Skip to content

sachingoray/Enterprise-Active-Directory-Lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 

Repository files navigation

Enterprise Active Directory & File Server Lab

Simulated a full university-style Windows Server 2022 environment with Active Directory, secure file server, Group Policy automation, and FSRM for data governance. Built using VMware virtualization to mimic real enterprise infrastructure.

Table of Contents

  1. Project Overview
  2. Architecture Diagram
  3. Infrastructure & Identity Setup
  4. File Server Engineering
  5. Group Policy Automation
  6. Security & FSRM
  7. Troubleshooting
  8. Skills Demonstrated
  9. Lesson learned

Project Overview

This lab simulates a real-world enterprise Active Directory environment for a university scenario. The environment includes:

  • Domain Controller (Windows Server 2022) named as: UNI-DC
  • Member File Server named "Uni-FS."
  • Client PCs (Windows 10/11)
  • Secure file storage with advanced NTFS permissions
  • Group Policy automation for drive mapping and folder redirection
  • File Server Resource Manager (FSRM) for file screening
  • Enable access based Enumeration
  • Virtualized setup using VMware/Hyper-V

Architecture Diagram

The network topology of the lab environment:

  • DC1: Domain Controller (technova.edu)
  • Uni-FS: Member File Server
  • Client PC: Domain-joined Windows 10/11
  • DNS: Points to DC1

Network Diagram

Infrastructure & Identity Setup

In this step, the Active Directory domain and foundational identity structure were built to simulate a real enterprise environment.

  • Installed Windows Server 2022 and configured Domain Controller (DC1).
  • Created Active Directory domain: technova.edu.
  • Designed Organizational Units (OUs) to logically separate accounts:
    • Students OU
    • Staff OU
    • Admins OU
  • Created Security Groups for scalable permission management:
    • Business_Students
    • Staff_Group
    • Admin_Group
  • Joined secondary server Uni-FS to the domain for file server integration.
  • Entire environment virtualized using VMware/Hyper-V.

Screenshots

To demonstrate the setup and provide visual proof:

  1. AD Structure & Security Groups
    Shows the OU hierarchy and groups created.
    AD Structure

  2. Domain Controller Roles (Optional but recommended)
    Shows that AD DS and DNS roles are installed and domain name is technova.edu.
    DC Roles

  3. Member Server Join (Optional but recommended)
    Shows that Uni-FS is successfully joined to the domain.
    Member Server Join

File Server Engineering

The Uni-FS member server was configured as a centralized storage system for student report submissions.

  • Deployed secondary Windows Server (Uni-FS) and joined it to the domain.
  • Configured SMB network share: Business_Report_Submission.
  • Designed a secure “Drop-Box” permission model using NTFS.
  • Implemented Creator Owner to ensure users automatically become owners of their uploaded files.
  • Enabled Access-Based Enumeration (ABE) to hide unauthorized folders from users.
  • Applied Security Group-based access control instead of per-user permissions.

Security Model

  • Students:
    • Can upload reports.
    • Cannot view other students’ files.
  • Admins:
    • Full Control for oversight and management.

Screenshots

  1. SMB Share Configuration (Server Side)
    SMB Share

  2. NTFS Advanced Permissions – Creator Owner Implementation (Server Side)
    NTFS Permissions

  3. Access-Based Enumeration (ABE) Enabled (Server Side)
    ABE Enabled

  4. Student View – Secure Drop-Box Model in Action (Client Side)
    Student View

Group Policy Automation

Group Policy Objects (GPOs) were implemented to automate user experience and enforce centralized management.

  • Created GPO to automatically map U: Drive to the file server upon login.
  • Configured Folder Redirection for the Documents folder to store user data on Uni-FS.
  • Ensured persistent access to files across multiple client machines.
  • Verified policy application using:
    • gpupdate /force
    • gpresult /r

Screenshots

  1. GPO Drive Mapping Configuration
    Drive Mapping GPO

  2. gpresult Verification Output
    GPResult

Security & FSRM

File Server Resource Manager (FSRM) was deployed to enforce storage governance and prevent misuse.

  • Installed File Server Resource Manager role on Uni-FS.
  • Created Active File Screening policy.
  • Blocked high-risk and non-academic file types:
    • .exe (prevent malware / unauthorized software)
    • .mp3
    • .mp4
  • Enforced policy in real-time using Active Screening.

Security Objective

  • Reduce malware risk.
  • Prevent storage abuse.
  • Enforce controlled file submission standards.

Screenshots

  1. Active File Screen Configuration
    File Screening

Troubleshooting

During implementation, multiple issues were identified and resolved:

Active Directory Lookup Failure

  • Encountered "Name Not Found" error while assigning permissions.
  • Verified domain connectivity.
  • Confirmed Global Catalog availability.
  • Restarted server to clear cached credential issues.

DNS Misconfiguration

  • Identified incorrect DNS settings on client and file server.
  • Reconfigured systems to use Domain Controller as primary DNS.
  • Validated domain authentication after correction.

GPO Application Issues

  • Forced policy update using gpupdate /force.
  • Verified applied policies using gpresult /r.

Skills Demonstrated

  • Active Directory Domain Services (AD DS)
  • DNS Configuration & Troubleshooting
  • NTFS & SMB Permission Engineering
  • Security Group-Based Access Control
  • Access-Based Enumeration (ABE)
  • Group Policy Management
  • File Server Resource Manager (FSRM)
  • Identity & Access Management (IAM)
  • Windows Server Administration
  • Enterprise Infrastructure Simulation
  • Technical Troubleshooting & Root Cause Analysis

Lessons Learned

During this lab project, I gained hands-on experience in building and managing an enterprise-style Windows Server environment. Key lessons included:

  • Understanding the difference between SMB share permissions and NTFS permissions, and how both layers work together to secure files.
  • Implementing Access-Based Enumeration (ABE) to provide a secure, user-friendly drop-box model.
  • Designing Organizational Units (OUs) and Security Groups for scalable identity and access management.
  • Automating user experience with Group Policy Objects (GPOs), including drive mapping and folder redirection.
  • Troubleshooting real-world issues such as DNS misconfigurations and AD permission lookup errors.
  • Realizing the importance of testing both server-side configuration and client-side results to ensure security and usability.
  • Gaining confidence in virtualization, networking, and enterprise-level file governance practices.

About

This project was executed in a private home lab environment using VMware and to emulate a real-world enterprise network for "Technova University Network" which is a imaginary University. By developing the setup from scratch, I showcased my expertise in server virtualization, network configuration, and domain management.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors