Introduction

The Active Directory Tiered Administration Model on Windows Server 2016 divides admin privileges into Tier 0 (AD/DC infrastructure), Tier 1 (member servers), and Tier 2 (workstations). Keeping admin credentials separate at each tier prevents a compromised helpdesk account from pivoting to domain admin, drastically reducing breach impact.

Creating the Tier OU Structure

Build an OU hierarchy to house each tier’s admin accounts and groups:

foreach ($t in @('Tier0','Tier1','Tier2')) {
    New-ADOrganizationalUnit -Name $t -Path 'OU=Admin,DC=contoso,DC=com'
    foreach ($s in @('Accounts','Groups','ServiceAccounts')) {
        New-ADOrganizationalUnit -Name $s -Path "OU=$t,OU=Admin,DC=contoso,DC=com"
    }
}

Creating Tier Admin Accounts

Each administrator gets a separate account for each tier they manage:

New-ADUser -Name 'T0-JSmith' -SamAccountName 't0-jsmith' `
    -Path 'OU=Accounts,OU=Tier0,OU=Admin,DC=contoso,DC=com' `
    -AccountPassword (ConvertTo-SecureString 'Pa$$T0x!' -AsPlainText -Force) -Enabled $true

New-ADUser -Name 'T1-JSmith' -SamAccountName 't1-jsmith' `
    -Path 'OU=Accounts,OU=Tier1,OU=Admin,DC=contoso,DC=com' `
    -AccountPassword (ConvertTo-SecureString 'Pa$$T1x!' -AsPlainText -Force) -Enabled $true

Logon Restrictions via Group Policy

Configure GPO to deny Tier 0 accounts from logging on to Tier 1/2 systems. In Group Policy Management Console, edit the Tier 1 servers GPO: Computer Configuration > Security Settings > Local Policies > User Rights Assignment. Add Tier0-Admins to “Deny log on locally” and “Deny log on through Remote Desktop Services”.

Privileged Access Workstations

Create dedicated PAWs for Tier 0 administration to prevent credential exposure:

New-ADComputer -Name 'PAW-T0-01' -Path 'OU=PAW,OU=Tier0,OU=Admin,DC=contoso,DC=com'
$gpo = New-GPO -Name 'Tier0-PAW-Hardening'
New-GPLink -Name 'Tier0-PAW-Hardening' -Target 'OU=PAW,OU=Tier0,OU=Admin,DC=contoso,DC=com'
# GPO should block internet, enforce Credential Guard, disable USB storage

Auditing Admin Account Usage

Monitor for misuse of tier accounts across systems:

Get-WinEvent -FilterHashtable @{LogName='Security'; Id=4624} -MaxEvents 100 |
    Where-Object { $_.Message -like '*t0-*' -or $_.Message -like '*t1-*' } |
    Select-Object TimeCreated,@{N='Account';E={$_.Properties[5].Value}},
                  @{N='LogonType';E={$_.Properties[8].Value}},
                  @{N='WorkstationName';E={$_.Properties[11].Value}}

Summary

The AD Tiered Administration Model is the most effective architectural control for protecting Active Directory on Windows Server 2016. Separating admin accounts, enforcing logon restrictions, and requiring PAWs for Tier 0 work creates layered barriers that prevent credential theft from cascading into a complete domain compromise.