← Back to Work Samples

COMP 2064 & COMP 3105 — Identity Management & Enterprise Desktop OS

🏢 Windows Server Domain Lab

Windows Server 2019 Active Directory Group Policy VMware George Brown Polytechnic
View on GitHub →

Designed and implemented a full Windows Server 2019 domain environment in a VMware virtualisation lab. The project covers the complete lifecycle of enterprise identity management — from promoting a domain controller and structuring the directory, to applying Group Policy for security enforcement and onboarding Windows 10 client machines to the domain. This work directly reflects the skills required for systems administrator and IT support roles managing corporate AD environments.

Lab Environment

Hypervisor

VMware Workstation

Host machine: Windows 10

Domain Controller

Windows Server 2019

AD DS, DNS, DHCP roles

Client Machine

Windows 10 Pro

Domain-joined workstation

Domain Name

rohail.local

Internal private domain

IP Scheme

192.168.10.0/24

Static DC + DHCP for clients

Functional Level

Windows Server 2016

Forest & domain functional level

Implementation Steps

  1. 01

    Server Deployment & Role Installation

    Deployed Windows Server 2019 as a VM in VMware. Installed the Active Directory Domain Services (AD DS), DNS, and DHCP roles via Server Manager.

  2. 02

    Domain Controller Promotion

    Ran the AD DS Configuration Wizard to promote the server to a domain controller, creating a new forest and root domain (rohail.local). Configured DNS to point to the DC's static IP.

  3. 03

    Organisational Unit Structure

    Designed and created a logical OU hierarchy in Active Directory Users and Computers: Departments (IT, HR, Finance), Users, Computers, and Groups — mirroring a real corporate structure.

  4. 04

    User & Group Account Management

    Created department user accounts, assigned them to appropriate security groups, and organised accounts within the correct OUs. Applied password policy and account expiry settings.

  5. 05

    Group Policy Object (GPO) Configuration

    Created and linked GPOs to enforce desktop security policy, map shared network drives, restrict access to Control Panel, set wallpaper, and disable USB storage for standard users.

  6. 06

    DHCP & DNS Configuration

    Configured a DHCP scope for the 192.168.10.0/24 subnet, set the DC as the DNS server, and verified automatic IP assignment on domain-joined clients.

  7. 07

    Client Domain Join & Verification

    Joined a Windows 10 Pro VM to rohail.local, logged in with domain credentials, confirmed GPO application with gpresult /r, and verified domain connectivity with ping and nslookup.

Group Policies Configured

GPO NameScopeSetting
Password PolicyDomainMin length 10 chars, complexity on, 90-day expiry
Desktop LockdownAll Users OUCustom wallpaper, disable right-click desktop
Control Panel BlockStandard UsersHide all Control Panel items via User Config
Drive MappingIT Department OUMap \\DC01\Shared to Z: at logon
USB Storage DisableAll UsersDeny write access to removable storage devices
Account LockoutDomainLock after 5 failed attempts, 15-min duration
View on GitHub → ← All Projects