Project Write-Up
Active Directory Project
This project demonstrates the deployment of a fully managed Active Directory domain in a simulated enterprise environment using Windows Server 2022 and Windows 11 Pro. The domain architecture supports centralized policy enforcement, secure authentication, network resource access, and department-based segmentation using industry best practices such as the AGDLP access control model.
dc01
)10.10.10.10
/ Gateway: 10.10.10.1
test.local
dcdiag
and DNS resolution testsoobe\bypassnro
10.10.10.10
and joined the domain test.local
The domain is structured to reflect a mid-sized business layout with OUs for each department, user roles defined via Global Groups, and access scoped by Domain Local Groups following the AGDLP model.
corp.local │ ├── OU: HR │ ├── Users: HR_Users, HR_Managers │ ├── Global Groups: │ │ ├─ HR_Users │ │ ├─ HR_Managers │ │ └─ HR_GPO_Policy │ ├── Domain Local Groups: │ │ ├─ HR_Share_Read │ │ └─ HR_Share_Modify │ └── Resources: │ └─ \\DC01\HR_Share (Read/Modify) │ ├── OU: IT │ ├── Users: IT_Admins, IT_Helpdesk │ ├── Global Groups: │ │ ├─ IT_Admins │ │ ├─ IT_Helpdesk │ │ └─ IT_GPO_Editors │ ├── Domain Local: │ │ └─ IT_Servers_Access │ └── Resources: │ └─ \\DC01\IT_Servers (Full/Admin) │ ├── OU: Sales │ ├── Users: Sales_Users, Sales_Managers │ ├── Global Groups: │ │ ├─ Sales_Users │ │ ├─ Sales_Managers │ │ └─ Sales_RemoteAccess │ ├── Domain Local: │ │ ├─ Sales_Share_Read │ │ └─ Sales_Share_Modify │ └── Resources: │ └─ \\DC01\Sales_Share (Read/Modify) │ ├── OU: Accounting │ ├── Users: Accounting_Users, Accounting_Managers │ ├── Global Groups: │ │ ├─ Accounting_Users │ │ ├─ Accounting_Managers │ │ └─ Accounting_Software_Users │ ├── Domain Local: │ │ ├─ Accounting_Share_Read │ │ └─ Accounting_Share_Modify │ └── Resources: │ └─ \\DC01\Accounting_Share (Read/Modify) │ └── OU: Workstations ├── Global Groups: │ ├─ Workstations_All │ ├─ Workstations_IT │ └─ Workstations_HR └── GPOs: ├─ Security Filtering by group └─ Wallpaper and software restrictions
Test users were created for each department and assigned to appropriate Global Groups:
Global Groups were nested into Domain Local Groups to grant access to resources and apply GPOs using standard AGDLP hierarchy. GPO filtering was also used for workstation-based policies based on group membership.
The domain includes Organizational Units (OUs) for HR, IT, Sales, Accounting, and Workstations. Global groups were used to define user roles and departmental membership, while Domain Local groups managed file shares and GPO targeting.
Example:
Folder shares such as \\DC01\HR_Share
were created with NTFS permissions bound
strictly to Domain Local groups.
Test users were created to simulate real-world use cases. For example:
HR_Share
Sales_Share
IT_Servers
and delegated GPO rightsA series of GPOs were created to enforce account security, drive mapping, wallpapers, and application controls:
\\DC01\Wallpaper\
shareSoftware Restriction Policies (SRP) were implemented using the "Run only specified Windows applications" policy. Each department received a tailored whitelist; a baseline GPO allowed common system apps (e.g., Edge, File Explorer, Task Manager).
Installation files for approved software were hosted on a secured internal share and distributed via GPO or manual execution by authorized users.
Certificate Services were deployed to issue and manage digital certificates for both users and computers. Auto-enrollment was configured via GPO to streamline certificate distribution and renewal:
dc01
with user and machine certificate templatesA VPN solution was implemented to simulate secure remote access to the domain environment:
dc01
to support L2TP/IPsec VPN connectionsA lightweight asset inventory system was developed to simulate enterprise-grade auditing and reporting:
Get-Content -Path "AssetInventory\ComputerName"
to display raw XML reportsExplore the layout and hierarchy of the mock Active Directory domain, test.local, through this interactive PowerShell-style environment. Use the cmdlets listed below to query users, computers, and navigate OUs.
Future phases will include application deployment automation (MSI or script-based), secure RDP access, centralized event log forwarding, and PowerShell scripting for dynamic user provisioning and workstation enrollment. Additional layers such as WSUS, file auditing, and system monitoring are also planned.