Managed Service for Microsoft Active Directory (Managed Microsoft AD) 提供由 Google Cloud托管的高可用性、经过安全加固的 Microsoft Active Directory 网域。该服务有助于减少管理 Active Directory 所需的重要但单调的行政任务,同时将您的 Active Directory 业务拓展到云端。
Managed Microsoft AD 允许通过林级信任,从 Google Cloud 连接到您现有的本地 Active Directory 基础架构,从而安全地访问您组织的数据。
托管式 Microsoft AD 的工作原理
托管式 Microsoft AD 在 Windows 虚拟机上运行原版 Microsoft Active Directory 网域控制器,以确保应用兼容性。该服务将为您创建和维护网域控制器,从而减少您需要管理的维护任务。
多区域支持
在与 Google Cloud的全球低延迟虚拟私有云 (VPC) 建立对等互连时,Managed Microsoft AD 支持在多区域部署 Active Directory 林。在 VPC 中,您可以将托管式 Microsoft AD 扩展到多个地区,而无需在地区之间进行 VPC 对等互连或混合连接。这种灵活性意味着您不需要在基础架构所在的地区部署托管式 Microsoft AD,也不必为每个地区单创建独一个网域。您可以将网域扩展到最多四个受支持的区域,以提高对区域中断的容错性,并根据需要在其他区域部署网域控制器,轻松进行横向扩缩。为了保持高可用性并提高容错能力,Managed Microsoft AD 会在每个区域的非重叠 Google Cloud 可用区中部署两个网域控制器。
托管式 Microsoft AD 在许多方面都不同于传统的 Active Directory 部署。
实施 Active Directory 的传统部署时,您必须:
手动设计和部署组织的高可用性 AD 拓扑。
手动运行 AD 诊断以确保网域运行状况良好,包括跟踪 DNS、复制、身份验证、CPU 负载等。
手动创建备份计划并验证组织的灾难恢复响应。
手动为托管 AD 网域的网络定义防火墙规则。
确保在同一网络上运行的其他服务器不会危害您的 AD 网域。
手动修补 AD 网域控制器。
设计和实施安全最佳做法,例如对网域管理员账号的限时访问。
确保只有受信任的用户拥有对运行 AD 域控制器资源的管理员权限。
Managed Microsoft AD 通过自动化本节前面列出的多个任务,帮助减少设置和维护 Active Directory 网域所需的工作量。
开始使用托管式 Microsoft AD
要开始使用 Managed Microsoft AD,请指定 Managed Microsoft AD 网域的名称以及获得授权使用 Managed Microsoft AD 网域的 Google Cloud VPC 网络。您可以通过授权的 Google Cloud VPC 网络中的虚拟机访问 Managed Microsoft AD 网域,或通过 VPN 或 Cloud Interconnect 连接到 Google Cloud的本地基础架构和其他云产品访问该网域。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[],[],null,["# Managed Microsoft AD overview\n\nManaged Service for Microsoft Active Directory (Managed Microsoft AD) offers highly available,\nhardened Microsoft Active Directory domains hosted by Google Cloud.\nThis service helps reduce the important but mundane administrative tasks\nrequired to manage Active Directory, while also extending your Active Directory\nfootprint into the cloud.\n\nManaged Microsoft AD allows connecting to your existing, on-premises\nActive Directory infrastructure from Google Cloud through a forest-level trust,\nfacilitating secure access to your organization's data.\n\nHow Managed Microsoft AD works\n------------------------------\n\nManaged Microsoft AD runs actual Microsoft Active Directory domain controllers\non Windows virtual machines to ensure application\ncompatibility. The service creates and maintains the domain controllers for you,\nreducing the maintenance tasks you need to manage.\n\n### Multi-regional support\n\nManaged Microsoft AD supports multi-regional deployment of Active Directory\nforests when peered with Google Cloud's global low-latency\nVirtual Private Cloud (VPC). Within VPC, you can\nextend Managed Microsoft AD to multiple regions, without requiring VPC peering\nor hybrid connectivity between the regions. This flexibility means that you\nneither need to deploy Managed Microsoft AD in the same region as the\ninfrastructure, nor create a separate domain for each region. You can extend the\ndomain to up to four [supported\nregions](/managed-microsoft-ad/docs/add-remove-regions#regions-list) to be\n[resilient to regional\noutages](/architecture/deployment-archetypes/multiregional)\nand easily horizontally scale, by [deploying domain controllers in additional\nregions](/managed-microsoft-ad/docs/add-remove-regions) as needed. To maintain\nhigh availability and improve [fault\ntolerance](/solutions/deploy-fault-tolerant-active-directory-environment),\nManaged Microsoft AD deploys two domain controllers to each region in\nnon-overlapping Google Cloud zones.\n\n### Forest design models\n\nManaged Microsoft AD supports the following Active Directory forest design\nmodels:\n\n- **Organizational forest**: The same forest contains both user accounts and\n resources, which are managed independently.\n\n- **Resource forest**: A separate forest is used to manage resources.\n\n- **Restricted access forest**: A separate forest contains user\n accounts and data that must be isolated from the rest of the organization.\n\nLearn more about\n[AD forest design models](https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/forest-design-models)\nand\n[how to choose the right one for your organization](/compute/docs/instances/windows/best-practices#architecture).\n\nHow Managed Microsoft AD is different\n-------------------------------------\n\nManaged Microsoft AD differs from a traditional deployment of Active\nDirectory in a number of ways.\n\nWhen implementing a traditional deployment of Active Directory, you must:\n\n- Manually design and deploy your organization's highly-available AD\n topology.\n\n- Run AD diagnostics manually to ensure your domain is healthy, including\n tracking DNS, replication, authentication, CPU load, and more.\n\n- Manually create backup plans and verify your organization's disaster\n recovery response.\n\n- Manually define firewall rules for the network that hosts your AD domain.\n\n- Take special care to ensure other servers running on the same network\n cannot compromise your AD domain.\n\n- Manually patch your AD domain controllers.\n\n- Make effort to design and implement security best practices, such as\n time-bound access to the domain administrator account.\n\n- Ensure only trusted users have administrative access to the resources\n that run your AD domain controllers.\n\nThe Managed Microsoft AD helps mitigate the effort required to set up and maintain\nyour Active Directory domains by automating a number of the tasks listed earlier\nin this section.\n\nGetting started with Managed Microsoft AD\n-----------------------------------------\n\nTo get started with using Managed Microsoft AD, specify the name of the\nManaged Microsoft AD domain and the Google Cloud VPC networks where\nthe Managed Microsoft AD domain is authorized to be available. You can access\nthe Managed Microsoft AD domain using virtual machines in your\nauthorized Google Cloud VPC networks, or via on-premises\ninfrastructure and other cloud products that connect to Google Cloud\nvia VPN or Cloud Interconnect.\n\nManaged Microsoft AD provides the following AD objects:\n\n- A [delegated administrator account](/managed-microsoft-ad/docs/how-to-use-delegated-admin). Use the\n account to manage your Active Directory domain.\n\n- The `Cloud` organizational unit (OU). Use the `Cloud` OU to create your Active\n Directory objects, such as users, service accounts, and groups, as well as\n additional OUs. You can apply Group Policy Objects (GPO) to the OUs you\n create under the `Cloud` OU.\n\nFor more information, see [Default Active Directory objects in Managed Microsoft AD](/managed-microsoft-ad/docs/objects).\n\nLearn more\n----------\n\n- [Create a domain](/managed-microsoft-ad/docs/quickstart-create-domain)\n\n- [Deploy an Active Directory resource forest](/managed-microsoft-ad/docs/part-1-deploy-active-directory)"]]