active directory ds

Installing Active Directory Snap-in on Windows 10

One of the main Active Directory domain management tools is the MMC snap-in Active Directory Users and Computers (ADUC). To work with ADUC snap-in in Windows 10, you need first to install the Microsoft Remote Server Administration Tools (RSAT). The RSAT includes various utility and snap-ins to manage Windows Servers, Active Directory and other Windows roles and features.

How to install Active Directory Users and Computers in Windows 10?

By default RSAT is not installed in Windows 10. You can download the latest version of Remote Server Administration Tools for Windows 10 (Version: 1.2, Date Published: 6/27/2016) using following link:

Active Directory Users and Computers

Select Language of your Windows 10 version and click on Download button. Depending on the bitness of your OS, select desired *.msu file:

  • For Windows 10 x86 – download WindowsTH-RSAT_TP5_Update-x86.msu (68.5 MB)
  • For Windows 10 x64 – download WindowsTH-RSAT_TP5_Update-x64.msu  (91.0 MB)

install windows 10 active directory

Install the downloaded file (Update for Windows KB2693643) by double-click on it.

active directory tools windows 10

Or you can install RSAT from Command prompt in silent mode:

wusa.exe c:\Install\WindowsTH-RSAT_TP5_Update-x64.msu  /quiet /norestart

After RSAT installation is completed, you need to restart your computer.

It remains to activate the necessary RSAT function. To do this:

  1. Right click on Start button and select Control Panel
  2. Select Programs and Features
  3. In the left pane press on Turn Windows features on or off
  4. Expand node Remote Server Administration Tools-> Role Administration Tools -> AD DS and AD LDS Tools
  5. Check item AD DS Tools and press OK.
    active directory users and computers

However, you can install AD feature from the Command prompt just with this three commands:

dism /online /enable-feature /featurename:RSATClient-Roles-AD
dism /online /enable-feature /featurename:RSATClient-Roles-AD-DS
dism /online /enable-feature /featurename:RSATClient-Roles-AD-DS-SnapIns

active directory snap in windows 10

After AD Management snap-ins installed, go to the Control Panel and select section Administrative Tools. As you can see, Active Directory Users and Computers link is appeared.

Windows 10 active directory users computers

Now you can run the ADUC snap-in and connect to any domain controller. If your computer is in an Active Directory domain, then the domain controller will be selected automatically, based on your Logon server.

If you want connect to AD from non-domain computer, you must:

  1. Open Command prompt and run command:
    runas /netonly /user:Domain_Name\Domain_USER mmc
  2. In the empty MMC Console select File->Add/Remove Snap-In.
  3. Add Active Directory Users and Computers Snap-In to the right pane and press OK.
    how to install active directory on Windows 10
  4. Connect to domain by right click on ADUC -> Connect to domain and enter domain name.
    aduc windows 10

 As a result, in the ADUC snap-in appears the structure of your OU Active Directory domain.

ADDS active directory snap in

You may also like:

Configuring GPO Proxy Settings for Internet Explor... The article shows how to configure GPO proxy settings for Internet Explorer 11 browser using Active Directory Group Policies. In earlier versions of I...
FSMO Role: Infrastructure Master We continue the series of articles about FSMO roles in the Active Directory domain. This time, we will take a closer look at the FSMO role — Infrastru...
How to hide specific OU in Active Directory The first thing you see while opening Active Directory Users and Computers (ADUC) snap-in is AD containers (Organization Unit, OU), in which user acco...
Change Default OU permissions in Active Directory By default, each newly created organizational unit (OU) in the access list includes read permission for the group Authenticated Users (built-in group)...
Join Domain and Login over a VPN Connection This is a short tutorial on how to join a computer to a domain over a VPN connection. This was very useful for us this weekend. We had to reformat a c...
  1. Posted by Marco Antonio Barato
  2. Posted by 777-200ER

Add Your Comment