Enterprise-level Active Directory environment built for hands-on learning and skill development in system administration, identity management, and network services.
- Virtualization Platform: Oracle VirtualBox 7.0
- Domain Controller: Windows Server 2022 (CA-DC-01.fernandotech.com)
- Client Machine: Windows 10 Pro 22H2 (Desktop01.fernandotech.com)
- Domain: fernandotech.com
- Network: 10.1.10.0/24 subnet
- Configured domain controller with DNS integration
- Created organizational units (OUs) for Computers, Users, Domain Controllers
- Implemented security groups for role-based access control (RBAC)
- Joined Windows 10 client to domain
- Enforced password complexity requirements (12-character minimum)
- Configured account lockout policies (3 invalid attempts)
- Set password history (24 passwords remembered)
- Implemented password age restrictions (90-day maximum, 1-day minimum)
- Created and configured network shares (NETLOGON, SYSVOL, FernandoTech)
- Implemented NTFS permissions with security group-based access control
- Mapped network drives (Z: drive) on domain-joined clients
- Tested cross-machine file sharing and permissions
- Deployed Action1 RMM platform for centralized management
- Configured automated vulnerability scanning
- Deployed 6+ critical security updates (.NET Framework, Windows patches)
- Remediated 1,000+ identified vulnerabilities
- Monitored patch compliance across endpoints
- Created domain user accounts with appropriate permissions
- Configured security groups (Tech, Personal)
- Assigned users to security groups for resource access
- Managed user accounts via Active Directory Users and Computers (ADUC)
- Oracle VirtualBox installed
- Windows Server 2022 ISO
- Windows 10 Pro ISO
- Minimum 16GB RAM, 100GB storage
- Created Windows Server 2022 VM (4GB RAM, 50GB storage)
- Installed Active Directory Domain Services role
- Promoted server to domain controller
- Configured DNS services
- Created fernandotech.com domain
- Created Windows 10 VM (4GB RAM, 40GB storage)
- Configured network settings (static IP: 10.1.10.3)
- Set DNS to point to domain controller (10.1.10.2)
- Joined Desktop01 to fernandotech.com domain
- Verified domain authentication
- Opened Group Policy Management Console
- Created and linked GPOs to domain
- Configured password policies under Security Settings
- Tested policy enforcement on client machine
- Created shared folder structure on domain controller
- Configured NTFS permissions for security groups
- Created network share with appropriate access controls
- Mapped network drives on client machines
- Tested file access and permissions
- Downloaded and installed Action1 Deployer on DC
- Configured service account with domain admin credentials
- Enabled Active Directory discovery
- Deployed Action1 agents to domain computers
- Configured vulnerability scanning schedule
- Deployed critical security updates automatically
- Windows Server 2022 administration
- Active Directory Domain Services (AD DS)
- DNS configuration and management
- Group Policy Object (GPO) creation and enforcement
- NTFS permissions and access control
- Network file sharing and drive mapping
- Remote monitoring and management (RMM)
- Patch management and vulnerability remediation
- Virtualization (Oracle VirtualBox)
- Network configuration (TCP/IP, subnetting)
- Understanding of enterprise identity management
- Hands-on experience with domain controller operations
- Group Policy enforcement for security hardening
- Role-based access control implementation
- Centralized patch management workflows
- Troubleshooting domain authentication issues
Active Directory Users and Computers -
Group Policy Management Console -
Group Policy settings (password policy) -
Network Shares -
Network drive mapped -
Domain-joined computer -
Action1 Dashboard -

- Implement Windows Server Update Services (WSUS)
- Configure DHCP services
- Set up additional organizational units
- Create more complex GPO structures
- Add redundant domain controller
- Implement file server role
- KevTech IT Support YouTube Tutorial Series
- Microsoft Official Documentation
- Action1 RMM Documentation
Author: Fernando Huizar
Contact: fernando.huizar.jr@gmail.com