Permissions Required For The Ad Account Configured in Admanager Plus
Permissions Required For The Ad Account Configured in Admanager Plus
Permissions Required For The Ad Account Configured in Admanager Plus
www.admanagerplus.com
Table of contents
User Management 1
i Create Users 1
ii Modify Users 3
iv Restore users 6
Contact Management 9
i Create Contacts 9
ii Modify Contacts 10
iv Restore Contacts 12
Computer Management 15
i Create Computers 15
ii Modify Computers 16
iv Restore Computers 18
Group Management 21
i Create Groups 21
ii Modify Groups 22
iv Restore Groups 24
AD Reporting 28
High Availability 31
To carry out the desired Active Directory (AD) management and reporting
operations,
ADManager Plus must be provided with the necessary permissions. This can
The user account that you provide can have the credentials of a Domain
Admin account. If you do not want to use a Domain Admin account, you can
use a user account that has been granted sufficient privileges to carry out
The following sections contain the least privileges that have to be assigned
User Management
This section provides a detailed explanation on the permissions required to create, modify and
delete user accounts.
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read and Write permissions on all user objects of the required OU.
1
Steps to grant the permissions to create a user account.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions and
select Delegate Control. The Delegation of Control wizard will pop-up
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the User objects checkbox. Also select the
Create selected objects in this folder option as indicated in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read and Write permissions and click on
Next as indicated in the following image.
8. Click Finish.
2
Operation: Modify users
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read, Write, Read All Properties permissions on all user objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the User objects option as
indicated in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read, Write and Read all properties permissions
and click on Next as indicated in the following image.
3
8. Click Finish.
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Delete All Child Objects permission on all user objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the User objects checkbox.
Also select the Delete selected objects in this folder option as indicated in the following image.
4
6. Click on Next. Under the Show these permissions section, select General and
Creation/Deletion of specific child objects options.
7. Under the permissions section, select the Delete all child objects permission and click on
Next as indicated in the following image.
8. Click Finish.
5
Operation: Restore users
Permissions needed:
- The users modifying the permissions on the deleted objects container must be a member
of the Domain Admins group.
- The Active Directory Application Mode (ADAM) tool has to be downloaded and installed
separately in domain controllers running Windows Server 2000 and 2003.
Any object deleted from AD is stored in the deleted objects container and can be restored
before the end of its tombstone lifetime period. To restore a deleted AD object,
non-administrators must have sufficient permission to access this container.
To grant the required permissions:
1. Log in to your domain controller and launch the ADAM tools Command Prompt.
Note:
Every domain in a forest will have its own deleted objects container, so it's essential to specify the
domain name of the deleted objects container for which you would like to modify permissions.
3. To grant permission to a security principal to access the deleted objects container, specify a
command in the following format: dsacls "CN=Deleted Objects,DC=admanagerplus,DC=com"
/g ADMANAGERPLUS\LukeJohnson:LCRPWP
6
Note: Replace "LukeJohnson" with the security principal of your choice.
4. Next, connect to the default naming context, right-click on the domain root, and select Properties.
7
b. Create User objects
Note: Apply the Reanimate tombstones rights to the object being secured and its descendant objects.
7. Click OK.
Note: Only objects deleted after the delegation of the above-mentioned permissions can be restored.
8
Contact Management
This section provides a detailed explanation on the permissions required to create, modify and
delete contacts in AD.
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read and Write permissions on all contact objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions and
select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Contact objects checkbox.
Also select the Create selected objects in this folder option as indicated in the image below:
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read and Write permissions and click on Next.
8. Click Finish.
9
Operation: Modify contacts
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read, Write, Read All Properties permissions on all user objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Contact objects option as
indicated in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read, Write and Read all properties
permissions and click on Next.
8. Click Finish.
10
Operation: Delete contacts
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Delete All Child objects permission on all contact objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Contact objects checkbox.
Also select the Delete selected objects in this folder option as depicted in the image below:
6. Click on Next. Under the Show these permissions section, select General and
Creation/Deletion of specific child objects options.
7. Under the permissions section, select the Delete all child objects permission and click on Next.
8. Click Finish.
11
Operation: Restore contacts
Permissions needed:
-The users modifying the permissions on the deleted objects container must be a member
of the Domain Admins group.
- The Active Directory Application Mode (ADAM) tool has to be downloaded and installed
separately in domain controllers running Windows Server 2000 and 2003.
1. Log in to your domain controller and launch the ADAM tools Command Prompt.
Note:
Every domain in a forest will have its own deleted objects container, so it's essential to specify the
domain name of the deleted objects container for which you would like to modify permissions.
3. To grant permission to a security principal to access the deleted objects container, specify a
command in the following format: dsacls "CN=Deleted Objects,DC=admanagerplus,DC=com"
/g ADMANAGERPLUS\LukeJohnson:LCRPWP
12
Note: Replace "LukeJohnson" with the security principal of your choice.
4. Next, connect to the default naming context, right-click on the domain root, and select Properties.
13
b. Create Contact objects
Note: Apply the Reanimate tombstones rights to the object being secured and its descendant objects.
7. Click OK.
Note: Only objects deleted after the delegation of the above-mentioned permissions can be restored.
14
Computer Management
This section provides a detailed explanation on the permissions required to create, modify and
delete computers in AD.
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read and Write permissions on all computer objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Computer objects checkbox.
Also select the Create selected objects in this folder option as indicated in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read and Write permissions and click on Next.
8. Click Finish.
15
Operation: Modify computers
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read, Write, Read All Properties permissions on all computer objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Computer objects checkbox as
depicted in the image below:
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read, Write and Read all properties
permissions and click on Next.
8. Click Finish.
16
Operation: Delete computers
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Delete All Child objects permission on all computer objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Computer objects checkbox as
depicted in the image below:
6. Click on Next. Under the Show these permissions section, select General and
Creation/Deletion of specific child objects options.
7. Under the permissions section, select the Delete all child objects permission and click on Next.
8. Click Finish.
17
Operation: Restore computers
Permissions needed:
- The users modifying the permissions on the deleted objects container must be a member
of the Domain Admins group.
- The Active Directory Application Mode (ADAM) tool has to be downloaded and installed
separately in domain controllers running Windows Server 2000 and 2003.
Any object deleted from AD is stored in the deleted objects container and can be restored
before the end of its tombstone lifetime period. To restore a deleted AD object,
non-administrators must have sufficient permission to access this container.
To grant the required permissions:
1. Log in to your domain controller and launch the ADAM tools Command Prompt.
Note:
Every domain in a forest will have its own deleted objects container, so it's essential to specify the
domain name of the deleted objects container for which you would like to modify permissions.
3. To grant permission to a security principal to access the deleted objects container, specify a
command in the following format: dsacls "CN=Deleted Objects,DC=admanagerplus,DC=com"
/g ADMANAGERPLUS\LukeJohnson:LCRPWP
18
Note: Replace "LukeJohnson" with the security principal of your choice.
4. Next, connect to the default naming context, right-click on the domain root, and select Properties.
19
b. Create Computer objects
Note: Apply the Reanimate tombstones rights to the object being secured and its descendant objects.
7. Click OK.
Note: Only objects deleted after the delegation of the above-mentioned permissions can be restored.
20
Group Management
This section provides a detailed explanation on the permissions required to create, modify and
delete groups in AD.
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read and Write permissions on all the group objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Group objects checkbox.
Also select the Create selected objects in this folder option as depicted in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read and Write permissions and click on Next.
8. Click Finish.
21
Operation: Modify Groups
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Read, Write, Read All Properties permissions on all the group objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions and
select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Group objects checkbox as
indicated in the following image.
6. Click on Next. Under the Show these permissions section, select General and
Property-specific options.
7. Under the permissions section, select the Read, Write and Read all properties permissions
and click on Next.
8. Click Finish.
22
Operation: Delete Groups
Permissions needed:
- Must be a member of the Account Operators Group
- Must have the Delete All Child Objects permission on all the group objects of the required OU.
1. Logon to your Domain controller and launch the Active Directory Users and Computers.
2. Locate and right click the domain/OU for which you wish to grant the required permissions
and select Delegate Control. The Delegation of Control wizard will pop-up.
3. Click Next, add the required user account and click Next.
5. Select the Only objects in this folder option and select the Group objects checkbox.
Also select the Delete selected objects in this folder option as depicted in the image below:
6. Click on Next. Under the Show these permissions section, select General and
Creation/Deletion of specific child objects options.
7. Under the permissions section, select the Delete all child objects permission and click on Next.
8. Click Finish.
23
Operation: Restore groups
Permissions needed:
- The users modifying the permissions on the deleted objects container must be a member
of the Domain Admins group.
- The Active Directory Application Mode (ADAM) tool has to be downloaded and installed
separately in domain controllers running Windows Server 2000 and 2003.
Any object deleted from AD is stored in the deleted objects container and can be restored
before the end of its tombstone lifetime period. To restore a deleted AD object,
non-administrators must have sufficient permission to access this container.
To grant the required permissions:
1. Log in to your domain controller and launch the ADAM tools Command Prompt.
Note:
Every domain in a forest will have its own deleted objects container, so it's essential to specify the
domain name of the deleted objects container for which you would like to modify permissions.
3. To grant permission to a security principal to access the deleted objects container, specify a
command in the following format: dsacls "CN=Deleted Objects,DC=admanagerplus,DC=com"
/g ADMANAGERPLUS\LukeJohnson:LCRPWP
24
Note: Replace "LukeJohnson" with the security principal of your choice.
4. Next, connect to the default naming context, right-click on the domain root, and select Properties.
25
b. Create Group objects
Note: Apply the Reanimate tombstones rights to the object being secured and its descendant objects.
7. Click OK.
Note: Only objects deleted after the delegation of the above-mentioned permissions can be restored.
26
GPO Management and Reporting
Operation Permissions needed
Create GPOs - Must be a member of the Group Policy Creator Owners group
Enable/disable GPOs - Must have Edit setting permission selected on the GPOs.
Enable/disable user configuration - Must have Edit setting permission selected on the GPOs.
settings
Note: To learn how to delegate permissions to a group or user
on a GPO, refer to this document.
Enable/disable computer - Must have Edit setting permission selected on the GPOs.
configuration settings
Note: To learn how to delegate permissions to a group or user
on a GPO, refer to this document.
Enable/disable/remove GPO links - Must select Link GPOs in the Permissions drop-down list.
Edit GPO settings - Must have Edit setting permission selected on the GPOs.
Enforce GPO links - Must select Link GPOs in the Permissions drop-down list.
- Must have the Read permission on the GPO objects (on flags,
versionNumber, modifyTimeStamp, createTimeStamp attributes).
27
AD Reporting
Operations Permissions needed
Generate all AD reports - Must have the View permission in the desired OUs/domains.
Generate all NTFS reports - Must have the Read permission on the relevant folders
Note: Besides the permissions listed above, the Replication Directory Changes permission has to be granted for
effective data synchronization between AD and ADManager Plus if the service account does not have domain
administrative privileges.
Modify/Remove NTFS permissions - Must have the Read and Write permissions on the
relevant folders
Modify/Remove Share permissions - The share must be reachable from the machine
where ADManager Plus is installed
Exchange Management
Operations Exchange versions Permissions needed
Creating Exchange mailboxes Exchange 2007 - Must have Exchange Recipient Administrator
while creating a corresponding role and Account Operator role.
user account in AD
Exchange 2010 - Must be a part of the Organization
Management group
Creating Exchange mailboxes Exchange 2007 - Must have the Exchange Recipient
for existing Active Directory Administrator role and Account Operator role.
users
Exchange 2010 - Must be a part of the Organization
Management group.
28
Setting mailbox rights Exchange 2007 - Must have the Exchange view only
administrator role, Administer information
store permission and write permissions on the
mailbox store where the mailbox is located.
29
The roles and permissions (minimum scope) required for an Azure Active Directory application configured in
ADManager Plus are listed below.
To know about the prerequisites for configuring a Microsoft 365 account in ADManager Plus, click here.
30
Google Workspace Management
and Reporting
Operations Permissions needed
To know about the pre-requisites for configuring a G Suite (Google Apps) account in ADManager Plus, click here.
ADManager Plus achieves this by employing a high availability architecture which designates a backup
server to act as a shield to the primary server.
The same database is used for both the servers and at any given time, a single server will cater to user
Whenever the primary server runs encounters unplanned downtime, the standby server becomes
31
Prerequisites:
- Both the primary and the secondary server must be in the same subnet.
- The user account configured in both the services must be a member of the Domain Admins group while
Note:
Later on, you can remove this user account from the Domain Admins group. However, ensure that this
user account has the NTFS and share permissions on both the primary and the secondary servers along
ManageEngine ADManager Plus is a unified management and reporting solution for Active Directory,
Microsoft 365, Exchange, Skype for Business, and Google Workspace. With an intuitive, easy-to-use
interface, ADManager Plus handles a variety of complex tasks and generates an exhaustive list of Active
Directory reports, some of which are essential requirements to satisfy compliance audits. For more
information about ADManager Plus, visit manageengine.com/ad-manager.
32