đź§± Active Directory Lab

This log documents my setup and experimentation with Active Directory in my virtual home lab. I created a Windows Server 2022 Domain Controller (DC), configured users and organizational units (OUs), and connected the Windows 10 client to the domain for testing authentication, GPOs, and red team techniques.

Domain Controller Installation/Setup

I began by downloading a Windows Server 2022 ISO file from the Microsoft website and setting up the VM for it in Virtual Box. I then promoted the fresh Windows Server 2022 instance to a Domain Controller using the Server Manager. The domain was named mydomain.com. I configured DNS alongside AD DS and ensured the server had a static IP address on the internal network.

Domain Controller Setup Screenshot

Organizational Units & User Creation using Powershell Scripting

Using the Active Directory Users and Computers (ADUC) console, I created multiple OUs to simulate departments like HR, IT, Finance and added test users and groups within them. To populate the environment, I automated user creation using a PowerShell script that imported 1,000 randomly generated user accounts from a text file. This streamlined approach allowed me to efficiently build a diverse user base for testing policies and enumeration tools.

ADUC Structure ScreenshotADUC Structure Screenshot

Group Policy Object and Secuirty Policy Creation/Testing

Utilizing the Group Policy Management Console (GPMC), I created and applied several Group Policy Objects (GPOs) and local security policies. These included policies such as mandatory desktop wallpapers, enforced password complexity and expiration, and restricted user rights. These configurations helped establish control boundaries and simulate the security posture of a corporate domain.

BloodHound Graph Screenshot

To validate the effectiveness of these policies, I conducted testing on a domain-joined Windows 10 client. Specifically, I confirmed that the Account Lockout Policy was functioning as intended—locking users out for 30 minutes after three failed login attempts.

BloodHound Graph Screenshot

Conclusion

This Active Directory lab setup provided a solid foundation for exploring enterprise-grade identity and access management. By implementing users, OUs, GPOs, and security policies, I created an operational domain environment ready for blue and red team testing. This environment will continue to evolve as I simulate more advanced attacks, monitor defensive telemetry, and test endpoint hardening techniques.

Lessons Learned

Challenges Encountered

⬅ Back to Projects