🚧 Work in Progress 🚧
This project page is actively being updated as I build out my lab environment and document my experience.
I plan on adding these too in future updates:
This project is more about setting up a playground for me to get some hands-on experience with Active Directory.
I’ve had some lab work involving Active Directory through my CompTIA Network+ course (TestOut — offered through my community college), where they provided virtual environments of a fully deployed AD setup.
I also gained lab experience from the course
Workshop: Intro to Active Directory with Dale Hobbs offered by Antisyphon Training.
That course gave me a solid overview of central AD components, along with hands-on practice through a variety of labs. It was the biggest contributor to my desire to build my own lab space.
My main goal here is to deploy Active Directory in my home network and then create an environment I can both harden and test — giving myself perspectives from both offensive and defensive angles on how AD can be locked down.
- None. Straightforward actions and I am satisfied with progress.
Kal Eye
.HR-0002-win
and contextual workstations/OUs (HR-0001-win
& HR-0003-win
).HR-0002-win
.- None. Straightforward actions and I am satisfied with progress.
noreply@strange.local
account.users@strange.local
).win-server
(unsuccessfully). May require Docker reinstall.win-server
(if feasible).- Troubleshooting Windows Server was a nightmare; I may need another solution.
- The extra emails/groups make the experience feel more immersive.
- I’ll shift focus to security controls first instead of tinkering with mail setup.
- I’ll refine the organization later — security config best practices come first.
- Wasted too much time trying Wazuh onwin-server
.
- I want a stable AD environment that mirrors production logic.
- Once stable, I’ll layer in security controls and maybe even run some attack simulations.