View on GitHub

Rodney Hall | Cybersecurity Portfolio

Hands-on cybersecurity portfolio covering SOC operations, incident triage, threat detection, identity management, cloud security, and OT/ICS environments.

Back to Portfolio

Active Directory Home Lab — Windows Server 2022

Overview

Built a Windows Server 2022 domain controller from scratch and designed an enterprise-scale Active Directory structure with multi-region OUs, departmental access groupings, and least-privilege object organization. Configured AD DS and DNS roles, provisioned users, security groups, and computer objects across USA, Europe, and Asia regions, and verified the full domain configuration via PowerShell and Server Manager.

Objective

Deploy a functional Windows domain and implement a scalable OU structure that enforces least-privilege access control across enterprise user, group, and computer objects.

Tools Used

What I Did

Evidence / Findings

Domain Controller promotion confirmed AD DS + DNS Active Server Manager confirms AD DS and DNS roles installed and running on LAB-DC01.

Multi-region OU structure OU Structure ADUC view showing USA, Europe, and Asia OUs with departmental sub-OUs nested within each region.

Users and security groups Users + Groups User accounts and security groups populated per department, structured for role-based access control.

Computer objects Computer Objects Computer objects created with a consistent naming convention across regions.

DNS role confirmation DNS Installed DNS Server role confirmed active — domain name resolution operational.

Hostname verification Hostname Verified PowerShell output confirming server hostname matches the domain controller designation.

Outcome / Recommendations

The domain is fully functional and structured for least-privilege administration. The OU hierarchy isolates administrative scope by region and department, enabling Group Policy Objects (GPOs) to be applied at a granular level without over-permissioning. Next steps would include implementing GPOs for password policy enforcement, account lockout thresholds, and privileged account restrictions — controls directly relevant to reducing lateral movement and privilege escalation risk in enterprise environments.