Support
 
Phone Live Chat
 
Support
 
US: +1 888 720 9500
US: +1 800 443 6694
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9393

 
 
 
 
 
Features

What is the Active Directory Administrative Center?

The Active Directory Administrative Center (ADAC) is Microsoft's modern graphical console for Active Directory (AD) administration. It was introduced to simplify common AD management tasks using a PowerShell-backed interface. Unlike traditional AD admin tools, ADAC provides a task-oriented experience that allows administrators to manage users, groups, computers, domains, and password policies more efficiently.

Every action performed in ADAC is executed through Windows PowerShell in the background, which offers transparency and consistency for AD administration.

The Active Directory Administrative Center

ADAC vs ADUC

While ADUC (Active Directory Users and Computers) remains widely used, ADAC introduces several enhancements that improve day-to-day AD administration:

  • Built-in Windows PowerShell History Viewer
  • Graphical access to the AD Recycle Bin
  • Simplified configuration of fine-grained password policies
  • Improved object navigation and global search
  • Faster execution of common AD administration tasks

This makes ADAC a preferred AD admin console for modern Windows environments.

Features introduced by ADAC

AD Recycle Bin

The AD Recycle Bin enables administrators to restore deleted AD objects. Although this feature was introduced in Windows Server 2008 R2, it was initially only accessible through the command line using PowerShell. With Windows Server 2012, ADAC provides a graphical interface to enable and manage the recycle bin, making object recovery significantly easier.

The Active Directory Recycle Bin in Active Directory Administrative Center

Note: The forest must be running at the Windows Server 2008 R2 functional level or higher. At least one domain controller should be running Windows Server 2012, and all other DCs must run Windows Server 2008 R2 or later.

Fine-grained password policy

Earlier versions of AD required administrators to configure fine-grained password policies exclusively through PowerShell. The Windows Server 2012 ADAC simplifies this by allowing administrators to set password policies directly from the ADAC interface.

Note: The domain functional level must be Windows Server 2008 or higher.

Fine-grained password policy in Active Directory Administrative Center

Windows PowerShell History Viewer

The Windows PowerShell History Viewer in ADAC displays all administrative actions performed through ADAC as PowerShell commands. This built-in audit trail improves transparency and is especially useful for troubleshooting and validating AD administration tasks.

The Windows PowerShell History Viewer in Active Directory Administrative Center

Dynamic Access Control

Dynamic Access Control (DAC) enables granular access control by evaluating user claims, device claims, and resource properties at the time of access for NTFS file shares. ADAC provides a centralized interface to create, view, and manage DAC components without relying entirely on PowerShell.

For example, administrators can define permissions based on the department attribute, for which the access is automatically updated when the user account changes departments. This helps organizations enforce fine-grained authorization policies and maintain consistent access control across file servers in the AD environment.

Note: DAC requires Windows Server 2012 or later, and file servers must support DAC for policies to be enforced.

Global Search

Global Search allows administrators to quickly locate AD objects across multiple domains in a forest from a single interface. ADAC's search capabilities are more robust than ADUC, offering enhanced filtering options that enables the narrowing of results based on attributes such as account status, OU, or other object-specific criteria. This makes it significantly easier to manage large or complex AD environments.

Search results are displayed in a unified view, enabling administrators to view object properties immediately and perform administrative actions like resetting passwords, modifying attributes, or deleting objects.

Recent changes to ADAC

ADAC remains stable and unchanged in core functionality from Windows Server 2022, continuing its role as a PowerShell-driven console for task-oriented AD management. Recent changes to ADAC primarily include:

  • Improved reliability and performance when managing large AD environments.
  • Better compatibility with newer Windows Server and Windows client releases.
  • Ongoing PowerShell module updates, ensuring ADAC actions continue to align with supported AD cmdlets.
  • Security and hardening updates inherited from the Windows Server operating system.

While ADAC's core capabilities like Global Search and fine-grained password policy management remain unchanged, these updates ensure that ADAC continues to function reliably in modern, security-focused AD deployments.

How to install ADAC

ADAC is installed by default on most supported Windows Server editions. On Windows 10 and Windows 11, ADAC is available through Remote Server Administration Tools (RSAT). Older versions of Windows 10 (prior to 1809) require downloading RSAT from Microsoft's website.

Steps to install ADAC in Windows 10 version 1809 and later

  1. Open Settings.
  2. Navigate to Apps > Optional features and click Add a feature.
  3. Locate and install RSAT: AD DS and LDS Tools.
  4. Restart the system if prompted.

How to open ADAC

Once installed, you can access ADAC from the Start menu or by running dsac.exe.

Opening Active Directory Administrative Center by running dsac.exe

Steps to install Windows Server 2012 and later

Steps to install ADAC using PowerShell

How to manage Active Directory using ADAC

Using ADAC, administrators can perform a wide range of AD administration tasks, including the following:

Create and manage users and groups

To create a new user:

  1. Select the required domain or OU.
  2. Click New > User from the Tasks pane at the right.
  3. Enter user details and configure required attributes.
  4. Click OK to create the user.

Creating a new user in Active Directory Administrative Center

To create a group and manage group membership:

  1. Navigate to the target OU.
  2. Click New > Group from the Tasks pane at the right.
  3. Specify the group name, scope, and type.
  4. Add members during creation or modify membership later from the group's Members tab.
  5. Click OK to save.

Creating a new group in Active Directory Administrative Center

To manage users or groups:

Select the object and use the Tasks pane to edit properties, add members, or delete objects.

Managing users and groups in Active Directory Administrative Center

Reset passwords and unlock user accounts

Modify commonly used user attributes

Configure fine-grained password policies

Restore deleted objects from Recycle Bin

Use Global Search

Switch between domains in a forest

View PowerShell commands executed for each task

Limitations of ADAC

While ADAC offers a more capable and modern experience than ADUC, it still has limitations when managing complex or large-scale environments, such as:

  • No bulk management or automation at scale
  • Limited reporting and auditing
  • No built-in approval workflows
  • Minimal delegation and role-based access control
  • Relies heavily on manual operations

Why choose ADManager Plus for AD administration

While ADAC improves native AD administration, organizations often need more control, visibility, and scalability. ManageEngine ADManager Plus extends AD administration by offering:

Troubleshooting common ADAC issues

1. ADAC cannot connect to any domain

If ADAC cannot connect to any domain, verify the following:

  • The machine has network connectivity to a doma in controller
  • D NS is correctly configured and resolving the domain
  • You are signed in with an account that has AD admin privileges
  • The system time is synchronized with the domain
  • Required ports for AD communication are open

This issue is common when using the ADAC from Windows 10 or Windows 11 systems that are not properly domain-connected.

2. Active Directory Administrative Center not opening

If the ADAC is not opening, check that:

  • RSAT: AD DS and LDS Tools are installed (Windows 10/Windows 11)
  • The correct Windows edition is used (Pro, Enterprise, or Education)
  • You are launching ADAC using dsac.exe
  • Windows updates are fully applied

Reinstalling RSAT often resolves issues with ADAC Windows installations.

3. ADAC cannot find objects

If ADAC opens but fails to display users, groups, or OUs:

  • Ensure the correct domain is selected in the left navigation pane
  • Use Global Search to confirm objects exist in the domain
  • Verify permissions to read objects in the selected OU
  • Refresh the console or reconnect to the domain

This behavior is more noticeable in multi-domain forests if the wrong domain context is selected.

4. AD Recycle Bin option is missing in ADAC

If the AD Recycle Bin is not visible or cannot be enabled:

  • Confirm the forest functional level is Windows Server 2008 R2 or higher
  • Verify at least one domain controller is running Windows Server 2012 or later
  • Ensure the Recycle Bin has not already been enabled (it is a one-time operation)

Once enabled, the Recycle Bin cannot be disabled.

5. Fine-grained password policy options are unavailable

If you cannot configure fine-grained password policies in ADAC:

  • Confirm the domain functional level is Windows Server 2008 or higher
  • Verify you have sufficient permissions to create password settings objects
  • Check that you are navigating to the Password Settings Container

These policies only apply to users or groups, not to OUs.

6. PowerShell History pane is not visible

If the Windows PowerShell History Viewer is not displayed:

  • Expand the lower pane of the ADAC window manually
  • Perform an action (such as resetting a password) to populate the history
  • Restart ADAC if the pane fails to load

The history viewer only displays actions performed during the current session.

7. ADAC is slow or unresponsive

Performance issues in ADAC may occur due to:

  • Large domains with a high number of objects
  • Network latency between the console and domain controllers
  • Insufficient system resources on the client machine

Using Global Search, limiting OU scope, or running ADAC closer to the domain controller can improve responsiveness.

FAQs

1. What is the difference between ADUC and ADAC?

ADUC is the traditional MMC-based tool used for routine AD administration, such as managing users, groups, and OUs. It is familiar and reliable but offers limited access to advanced features.

ADAC is Microsoft's modern AD admin center, built on Windows PowerShell. It provides a more intuitive interface, graphical access to features like the Recycle Bin and fine-grained password policies, and visibility into the PowerShell commands executed for each task. This makes ADAC better suited for modern and multi-domain AD administration environments.

2. Does ADAC support bulk user management?

No, ADAC does not support bulk operations or automation at scale. For bulk provisioning, reporting, and workflow-based management, third-party tools like ADManager Plus work best.

3. Can I manage multiple domains simultaneously in ADAC?

Yes. Unlike the older ADUC, which requires you to manually change the domain focus, ADAC allows you to add multiple domains from the same or different forests to the navigation pane. This provides a centralized view, and the Global Search feature can query across all connected domains at once.

4. Can I use ADAC to manage Group Policy Objects (GPOs)?

No, ADAC is designed for managing objects (users, groups, computers) and specific AD features (Recycle Bin, Password Policies). To manage Group Policy, you must still use the Group Policy Management Console (GPMC) or third party tools like ADManager Plus, which provide comprehensive Group Policy management and reporting capabilities.

5. What is the Precedence value in Fine-Grained Password Policies?

A user can be a member of multiple security groups, therefore, they might technically fall under multiple password policies. The Precedence value (an integer) acts as a tie-breaker. The policy with the lowest number (e.g., 1) takes priority over higher numbers (e.g., 10).

6. Is the AD Recycle Bin enabled by default?

No, while ADAC provides the interface to manage it, the Active Directory Recycle Bin must be manually enabled first. Once enabled, it cannot be disabled. To enable it, right-click your domain in ADAC and select Enable Recycle Bin.

7. Does ADAC replace the Attribute Editor tab from ADUC?

Yes, and it improves it. In ADAC, when you open a user's Properties, the Extensions section contains many of the raw attributes. However, the main ADAC interface also reveals many attributes that were previously hidden in ADUC unless Advanced Features was toggled on.

Streamline AD management with ADManager Plus

ADManager Plus Trusted By

The one-stop solution to Active Directory Management and Reporting