A comprehensive hands-on lab environment demonstrating Active Directory setup, configuration, and management in a Windows Server environment. This project showcases enterprise-level directory services implementation and security best practices.
This Active Directory lab project demonstrates the setup and configuration of a complete Windows Server environment with Active Directory Domain Services. The lab environment simulates a real-world enterprise network infrastructure, providing hands-on experience with domain controllers, user management, group policies, and network security.
The project encompasses the full lifecycle of Active Directory implementation, from initial server setup through advanced configuration and security hardening. This comprehensive approach provides practical experience with enterprise directory services that are fundamental to modern IT infrastructure.
Process: Deployed a Windows Server 2022 VM using UTM on a MacBook Pro. Installed the OS and completed the basic configuration. Performed initial server updates and renamed the machine to DC1 to act as the primary domain controller.
Purpose: Renaming the server gives us a clear hostname that reflects its role in the network. Leaving the server with a default name can make network management and troubleshooting a hassle.
Process: Configured a static IP and DNS address via the server's network adapter settings to ensure consistent domain resolution. Set the DNS to point to the server's own IP for internal name resolution.
Purpose: A Domain controller must have a fixed IP address to reliably provide services like DNS and Active Directory. Here, I manually set a static IP based on my current network range. A ping test was used to confirm the IP and gateway worked correctly.
Process: Installed the Active Directory Domain Services role on the server in preparation for domain controller promotion.
Purpose: AD DS is required for creating and managing domains, users, security groups, and other policies. This prepares DC1 to be the first domain controller in my lab network.
Process: Promoted the server to a domain controller for the newly created forest plaines.local. Set a Directory Services Restore Mode (DSRM) password and rebooted to complete configuration.
Purpose: This step promoted DC1 to an actual domain controller and created the plaines.local AD forest. It also installed and configured the DNS, Global Catalog, and directory partitions.
Process: Created an Organizational Unit (OU) named LabUsers to logically separate users and devices. Moved the Lab User machine into the appropriate OU.
Purpose: OUs provide structure in Active Directory. They allow for more granular management of users, computers, and policies. This OU was created to isolate all lab client machines for testing.
Process: Created a standard domain user (Lab User) in Active Directory Users and Computers (ADUC) to simulate a non-privileged user. This account was used for later policy enforcement testing.
Purpose: Creating a test domain user allows us to validate domain join and user-level permissions from a Windows 11 client system.
Process: On a Windows 11 VM running in Parallels (Mac Mini), configured a static IP and DNS, renamed the computer, and joined it to the plaines.local domain. Restarted and verified domain connectivity.
Purpose: The goal was to enable the client to communicate with the DC and become a domain-joined device, allowing centralized management through Active Directory.
Process: Moved the Windows 11 client into the LabUsers OU in preparation for Group Policy application.
Purpose: Organizing client machines under the appropriate OU allows for scoped GPO application targeting specific sets of machines.
Process: Used Group Policy Management Console (GPMC) to create a GPO titled "LabUsers - Basic Restrictions" and linked it to the LabUsers OU to begin applying user-based policies.
Purpose: Linking the GPO allows custom restrictions to apply to standard domain users. This step enforces basic security policies such as disabling access to the Control Panel, Command Prompt, and registry tools.
Process: Edited the GPO to disable access to the Control Panel, Registry Editor, and Command Prompt under User Configuration > Administrative Templates. Verified GPO application by logging in as Lab User.
Purpose: These restrictions enforce a locked-down environment for standard users. Policies such as disabling regedit, CMD, and Control Panel reflect real-world enterprise policy enforcement.
Process: Logged into the domain-joined client as Lab User and tested the GPO configuration. Verified that access to the Control Panel, Registry Editor, and Command Prompt was restricted as intended.
Purpose: Validates that the "LabUsers - Basic Restrictions" GPO is successfully applied to standard domain users and enforces intended security policies.
This Active Directory lab project provided comprehensive hands-on experience with enterprise directory services implementation. The project demonstrated the complexity and importance of proper planning in Active Directory deployments, from initial design through ongoing management.
The experience highlighted the interconnected nature of various Windows Server services and the critical role that Active Directory plays in modern IT infrastructure. Understanding these concepts is essential for any IT professional working in Windows-based enterprise environments.
Note: All IP addresses shown in this lab are from a private testing environment and are not publicly accessible.
📄 Download Full Project Documentation (PDF) ← Back to Projects