Proxmox-Based Windows Active Directory Lab
This project uses Proxmox to host a complete Windows Server Active Directory environment.
The goal was to simulate a small enterprise domain with centralized authentication, group
policy management, and realistic server roles — all running on a single Proxmox host.
Lab Overview
I deployed multiple Windows Server VMs inside Proxmox to create a functional Active Directory
domain. The environment includes domain controllers, a file server, a management workstation,
and Windows client machines for testing authentication and GPO behavior.
Virtual Machine Layout
- DC01 – Primary Domain Controller: Hosts AD DS and DNS, manages users, groups, and OUs.
- DC02 – Secondary Domain Controller: Provides redundancy, DNS failover, and replication testing.
- FS01 – File Server: Centralized shares for departments and users; used for NTFS/share permission testing.
- MGMT01 – Management VM: Windows Server or Windows 10/11 with RSAT for centralized administration.
- Client VMs: Windows 10/11 machines joined to the domain for authentication and GPO testing.
Proxmox Configuration Highlights
- Virtual Networking: Dedicated Proxmox bridge for the lab network, optional VLAN segmentation.
- Templates & Snapshots: Base Windows template for rapid VM deployment and easy rollback.
- Resource Allocation: Tuned CPU/RAM per VM role for efficient homelab performance.
Skills Practiced
- Active Directory: Users, groups, OUs, domain joins, DNS management.
- Group Policy: Creating, linking, and testing GPOs for users and computers.
- File Server Security: NTFS/share permissions, group‑based access control.
- Redundancy & Replication: Multi‑DC setup, failover testing, replication validation.
- Homelab Workflow: Using Proxmox templates, snapshots, and isolated networks.