This project demonstrates the complete deployment and administration of an enterprise-grade Active Directory environment hosted in Microsoft Azure. The lab walks through building a Windows Server domain controller, joining a Windows 10 client to the domain, configuring DNS and networking, and implementing real-world identity and access management operations. It includes creating organizational units, provisioning users, managing security groups, enforcing NTFS and share permissions, applying password and account lockout policies, configuring logon hour restrictions, and performing full user lifecycle operations—from creation to deprovisioning. This end-to-end lab replicates a true corporate IT environment and reinforces essential skills used in IT Support, Systems Administration, and Identity & Access Management roles.
- Microsoft Azure
- Windows Server 2022
- Windows 10 Pro Client
- Active Directory DOmain Services (AD DS)
- Networking & Protocols
- Tools & Utilities
- 1) Create Virtual Machines
- 2) Make the Domain Controllers IP Static
- 3) Get the Domain Controllers Private IP
- 4) Attach Client to Domain Controller
- 5) Log into the Virtual Machines
- 6) Install Active Directory Domain Services
- 7) Promote Server to Domain Controller
- 8) Login to the Client Virtual Machine as the Domain Administrator
- 9) Verify Domain Functionality
- 10) Enable Remote Dial-In
- 11) Give Remote Desktop Permissions
- 12) Verify VM Connectivity
- 13) Create Organizational Units
- 14) Create a User
- 15) Create Security Groups
- 16) Assign Folder Permissions
- 17) Attempt Folder Access
- 18) Upgrade User to Domain Admin
- 19) Verify Admin Access
- 20) Create Password Policy
- 21) Lockout User Account
- 22) Unlock User Account
- 23) Reset User Password
- 24) Verify Functionality
- 25) Set Account Logon Hours
- 26) Deactivate Account
- 27) Deprovision Account
- Open Microsoft Azure then search Resource Groups and select create then give the Resource Group the following settings then create the Resource Group
- Name: RG-01
- Reigon: South Central US
- Search Virtual Network and select create then give the Virtual Network the following settings then create the Virtual Network
- Resource Group: RG-01
- Name: VNet-01
- Reigon: South Central US
- Seach Virtual Machines then create then give the Virtual Machine the following settings then create the Virtual Machine
- Basics
- Resource Group: RG-01
- Name: DC-01
- Image: Windows Server 2022
- Size: 2vcpus
- Username: userryan
- Password: Cyberlab123!
- Networking
- Virtual Network: VNet-01
- Seach Virtual Machines then create then give the Virtual Machine the following settings then create the Virtual Machine
- Basics
- Resource Group: RG-01
- Name: Client-1
- Image: Windows 10 Pro
- Size: 2vcpus
- Username: userryan
- Password: Cyberlab123!
- Networking
- Virtual Network: VNet-01
- Select the DC-01 (Domain Controller) then select Network Settings then open the Network Interface
- Select ipconfig1
- For Private IP address setting choose Static and save changes
- Select the Domain Controller then open the Network Settings tab and find the Private IP Address
- Select Client-1 (client virtual machine) then select Network Settings and open the Network Interface
- Select DNS Servers and choose Custom
- Enter the DC's Private IP address and save
- Restart the client VM
- Search Virtual Machines and check under the Public IP address tab for the Domain Controller's Public IP address and copy it
- In the Windows search bar search RDP to open the Remote Desktop Protocol
- Where it says Computer paste the Domain Controller's Public IP address
- When it asks for the login credentials enter:
- Username: userryan
- Password: Cyberlab123!
- To log into the client virtual machine copy the client's public IP address and follow the same steps
- In the Domain Controller and open the Server Manager then select Add roles and features
- On the Server Roles tab check Active Directory Domain Services then complete the installation
- In the Server Manager click the notification flag and select Promote this server to a domain controller
- Choose Add a new forest and set the root domain name to domain.name
- Set the Directory Services Restore Mode (DSRM) password to Cyberlab123! and complete the install and reboot the VMM
- Open the Remote Desktop Protocol and enter the client virtual machine's public IP address
- When asked about the username name and password enter
- Username: domain.name\userryan
- Password: Cyberlab123!
- Log into the Client Virtual Machine as the Domain Administrator open Windows PowerShell as an Administrator
- Attempt to ping the DC's private IP address using the command
ping 10.0.0.4
- Your private IP address is most likely different. If you don't remember return to 3) Get the Domain Controllers Private IP
- Ensure the ping succeeded
- Enter the command
ipconfig /allinto Windows Powershell - Confirm the output for the client's DNS settings shows the DC's private IP address
- In the Client Virtual Machine right click the Start Button and select System
- Navigate to the About page and select **Rename this PC (advanced) then click Change
- Check the Member of Domain box and enter the name of the domain and apply the changes
- On the Client Virtual Machine right click the Start Button and select Computer Management
- Go to Local Users and Groups and open the Groups folder
- Select Remote Desktop Users and click Add
- Type Domain Users in the box and click Check Names
- Apply the changes
- Restart the VM
- Open the Server Manager on the Domain Controller
- Select Tools then Active Directory Users and Computers
- Expand the Domain then click Computers
- The client VM should be inside
- Open the Server Manager on the Domain Controller
- Select Tools then Active Directory Users and Computers
- Right click the domain
- Open the New submenu
- Then select Organizational Unit
- Create 3 Organizational Units called: Employees, Admins, and Groups
- Right click the Employees folder
- Open the New submenu
- Then seelect User
- Name the user Ryan Kennon
- Open the Groups folder
- Open the New submenu
- Then select Group
- Name the Group: Human Resources
- Double click the Human Resources security group
- Select Members then select Add
- Enter the name of the user then Check Names
- Apply the changes
- On the
C: \create 3 folders named: HR-ReadWrite, HR-ReadOnly, and AdminsOnly
- Open the Properties for the folder called HR-ReadWrite
- Then select Sharing then Share
- Then enter Human Resources in the box then select Add
- Then click the dropdown arrow and select Read/Write
- Confirm the changes
- Do the same for the HR-ReadOnly folder except give the Human Resources group Read priveleges only.
- For the AdminsOnly folder, enter Domain Admins in the box before hitting Add
- Select Read/Write priveleges for the Domain Admins
- Apply the changes
- Log into the client VM using the credentials of the user created earlier
- Open the File Explorer
- On the Quick Access bar search
\\<DC name>
- Attempt to access the HR-ReadWrite folder and create a new file inside
- Attempt to access the HR-ReadOnly folder and attempt to create a new file inside
- Attempt to access the NoAccess folder
- Go back to Active Directory Users & Computers on the Domain Controller
- Open the Employees folder then right click the user Ryan Kennon and select Properties
- Select Member Of then Add
- Type Domain Admin
- Then Check Names
- Confirm the changes
- Log back in to the client VM using the user's credentials
- Search
\\DC-01in the Quick Access bar again - Attempt to open the AdminsOnly folder and attempt to create a new file inside
- On the Domain Controller open the Server Manager
- Select Tools then Group Policy Management
- Navigate through the Forest to the Default Domain Policy
- Right click Default Domain Policy then choose Edit
- In the Group Policy Management Editor navigate through the Policies folder to the Password Policy
- Change the Maximum Password Age to 30 days
- Change the Minimum Password Length to 12 characters
- Open the Account Lockout Policy
- Change the Account Lockout Threshold to 3 invalid login attempts
- Change the Account Lockout Duration to 360 minutes
- Go back to the Group Policy Management page
- Right-click Default Domain Policy
- Click Enforce
- Attempt to log into the client Virtual Machine using an incorrect password four times
- Open Active Directory Users and Computers
- Double click the user Ryan Kennon
- Click Account
- Check the box labeled Unlock Account
- Apply the Changes
- Right click the user Ryan Kennon
- Select Reset Password
- Enter the new password
- Apply the Changes
- Attempt to log into the client Virtual Machine using the updated user credentials
- On the Domain Controller open Active Directory Users and Computers
- Right-click the user Ryan Kennon and select Properties
- Navigate to the Account tab and click Logon Hours
- Select Logon Denied to clear the hours
- Apply the changes
- Attempt to log into the Client Virtual Machine using the User's Credentials to observe the change
- On the Logon Hours page highlight all the hours and select Logon Permitted and apply the changes to reenable sign on
- In Active Directory Users and Computers right-click the user Ryan Kennon
- Select Disable Account
- Attempt to log into the Client Virtual Machine using the User's Credentials to observe the change
- In Active Directory Users and Computers right-click the user
- Select Enable Account to reactive the user account
- In Active Directory Users and Computers right-click the user Ryan Kennon
- Select Delete
- Confirm you want to delete the user
- Attempt to log into the Client Virtual Machine using the User's Credentials to observe the change






























































