Skip to content

KoriAC/configure-ad

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 

Repository files navigation

Microsoft Active Directory Logo

On-premises Active Directory Deployed in the Cloud (Azure)

This tutorial outlines the implementation of on-premises Active Directory within Azure Virtual Machines.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Active Directory Domain Services
  • PowerShell

Operating Systems Used

  • Windows Server 2022
  • Windows 10 (21H2)

High-Level Deployment and Configuration Steps

  • Setup resources in Azure
  • Ensure connectivity between the client and domain controller
  • Install Active Directory
  • Create an administrator and normal user account in active directory
  • Join client to domain
  • Setup remote desktop for non-administrative users on client computer
  • Create additional users and attemot to login into client computer with one of the users

Deployment and Configuration Steps

Disk Sanitization Steps

This is the Microsoft Azure portal homepage and where the resources will be create to implement an active directory.


Disk Sanitization Steps

Here a resource group is being created. A resource group can be thought of as a folder.


Disk Sanitization Steps

Here is where the resource group is going to be named.


Disk Sanitization Steps

The image above shows that the resource group has been successfully created.


Disk Sanitization Steps

Here is where the virtual machines will be created. The "Azure virtual machine" option will be selected.


Disk Sanitization Steps

The virtual machine here is named "DC-1" which will act as the domain controller.


Disk Sanitization Steps

The creation of DC-1 username and password. For the "Image", we are choosing "Windows Server 2022".


Disk Sanitization Steps

The virtual machine here is named "Client-1" which will act as the client.


Disk Sanitization Steps

Similar to DC-1, we are creating a username and password. Additionally, the operating system for Client-1 will be Windows 10.


Disk Sanitization Steps

Here in the image above, both virtual machines have been successfully created.

Disk Sanitization Steps

Here we can see that the IP address of DC-1 is dynamic. Therefore, it's important to switch the IP address from dynamic to static. If the server was assigned a dynamic IP address, it would change occasionally, preventing your router from knowing which computer on the network is the server.


Disk Sanitization Steps

Here the IP address has been switched from dynamic to static.


Disk Sanitization Steps

The IP address of DC-1 is being copied so a remote desktop connection can be made.


Disk Sanitization Steps

The credentials that were made earlier are now being used to access the DC-1 virtual machine.


Disk Sanitization Steps

Similar to DC-1, the same process will be done for Client-1.


Disk Sanitization Steps

Here we are logged into Client-1. To start the process of ensuring connectivity, we are going to continuously ping DC-1's private IP address. To do this, we are going open command prompt and type "ping-t". The "Request Timed Out" means that the pinging is being blocked and that we need to access the firewall to change this.


Disk Sanitization Steps

Here we have opened windows defender firewall with advanced security and will attempt to enable some inbound rules. You'll notice the acronym ICMP which is the Internet Control Messaging Protocol is a network layer protocol. It's mainly used to determine whether or not data is reaching it's intended destination.


Disk Sanitization Steps

Here we can see that the chosen inbound rules have been enabled.


Disk Sanitization Steps

As you can see, when we switch to CLient-1 and observe the command prompt, we are getting a response from DC-1. We can tell by the private IP address.


Disk Sanitization Steps

Here "CTRL + C" was used to stop the continuous pinging.


Disk Sanitization Steps

Here we are switching back to DC-1 so we can start the installation process for Active Directory Domain Services.


Disk Sanitization Steps

This is what we'll see when we begin the installation process. We can simply click next.


Disk Sanitization Steps

Here we are going to choose the installation type. The top option will be used.


Disk Sanitization Steps

The server that will be selected will be the virtual machine that we created earlier.


Disk Sanitization Steps

The server role that will be chosen is the Active Directory Domain Services (AD DS) becasue this role in particualr uses domain controllers to give network users access to permitted resources through a simple logon process.


Disk Sanitization Steps

Here we are simply going to click next.


Disk Sanitization Steps

Just like the previous step, we will simply click next


Disk Sanitization Steps

Here we are going to install all of the roles and features for our server.


Disk Sanitization Steps

As we can see the installation process was a success.


Disk Sanitization Steps

After the installation of the roles and features for the server, the next step is start the configuration. We'll start this by clicking on the flag with the exclamation mark encases in a triangle.


Disk Sanitization Steps

We are going to click "Promote this server to a domain controller. A domain controller is a server that manages network and identity security. This is important for user authentication and authorization into IT resources within the domain.


Disk Sanitization Steps

For the deployment configuration tab, we are going to click "Add new forest" and type in a name. An Active Directory forest is the highest level of organization within Active Directory. Each forest shares a single database.


Disk Sanitization Steps

In this image, an DSRM (Directory Services Restore Mode) password will be created.


Disk Sanitization Steps

Here we are simply going to click next.


Disk Sanitization Steps

The image above shows the NETBIOS domain name. The NETBIOS domain name is a unique identifier for a network that allows computers to communicate with each other.


Disk Sanitization Steps

Here we will simply click next.


Disk Sanitization Steps

After reviewing the options, we will click next.


Disk Sanitization Steps

All prerequisite checks passed successfully and now the installation can begin.


Disk Sanitization Steps

After the virtual machines restarts, we will login with domain name and original credentials


Disk Sanitization Steps

In this image above, we will click on "Tools", scroll down and select "Active Directory Users and Computers".


Disk Sanitization Steps

We will right click on the domain name, scroll down to "New" and select "Organizational Unit". An organizational unit is like a folder.


Disk Sanitization Steps

The name of this organizational unit will be "_EMPLOYEES", since this is where we are going to generate random users in this organizational unit. An additional organizational unit will be create and will be named "_ADMINS".


Disk Sanitization Steps

As you can see here, we are creating an administrator in the "_ADMINS" organizational unit.


Disk Sanitization Steps

The image above demonstrates the administrators information being created.


Disk Sanitization Steps

Enter the password for the new administrator.


Disk Sanitization Steps

After entering the information, click "Finish".


Disk Sanitization Steps

In the image above, we are adding Jane Doe to the "Domain Admins" security group.


Disk Sanitization Steps

Once we click "OK", we will logout of DC-1 and log back in using Jane Doe's account.


Disk Sanitization Steps

This is the image of Jane Doe's credentials being used.


Disk Sanitization Steps

Open command prompt and type in "hostname" to verify that Jane Doe is the user.


Disk Sanitization Steps

In the following steps, we are going to join Client-1 to DC-1. In order to do this, we will go back to the Azure portal and change Client-1's DNS settings to DC-1's private IP address. We will start the process by clicking "Network Interface".


Disk Sanitization Steps

After clikcing "Network Interface", we will select "DNS Servers" then pick "Custom".


Disk Sanitization Steps

Now we are entering the private IP address of DC-1.


Disk Sanitization Steps

Client-1 will now be restarted.


Disk Sanitization Steps

Login into Client-1 with Jane Doe's credentials after the virtual machine restarts. From here, we're going to click on "System".


Disk Sanitization Steps

Click on "Rename this PC"


Disk Sanitization Steps

Click on "Change" to start the process to renmae the PC. Once this is done, we're going to add Client-1 to the domain then click "OK".


Disk Sanitization Steps

The comptuer will restart after we join Client-1 to DC-1. Use Jane Doe's credentials to login.


Disk Sanitization Steps

Go back to DC-1 to verify that Client-1 has joined DC-1. We can see in the image above that Client-1 is in the "Computers" organizational unit.


Disk Sanitization Steps

Now we're going to go back to CLient-1 to allow “domain users” access to remote desktop. First go to "System" and click "Remote Desktop".


Disk Sanitization Steps

Click "Select users that can remotely access this PC".


Disk Sanitization Steps

A "Select Users of Groups" window will open. From here, type "domain users" and select "Check Names". Lastly click "OK".


Disk Sanitization Steps

Switch back to DC-1 and run Windows PowerShell ISE as an administrator. This is where random users will ge generated by using a script. The script will additionally generate the same password for each unique user and will upload the user accountts into the "_EMPLOYEES" organizational unit.


Disk Sanitization Steps

After the script is copied into Windows Powershell, click the green play button which will run the code.


Disk Sanitization Steps

As you can see, the script has generated random users into the "_EMPLOYEES" organizational unit.


Disk Sanitization Steps

A random user will be selected to verify that we can access Client-1 using their credentials. We will go on properties to copy the user's login credentials.


Disk Sanitization Steps

Copy the username and use the password that was listed in the script.


Disk Sanitization Steps

Enter the user's credentials.


Disk Sanitization Steps

Once logged in, you can open command prompt to verify that the login was successful.


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published