Skip to content

Charmarke1/configure-ad

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 

Repository files navigation

Microsoft Active Directory Logo

On-premises Active Directory Deployed in the Cloud (Azure)

This tutorial outlines the implementation of on-premises Active Directory within Azure Virtual Machines.

Environments and Technologies Used

  • Microsoft Azure (Virtual Machines/Compute)
  • Remote Desktop
  • Active Directory Domain Services
  • PowerShell

Operating Systems Used

  • Windows Server 2022
  • Windows 10 (22H2)

High-Level Deployment and Configuration Steps

  • Preparing the AD Infrastructure in Azure
  • Deploying Active Directory
  • Creating Users with PowerShell
  • Group Policy and Managing Accounts

Deployment and Configuration Steps

Part 1: Preparing the AD Infrastructure in Azure

Setup Domain Controller in Azure

  1. Create a Resource Group:
    • Navigate to the Azure Portal and create a new Resource Group for the lab environment.

Lab 5

  1. Create a Virtual Network and Subnet:
    • Set up a Virtual Network with a subnet to host your VMs.

Lab 5

  1. Create the Domain Controller VM (Windows Server 2022):
    • Name the VM: DC-1.
    • Ensure that the VM is on the Virtual Network created previously.

Lab 5

Lab 5

Lab 5

  1. Set Static Private IP for DC-1:
    • After the VM is created, navigate to its Network Interface Card (NIC) settings and set the private IP to static.

Lab 5

  1. Disable Windows Firewall:
    • Log in to DC-1 and disable the Windows Firewall for testing connectivity.

Lab 5

Setup Client-1 in Azure

  1. Create the Client VM (Windows 10 22H2):
    • Name the VM: Client-1.

Lab 5

Lab 5

  1. Attach Client-1 to the Same Region and Virtual Network:
    • Ensure it is in the same Virtual Network and subnet as DC-1.

Lab 5

  1. Set DNS Settings:
    • Update Client-1's DNS settings to point to DC-1's private IP address.

Lab 5

  1. Test Connectivity:

    • Restart Client-1 from the Azure Portal.
    • Log into Client-1 and use the ping command to test connectivity with DC-1.
  2. Verify DNS Settings:

    • Run ipconfig /all in PowerShell on Client-1 to ensure the DNS points to DC-1.

Lab 5


Part 2: Deploying Active Directory

Install Active Directory

  1. Log in to DC-1.
  2. Install Active Directory Domain Services (AD DS).
  3. Promote DC-1 as a Domain Controller and set up a new forest (e.g., mydomain.com).
  4. Restart DC-1 and log in as mydomain.com\labuser.

Lab 5

Lab 5

Create a Domain Admin User

  1. Open Active Directory Users and Computers (ADUC).
  2. Create an Organizational Unit (OU) named _EMPLOYEES.
  3. Create another OU named _ADMINS.
  4. Add a new user:
    • Name: Jane Doe
    • Username: jane_admin
    • Password: Cyberlab123!
  5. Add jane_admin to the Domain Admins security group.
  6. Log out and log back in as mydomain.com\jane_admin.

Lab 5

Lab 5

Lab 5

Join Client-1 to the Domain

  1. Log in as the local admin and join Client-1 to the domain.
  2. Create a new OU titled '_CLIENTS' & add Client-1 in ADUC to _CLIENTS.

Lab 5

Lab 5


Part 3: Creating Users with PowerShell

Setup Remote Desktop for Domain Users

  1. Log into Client-1 as mydomain.com\jane_admin.
  2. Open System Properties and enable Remote Desktop.
  3. Allow "domain users" access to Remote Desktop.

Lab 5

Create Users with PowerShell

  1. Log in to DC-1 as jane_admin.
  2. Open PowerShell ISE as an administrator.
  3. Create multiple new users using a script (script link: https://github.com/joshmadakor1/AD_PS/blob/master/Generate-Names-Create-Users.ps1).
  4. Verify users appear in the _EMPLOYEES OU in ADUC.
  5. Attempt to log into Client-1 with one of the created accounts.

Lab 5

Lab 5

Lab 5


Part 4: Group Policy and Managing Accounts

Account Lockout Configuration

  1. Log in to DC-1.
  2. Open Group Policy Management.
  3. Edit the Default Domain Policy:
    • Set account lockout threshold to 5 invalid attempts.
  4. Attempt to log in with a user account using incorrect passwords. Observe the account lockout behavior.
  5. Unlock the account in ADUC and reset the password.

Lab 5

Lab 5

Lab 5

Enable and Disable Accounts

  1. Disable a user account in ADUC.
  2. Attempt to log in with the disabled account and observe the error message.
  3. Re-enable the account and log in successfully.

Lab 5

Lab 5

Lab 5

Observing Logs

  1. Review authentication and account-related logs in Event Viewer:
    • Log on DC-1 for domain-level events (shown below).
    • Log on Client-1 for local events.

Lab 5


Completion

Congratulations! You have successfully deployed and configured an on-premises Active Directory environment in Azure.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published