Skip to content

eloiilyass/File-Server-GPO-Lab

Repository files navigation

🏢 Enterprise Active Directory Lab

Windows Server · Active Directory DS · Group Policy · NTFS · File Server · VMware

Status Platform Tool Type


📌 Overview

This project simulates a real-world enterprise IT environment built from scratch in an isolated virtual lab.

It covers the full lifecycle of a Windows domain infrastructure: Active Directory design, secure file server configuration, Group Policy enforcement, and end-to-end validation — directly applicable to IT Support, Junior Sysadmin, and Network Administrator roles.


🧱 Lab Architecture

Component Details
Domain Controller Windows Server (AD DS)
Client Machine Windows 10
Network Type Host-only — isolated internal lab
Virtualization VMware Workstation

⚙️ Technologies & Tools

Active Directory DS · Group Policy (GPO) · NTFS Permissions · SMB / File Sharing · Windows Server · Windows 10 · VMware Workstation · DNS


🗂️ Project Structure

Lab
├── Part 1 — Active Directory Structure (OUs + Users)
├── Part 2 — File Server Configuration (NTFS Permissions)
├── Part 3 — Group Policy (GPO Enforcement)
└── Part 4 — Testing & Validation

🔹 Part 1 — Active Directory Structure

Organizational Units

Created a structured OU hierarchy to mirror a real enterprise:

OU Users
IT it.admin · it.support
HR hr.manager · hr.agent
Finance fin.manager · fin.agent

📸 Screen 1 — OU structure in Active Directory Users and Computers

Organizational Units

📸 Screen 2 — Domain users created per department

IT Users HR Users Finance Users


🔹 Part 2 — File Server Configuration

Folder Structure

Centralized file storage with department-level isolation:

C:\Company\
├── IT\
├── HR\
└── Finance\

📸 Screen 3 — Company folder structure

Folder Structure

NTFS Permissions

Applied the principle of least privilege:

  • Each department accesses only its own folder
  • Cross-department access is explicitly denied

📸 Screen 4 — NTFS permission configuration

NTFS Permissions


🔹 Part 3 — Group Policy (GPO)

GPO Name Target OU Restriction Applied
HR-Policy HR Block Control Panel access

📸 Screen 5 — GPO creation and linking in Group Policy Management Console

GPO Configuration


🔹 Part 4 — Testing & Validation

All configurations were verified through functional testing:

Test Result
GPO enforcement — Control Panel blocked ✅ Pass
gpupdate /force policy refresh ✅ Pass
ping lab.local DNS resolution ✅ Pass
Domain login with restricted user ✅ Pass

📸 Screen 6.1 — Control Panel access blocked by GPO

GPO Restriction

📸 Screen 6.2gpupdate /force + ping test

Policy Test

📸 Screen 6.3 — Successful domain login with policies applied

Domain Login


✅ Key Achievements

  • Designed and deployed a complete Active Directory domain environment
  • Structured domain with Organizational Units and 6 domain users
  • Implemented NTFS permissions following least-privilege principles
  • Created and enforced Group Policy Objects for centralized control
  • Performed full functional testing and validation of all configurations

🎯 Skills Demonstrated

Category Skills
Windows Administration Windows Server, AD DS, DNS, Domain Management
Security & Access Control NTFS Permissions, GPO, Least Privilege
File Services SMB, File Server, Folder Permissions
Networking DNS Resolution, Connectivity Testing
Virtualization VMware Workstation, VM Configuration

💼 Target Roles

This project directly demonstrates skills required for:

  • IT Support Technician
  • Junior System Administrator
  • Network Administrator

Lab built in an isolated VMware environment — all configurations documented with screenshots and test results.

About

Enterprise Active Directory Lab with File Server, GPO and Permissions

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors