Active Directory Home Lab

Project Overview

Configured two Windows Server 2019 machines, one physical server and one virtual machine, to run Active Directory to host machines and users. This project combines Active Directory, Windows system configuration, and network administration


Technologies Used

  • BMAX Mini PC - Windows Server 2019
  • VirtualBox VM - Windows Server 2019
  • VirtualBox VM - Windows 10 Pro
  • Mac Mini - Ubuntu 24.02 LTS

Implementation Details

This project involved building two separate Active Directory environments to gain hands-on experience with enterprise network administration and Windows Server infrastructure. The first implementation was a fully configured virtual lab using VirtualBox with NAT routing and DHCP services. The second was a physical homelab using dedicated hardware to manage real devices on my network.

Virtual Machine Setup (VirtualBox)

The virtual environment simulated a complete enterprise network with a domain controller providing Active Directory, routing, and DHCP services to client machines.

Initial Server Configuration

  • Installed Windows Server 2019 on a VirtualBox virtual machine.
  • Renamed the server to "DC" (Domain Controller) for clarity.
  • Configured dual network adapters: one for external internet connectivity and one for the internal network.
  • Set up the internal NIC with a static IP address (172.16.0.1/24) and configured DNS to point to loopback (127.0.0.1).

Active Directory Domain Services

  • Installed Active Directory Domain Services through Server Manager.
  • Promoted the server to a domain controller and created a new forest.
  • Created an Organizational Unit named "_ ADMINS" for administrative accounts.
  • Generated a dedicated domain administrator account and added it to the Domain Admins security group.
  • Verified administrative access by logging in with the new credentials.

Routing and Remote Access (RAS/NAT)

  • Installed the Remote Access role with routing capabilities.
  • Configured Network Address Translation (NAT) to allow internal network clients to access the internet through the domain controller.
  • Designated the external NIC as the public interface for internet connectivity.
  • Enabled routing between the internal and external networks.

DHCP Server Configuration

  • Installed the DHCP Server role through Server Manager.
  • Created a new DHCP scope with an IP address range of 172.16.0.100 to 172.16.0.200.
  • Configured the domain controller's IP address (172.16.0.1) as the default gateway for DHCP clients.
  • Set DNS server options to point to the domain controller for name resolution.
  • Authorized the DHCP server in Active Directory.

Bulk User Creation

  • Created an Organizational Unit named "_ EMPLOYEES" to organize user accounts.
  • Developed a PowerShell script to automate the creation of 10,000 test users with randomly generated names.
  • Configured all user accounts with a standard password and set passwords to never expire for lab purposes.
  • Verified user account creation through Active Directory Users and Computers.

Client Machine Setup

  • Created a Windows 10 Pro virtual machine to act as a domain-joined client.
  • Configured the VM to use the internal network adapter only.
  • Verified that the client received an IP address automatically from the DHCP server.
  • Successfully joined the Windows 10 machine to the domain.
  • Tested user authentication by logging in with domain user credentials.

Physical Homelab Setup

The physical implementation focused on core Active Directory functionality using real hardware to manage devices on my home network.

Hardware Configuration

  • Deployed Windows Server 2019 on a BMAX Mini PC as the domain controller.
  • Configured a Mac Mini running Ubuntu 24.02 LTS as a client device.
  • Connected both machines to the existing network infrastructure without dual NICs.
  • Assigned static IP addressing to the domain controller for reliable DNS services.

Active Directory Setup

  • Installed Active Directory Domain Services on the BMAX Mini PC.
  • Created a new domain and promoted the server to domain controller.
  • Manually created administrative and standard user accounts without automation scripts.
  • Organized users into appropriate Organizational Units for better management.
  • Configured Group Policy settings for basic security and management policies.

Results

  • Successfully deployed two functional Active Directory environments with different architectures.
  • Gained practical experience with Windows Server administration, networking, and automation.
  • Demonstrated understanding of enterprise identity management and network services.
  • Created a scalable test environment for experimenting with Group Policy, user management, and domain services.
  • Achieved stable domain controller operation supporting multiple client devices.

Future Improvements

  • Automate user account creation and management.
  • Configure Group Policy settings for additional security and management policies.
  • Add the ML machine to the domain and configure users to be able to access and use it