real environments work best with a hybrid: top-level by site or function, with strict object-type separation within each branch. The key design principle is to structure OUs for GPO application, not to mirror the org chart.
A practical reference structure for mid-market environments (100–2,000 users): a top-level _Managed OU (underscore sorts it to the top in ADUC), containing Workstations, Servers, Users, AdminAccounts, ServiceAccounts, and Groups branches. Privileged accounts sit in a dedicated AdminAccounts OU — never alongside standard users — with Tier 0 (Domain Admins), Tier 1 (Server Admins), and Tier 2 (Workstation Admins) separated. Disabled accounts stage in a Disabled OU for 30–90 days before deletion. ServiceAccounts in their own branch enables targeted audit policy GPOs.
GPOs are applied in a fixed order: Local, Site, Domain, OU (LSDOU). Later-applied policies win on conflicts unless overridden by enforcement. The most specific policy wins by default — a GPO on a child OU overrides one on its parent, which overrides the domain level. Useful for building broad baselines at the domain level and overriding specific settings lower down. Also dangerous — a child OU GPO can silently override a security control you thought was universally enforced.
Three modifiers change default behaviour. Inheritance (default): child OUs inherit all parent and domain GPOs, more-specific wins on conflict. Enforcement: an enforced GPO applies regardless of conflicting lower-level settings, and cannot be blocked — use sparingly, only for universal security baselines. Block Inheritance: stops all inherited GPOs except enforced ones — occasionally legitimate for isolated test OUs, frequently abused as a quick fix. Always document it.
Security filtering is the right tool when you need ‘apply this GPO to some but not all objects in this OU.’ Remove Authenticated Users from Apply Group Policy and add the target security group. Important: leave Domain Computers with Read permission so the machine can still retrieve the GPO from SYSVOL, even if the policy applies only to specific users. Skipping this is the most common cause of ‘security filtering is configured but the GPO applies to nobody.’
Group Policy is one of the most powerful security enforcement mechanisms in a Windows domain. These are the settings with the highest security return:

These four attack paths are the ones MSPs will encounter in client environments. All four exploit AD configuration, not unpatched vulnerabilities:
The common thread: a fully patched domain controller can be compromised via Kerberoasting against a service account with a weak password. Patch management handles vulnerability exploits; AD governance — OU design, GPO hardening, tiered administration, access rights auditing — handles configuration-based attacks.
Active Directory is the identity underpinning of most client environments MSPs manage. The OU hierarchy, GPO structure, and administrative tiering aren’t a one-time setup — they’re a living architecture that drifts without periodic review and disciplined change management. The environments that produce the most catastrophic AD incidents don’t necessarily have unpatched vulnerabilities. They have drift: forgotten admin accounts, service accounts that accumulated Domain Admin rights, GPOs that stopped applying for unknown reasons, and no segmentation between helpdesk and domain-level privilege.
Getting AD governance right — or being the partner who can impose order on the inherited chaos — is a genuine technical differentiator for MSPs. Clients who’ve lived through a poorly structured AD environment know exactly what the cleanup costs. The payoff of doing it properly from the start is entirely real.
| Working With TechMonarch Managed IT at scale means inheriting and governing Active Directory environments in various states of health. OU design reviews, GPO audits, tiered administration implementation, and service account privilege assessments are part of the structured managed IT delivery we provide for our MSP partners’ clients. When AD is properly designed, everything downstream — MDM, conditional access, SIEM, patch management — works more reliably. Get in touch: www.techmonarch.com |