Active Directory Strategy - maharjan.com.np

Active Directory Mastery: Infrastructure, Branding & GPO Security

AM

Assistant Technical Manager

Infrastructure & Security Specialist

⏱️ 30 MIN READ • PUBLISHED: JAN 27, 2026

In our previous post, we successfully laid the foundation of our infrastructure by installing and configuring the primary Domain Controller for maharjan.com.np.

However, a raw Active Directory environment is like a brand-new office building with no furniture, no signage, and no security badges. As an Assistant Technical Manager, my priority is ensuring that our IT environment is not only functional but also secure and professionally branded.

In this guide, we will move beyond the basic installation to implement enterprise-level best practices. We will explore how to organize your directory using a clean Organizational Unit (OU) structure, automate a consistent corporate identity through Branding GPOs, and harden our workstations against common local network threats.

Building a robust identity perimeter on maharjan.com.np requires a professional Organizational Unit (OU) hierarchy, secure group management, and a verified Group Policy pipeline to enforce both a hardened security posture and a consistent corporate brand.

1. Best Practice OU & Group Structure

A structured Active Directory is easier to manage and secure. We avoid the "default container" trap by creating a dedicated root OU for the organization.

Active Directory OU and Group Best Practice Hierarchy - maharjan.com.np
Recommended OU Hierarchy for Enterprise Management

2. Essential Step: Centralized Branding Share

Before configuring GPOs, your assets must be accessible via a domain-based UNC path. Workstations pull these files using their computer accounts.

Permission TypeGroup / UserAccess Level
Share PermissionsAuthenticated UsersRead
NTFS PermissionsDomain ComputersRead & Execute
NTFS PermissionsDomain AdminsFull Control
Branding Images
Organizational Branding Images
Branding Images Folder Sharing Permission
Organizational Branding Images-Folder Sharing Permission
Branding Images Folder NTFS Permission
Organizational Branding Images-Folder NTFS Permission

3. Organizational Branding GPOs

We automate the user experience to ensure every workstation represents the professional standard of maharjan.com.np.

Corporate Wallpaper

User Configuration > Administrative Templates > Desktop > Desktop > Desktop Wallpaper

Path: \\DC01.maharjan.com.np\Organization-Branding\GPO-Wallpaper.jpg

Wallpaper Style: Center

Corporate Wallpaper Images
Corporate Wallpaper

Managed Screensaver (Timeout & Lock)

User Configuration > Administrative Templates > Control Panel > Personalization

Force Specific Screensaver: \\DC01.maharjan.com.np\Organization-Branding\screensaver-timer.scr

Screensaver Options:

  • Enable Screen Saver: Enable
  • Screen Saver Timeout: 60 Seconds
  • ScreenSaver-Timer
    Corporate ScreenSaver-Timer

    Machine Inactivity Limit (Idle TimeOut)

    Computer Configuration > Policies > Windows Settings > Security Settings >Local Policies > Security Options > Interactive logon: Machine inactivity limit
    Idle TimeOut Image
    Corporate Machine Idle Timeout

    Forced Lock Screen Image

    Computer Configuration > Administrative Templates > Control Panel > Personalization > Force a specific default lock screen...

    Path: \\DC01.maharjan.com.np\Organization-Branding\GPO-LockScreen.jpg

    Note: LockScreen settings only applies to Enterprise, Education, and Server SKUs.

    LockScreen Image
    Corporate LockScreen Image

    4. Security Hardening & Controls

    Branding is nothing without a secure foundation. We deploy these policies to harden the perimeter.

    Interactive Logon: Security Banner

    Computer Configuration > Windows Settings > Security Settings > Local Policies > Security Options
    Legal Banner
    Corporate Legal Security Banner

    Essential Lockdown Policies

    5. Joining the Domain & Verification

    Ensure client DNS points to your DC IP. Join the domain maharjan.com.np and reboot. After login, run the heartbeat check:

    DNS Points to DC IP
    Ensure client DNS points to your DC IP.
    Domain Join
    Join the Domain.

    6. Link the GPO to OU

    Ensure the domain joined computers move to the specific OU from by default Computers container.

    Move Computer to Specific OU
    Move Computer to Specific OU. Link GPO to OU
    Link GPO to Specific OU.
    # Force an immediate policy refresh gpupdate /force # Verify applied GPOs for the computer scope gpresult /r /scope:computer
    Troubleshooting Tip: If the branding folder appears empty, clear your DFS cache using dfsutil /pktflush and verify that Domain Computers have NTFS "Read" rights.

    7. Test the GPO Results

    Ensure Group Policy link and Computers applied in proper OU. As our Policy configuration is for Computers, reboot is required.

    Security Banner
    Security Banner Policy
    Corporate Wallpaper Policy
    Corporate Wallpaper Policy.
    ScreenSaver Policy
    Organization ScreenSaver Policy.
    Lockscreen Policy
    Organization Lockscreen Policy.

    Quick Recap - Videos

    This Active Directory deep-dive covers building a scalable OU structure and a centralized share for branding assets. We walkthrough creating Branding and Security Hardening GPOs, joining a fresh machine to the domain, and linking policies for maximum impact. The post concludes with a live demonstration of the applied policies in action.

    Quick Recap Video

    Conclusion

    "At its core, implementing a standardized GPO framework is more than a technical task—it is about establishing a baseline of trust and professionalism across the entire maharjan.com.np infrastructure. By transitioning from fragmented local configurations to centralized management, we significantly reduce administrative overhead and eliminate the risks associated with configuration drift.

    The equilibrium we’ve established between aesthetic branding and security hardening ensures that users are met with a clear corporate identity, while the underlying systems remain resilient against local network threats like LLMNR poisoning and unauthorized data exfiltration via USB. By combining a clean Organizational Unit (OU) foundation with these hardened security policies, we have built a scalable, enterprise-grade environment. This structured foundation is precisely what we need as we prepare to integrate advanced features like High Availability and Site-to-Site replication. You are now ready to expand your horizon into the next phase of infrastructure resilience."