Self-Directed Case Study · George Brown College · Fall 2025
From the Endpoint to the Domain
Two courses. Two environments. One complete enterprise Windows stack — built from scratch, documented step by step, and verified with live screenshots. This case study covers Windows 11 workstation configuration from the client side, and Windows Server 2022 domain deployment from the server side — together they tell the full story of how a real-world enterprise network comes to life.
George Brown CollegeCloud Computing & Network Admin (T465)Md Rahat Islam Anik · 101635860Fall 2025
2Environments Built
107+Screenshots Taken
20Tasks & Phases
3Servers Deployed
01
Windows 11 Enterprise Workstation Administration
Deploying, configuring, and hardening a Windows 11 workstation from scratch inside VMware Fusion on macOS — covering provisioning, local policies, PowerShell network management, Storage Spaces, and file sharing.
TASK 01Install Windows 11 on VMware Fusion — Named to Lab Standard
Every enterprise build starts the same way — a blank virtual machine. For this task, I deployed a fresh Windows 11 installation inside VMware Fusion on my MacBook, naming the machine following the lab convention: YourName-StudentID. This was my first hands-on contact with desktop virtualization for the course, and it set the foundation for everything that followed.
Getting Windows 11 to install on Fusion required downloading the ISO, creating the VM with sufficient specs, and navigating through the Setup wizard. The machine name MdRahatIslamAnik-101635860 was set during initial configuration — a detail that mattered for identification across every subsequent screenshot.
VMware Fusion — Windows 11 desktop running, student ID visible on desktopVMware page & Windows 11 installation running side by side on macOSWindows 11 installation progress — setup copying filesVM resources configured — CPU, RAM, and storage allocated for Windows 11Windows 11 successfully booted with student name on desktop
TASK 02Provisioning Package — Create Local Admin Account via Windows Configuration Designer
In enterprise environments, IT teams rarely configure each PC manually — they use provisioning packages to automate setup. This task required creating a .ppkg file using Windows Configuration Designer (WCD) that would automatically create a local administrator account called AnAdmin with the password P@ssw0rd and apply it to the VM.
I built the package step by step in WCD: selecting the account settings, defining credentials, exporting the .ppkg file, and then applying it to the Windows 11 VM. After application, the account appeared under local users — confirming the package deployed correctly.
Windows Configuration Designer open — starting a new provisioning packageConfiguring account settings inside WCD — local admin account details enteredProvisioning package settings review before exportPackage exported successfully as .ppkg fileApplying the provisioning package to Windows 11 VMPackage installation confirmation — applying settingsLocal Users and Groups — AnAdmin account appears post-provisioningAccount verified in Computer ManagementAdmin account confirmed active with correct group membership
Security hardening is non-negotiable in any enterprise environment. This task required configuring Local Security Policy to enforce UAC (User Account Control) behavior — specifically, ensuring that any privileged action triggers a secure credential prompt and dims the desktop (Secure Desktop mode). This prevents malware from spoofing the UAC dialog.
I accessed secpol.msc, navigated to Local Policies → Security Options, and located the UAC settings. I configured "User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode" to prompt for credentials on the secure desktop. Screenshots captured the before/after state of each policy setting.
⚠
Note: Some screens show the taskbar without my student name visible — because the UAC configuration window covered the desktop. All work was performed on my MacBook and the taskbar style is consistent throughout the project.
secpol.msc open — Local Security Policy consoleSecurity Options list — UAC policies visibleUAC — Behavior of elevation prompt set to prompt for credentialsSecure Desktop dimming policy — enabledPolicy confirmation — UAC elevation on secure desktop configuredLocal policy settings verified — all UAC options correctly set
Additional UAC verification screenshotPolicy applied — testing UAC prompt triggers correctlyScreen dims on UAC trigger — secure desktop activeUAC dialog with credential prompt visibleFinal policy state confirmed in secpol.msc
TASK 04Pin Microsoft News to Start Menu & Export Taskbar Layout via PowerShell
Standardized Start menu and taskbar layouts are a common enterprise requirement — IT departments often deploy a locked-down layout to ensure consistency across all endpoints. This task required pinning the Microsoft News app to the Start menu, then exporting the taskbar configuration to an XML file using PowerShell.
I pinned the app through the Start menu UI, then used Export-StartLayout and related cmdlets in PowerShell to export the configuration. The resulting layout file could be deployed company-wide through Group Policy — a direct bridge to what I'd implement on the server side later.
Start menu open — Microsoft News app located for pinningMicrosoft News pinned to Start menu — confirmationPowerShell open — Export-StartLayout command readyTaskbar layout exported to XML file successfullyXML layout file verified in File ExplorerLayout file contents — pinned apps visible in XML
TASK 05PowerShell Network Configuration — Set Static IP 192.168.168.101/24
Network configuration via PowerShell is a core sysadmin skill. Rather than using the GUI, this task required setting a static IPv4 address of 192.168.168.101/24 directly through the command line using New-NetIPAddress. This approach is scriptable, repeatable, and deployable at scale — exactly how enterprise teams manage endpoints.
I identified the correct adapter using Get-NetAdapter, removed any existing DHCP-assigned address, and applied the static configuration. Running ipconfig /all after confirmed the address was correctly assigned to the adapter.
PowerShell — Get-NetAdapter showing available network interfacesNew-NetIPAddress command executed — static IP 192.168.168.101/24 appliedipconfig /all output — static IP confirmed on adapterNetwork adapter properties — static IP visible in settingsFinal verification — adapter showing 192.168.168.101 assigned
TASK 06Storage Spaces — Create a 2-Way Mirror Storage Pool
Storage Spaces is Windows' software-defined storage solution — it pools physical disks into resilient volumes. A 2-way mirror writes data to two disks simultaneously, providing fault tolerance if one drive fails. This task required creating a Storage Pool from available virtual disks, then creating a 2-way mirror virtual disk on top of it.
I navigated to Server Manager → File and Storage Services → Storage Pools, added the available disks to a pool, and created the mirrored virtual disk. The resulting volume was mounted and ready for use — setting up the foundation for the file sharing tasks that followed.
Storage Spaces wizard open — creating new storage poolSelecting physical disks for the storage pool2-Way Mirror selected as resiliency typeStorage pool and virtual disk being createdStorage pool successfully created and visible in File Explorer
TASK 07Create "File Share" Folder on the Storage Space Volume
With the storage pool created, the next step was creating the File Share folder on the new volume — this would serve as the shared network resource for the next task. Placing it on the mirrored storage space ensures any data stored here has redundancy built in.
Storage space volume visible in File ExplorerFile Share folder created on the mirrored volumeFolder properties — confirming location on storage pool driveFile Share folder ready for permissions configuration
File sharing permissions in Windows are a two-layer system: Share permissions control network access at the share level, while NTFS permissions control access at the file system level. The effective permissions are the most restrictive of the two. This task required sharing the File Share folder with specific user access levels — read vs. read/write — matching a permission matrix defined in the course.
I right-clicked the folder, set up sharing through Advanced Sharing, configured the share permissions, then drilled into Security to set NTFS permissions. Each user/group was assigned the correct permission level and verified by reviewing the access control list.
Advanced Sharing dialog — folder being shared on networkShare permissions dialog — user permissions being configuredSecurity tab — NTFS permissions for the File Share folderRead permission assigned to designated userRead/Write permissions assigned to second userPermission summary — all users configured correctlyNetwork path verified — folder accessible via UNC pathFinal NTFS permission ACL confirmed
TASK 09Deploy Microsoft Whiteboard from Microsoft Store
Application deployment from the Microsoft Store is a standard workflow in modern endpoint management. This task required installing Microsoft Whiteboard from the Store — simulating how IT might push a collaboration app to a managed workstation. Post-install verification confirmed the app launched correctly and was visible in the Start menu.
Microsoft Store open — searching for Microsoft WhiteboardWhiteboard app page — clicking InstallInstallation in progress — downloading and installingWhiteboard successfully installed — visible in Start menuMicrosoft Whiteboard launched and running on Windows 11App verified — Whiteboard interface open and functionalWhiteboard confirmed working — installation task complete
TASK 10Configure File History — 30-Day Retention on Storage Space
File History is Windows' built-in backup and versioning solution — it automatically saves copies of files to a designated drive, allowing recovery of older versions. This task required configuring it to keep historical copies for 30 days, pointed at the storage space volume created earlier.
ℹ
Note to evaluator: For this task, I was on my Mac just like all other tasks. The File History configuration steps were completed within the VMware environment — some screens may vary slightly due to virtualization layer differences with storage device detection.
File History settings — selecting the storage space as backup driveAdvanced Settings — Keep saved versions set to 30 daysFile History running — first backup in progressBackup confirmed — File History active on storage space volume
02
Windows Server 2022 Enterprise Domain — anik.local
Building a full multi-server Windows Server 2022 domain from the ground up inside UTM on an Apple Silicon MacBook — two servers, one workstation, a complete Active Directory domain, DHCP, DNS, GPOs, and file services, all verified and documented.
Windows Server 2022Active DirectoryDHCP / DNSGroup PolicyUTM · Apple SiliconNTFS Permissions
PHASE 01Virtual Machine Provisioning — Windows Server 2022 on UTM (Apple Silicon)
The first challenge wasn't the server — it was the hardware. Building Windows Server 2022 on an Apple Silicon MacBook Air required using UTM, a virtualization platform for macOS that supports both ARM and x86 emulation. I created the primary Domain Controller VM (CLCT4003-1DC-MdRahatIslamAnik) with 4 vCPUs, 8GB RAM, and 64GB storage in x86_64 mode, then installed Windows Server 2022 Datacenter Evaluation (Desktop Experience) for full GUI access.
VM Specs — SRV01 (Domain Controller): 4 vCPUs · 8 GB RAM · 64 GB storage · x86_64 architecture · Windows Server 2022 Datacenter Evaluation (Desktop Experience)
UTM VM configuration — CLCT4003-1DC-MdRahatIslamAnik setup notesUTM VM resource summary — 4 vCPUs, 8GB RAM, 64GB storage confirmedWindows Server 2022 edition selection — Datacenter Evaluation with Desktop ExperienceWindows Server 2022 installation progress — files copyingSetting built-in Administrator password during first-time setupWindows Server 2022 boots to lock screen — Ctrl+Alt+Delete promptServer Manager loads automatically after first login
This was the moment the server transformed from a standalone box into the authority of an enterprise domain. I installed the AD DS role through Server Manager's Add Roles and Features Wizard, selected CLCT4003-1DC-MdRahatIslamAnik as the target, and began the promotion process. Choosing "Add a new forest" created the root domain: anik.local.
The promotion wizard walked through DNS integration, Global Catalog designation, DSRM password creation, and confirmed the NetBIOS name ANIK. The wizard auto-generated a PowerShell deployment script — proof the configuration could be repeated and automated. After the final prerequisites check passed (with the expected DNS delegation warning in an isolated lab), the server rebooted and came back online as ANIK\Administrator — the domain controller of anik.local was live.
Server Manager — Local Server overview, ready for role installationAdd Roles and Features Wizard — Before You BeginSelecting CLCT4003-1DC as the destination serverAD DS role selected for installationAD DS information page — DNS requirements reviewedAD DS installation confirmation — components listedAD DS installation in progress on SRV01AD DS Configuration Wizard — Add New Forest selected, anik.local enteredDomain Controller Options — DNS and Global Catalog enabled, DSRM password setDNS Options — no delegation required in standalone lab environmentAdditional Options — NetBIOS name ANIK auto-populatedAD DS Default Paths — NTDS, SYSVOL confirmedAD DS Prerequisites Check — all checks passedFirst logon as ANIK\Administrator — domain controller promotion confirmed
PHASE 03DHCP Server — Multi-Site Scopes for Toronto & Montreal
With the domain running, the next critical service was DHCP — the mechanism by which every client gets an IP address, gateway, and DNS server automatically. I installed the DHCP Server role on SRV01, first assigning a static IPv4 address to the server (192.168.6.10/24) to ensure DHCP and DNS services were anchored to a fixed address.
I created multiple scopes to simulate a multi-site enterprise network with offices in Toronto and Montreal. Each scope was configured with the correct subnet, IP range, exclusions, and scope options (Router 003, DNS Server 006, DNS Domain Name 015). A DHCP reservation for SRV02 ensured it would always receive the same IP regardless of lease renewal.
Scopes created:10.10.10.0 Toronto Lab · 10.10.20.0 Toronto Office · 10.10.30.0 Montreal Lab · 10.10.40.0 Montreal Office · 192.168.6.0 CLCT4003-SCOPE (primary lab)
DHCP installation warning — static IP required before proceedingStatic IPv4 192.168.6.10/24 applied to SRV01DHCP Server role selected for installationDHCP Server role installation in progressNew Scope Wizard — CLCT4003-SCOPE named and describedDHCP scope activated — Yes, activate now selectedCLCT4003-SCOPE visible and active under IPv4 in DHCP ManagerMultiple scopes visible — Toronto and Montreal sites all configured
PHASE 04Second Server Deployment — SRV02 Joins the Domain
A single-server domain is a lab — an enterprise network needs member servers. I deployed a second Windows Server 2022 VM, CLCT4003-SRV02-MdRahatIslamAnik, destined to serve as the File Server and GPO Management node. The process mirrored SRV01's installation: create the UTM VM, install Windows Server 2022 Datacenter, set a local administrator password, rename the machine, and then complete the domain join to anik.local.
Joining the domain required pointing SRV02's DNS to the domain controller at 192.168.1.10, entering domain credentials, and confirming the "Welcome to the anik.local domain" message. A static IP (192.168.1.12) and DHCP reservation were then configured, and MAC address 7A-1C-33-A3-08-8B was logged for the reservation record.
UTM VM creation for SRV02 — default Windows template, x86_64SRV02 first boot — Windows Server 2022 setup beginsWindows Server 2022 edition selection for SRV02Drive 0 selected for OS installationWindows Server 2022 installation progress on SRV02SRV02 first boot completing service initializationSRV02 login screen — first boot after Windows Server 2022 installServer Manager on SRV02 — local server properties on first loginSRV02 renamed to CLCT4003-SRV02 — restart requiredSRV02 successfully joined to anik.local domainLogging into SRV02 using domain credentials anik\AdministratorStatic IP and DNS configured on SRV02 — pointing to DC at 192.168.1.10SRV02 network adapter — static IP 192.168.1.12, DNS to DC confirmedRe-applying static IPv4 on SRV02 post-domain joinipconfig confirms static IP 192.168.1.12 and gateway on SRV02DHCP reservation for SRV02 created in DHCP Manager
PHASE 05Organizational Units, Users & Security Groups
Active Directory's power comes from organization. I opened Active Directory Users and Computers (ADUC) on the domain controller and built a full OU hierarchy under anik.local: Toronto, Montreal, Servers, Workstations, Groups, and Users — mirroring how a real enterprise organizes its directory structure by geography and function.
Inside each location OU, I created user accounts with proper UPN suffixes (toronto.user@anik.local, montreal.user@anik.local), enforced password-change-at-next-logon policies, and built Global Security Groups — Toronto-Users and Montreal-Users — adding each user to their respective group. This group structure would directly drive NTFS permissions and GPO filtering later.
ADUC open — default domain container anik.localOU creation — Montreal and Toronto OUs being builtToronto OU with Computers sub-OU visibleMontreal OU and Computers sub-OU structure confirmedFinal OU structure: Montreal, Toronto, Servers, Workstations, Groups, UsersNew user creation — montreal.user@anik.local in Montreal OUPassword policies for Montreal user — change at next logon enabledMontreal user account successfully createdMontreal OU showing montreal.user objectCreating Toronto user — toronto.user@anik.localToronto OU showing toronto.user objectCreating Toronto-Users security group — Global/Security typeToronto-Users group successfully created in Groups OUAdding toronto.user to Toronto-Users groupToronto user confirmed as member of Toronto-UsersBoth Toronto-Users and Montreal-Users groups visible in Groups OUMontreal-Users group membership — montreal.user added
Group Policy is the central nervous system of Windows domain management. I configured two GPOs: a user lockdown policy targeting the Toronto OU that restricted Start menu personalization, and a domain-wide password policy enforcing complexity, minimum length, history, and account lockout.
I opened the Group Policy Management Console (GPMC), created TOR-UserLockdown-GPO and linked it to the Toronto → Computers OU. Inside the policy editor, I navigated to Administrative Templates → Personalization and enabled the restriction on changing the Start menu background. For the password policy, I modified the Default Domain Policy: minimum length of 7, complexity enabled, maximum age of 42 days, and account lockout after 5 failed attempts with a 15-minute duration.
After applying changes with gpupdate /force on the domain controller, I ran gpresult /r on the workstation to confirm both GPOs were received and applied. I then deliberately triggered the account lockout by entering wrong credentials repeatedly — proving the lockout policy was enforced in real time.
Group Policy Management Console open — anik.local domain structureDefault Domain Policy — GPO tree structure viewedPassword Policy settings — history, minimum length, complexity visibleTOR-UserLockdown-GPO linked to Toronto → Computers OUGPO Scope confirmed — Authenticated Users in security filteringGPO editor — Administrative Templates → Control Panel openPrevent changing Start Menu background — EnabledPassword policy applied — min length 7, complexity on, max age 42 daysAccount Lockout Policy — 5 failed attempts, 15 min lockoutgpupdate /force executed in PowerShell on domain controllergpresult /r on workstation — Default Domain Policy and custom GPO appliedAccount lockout simulation — Toronto user locked after failed attemptsLockout delay confirmed — policy enforced in real time
File sharing in a domain environment brings together everything built so far: users, groups, permissions, and the servers. I created a CompanyShare folder on the domain controller under C:\, shared it over the network, and set up the permission matrix: Toronto-Users received Read access at the share level and Modify at the NTFS level; Montreal-Users received Change access at share and Modify at NTFS. Administrators retained Full Control.
From the workstation, I mapped Drive Z: using the montreal.user account — and then tested that Montreal could read files but not create or modify them, verifying the permissions were applied exactly as designed.
CompanyShare folder created under C:\ on domain controllerShare permissions — Toronto-Users granted Read accessShare permissions — Montreal-Users granted Change + ReadNTFS permissions — Toronto-Users assigned Modify + ReadNTFS permissions — Montreal-Users granted Modify + ReadDrive Z mapped on workstation using montreal.user credentialsRead-only access enforced — Montreal user cannot create files
DNS is the backbone of an Active Directory domain — without it, nothing resolves. I opened DNS Manager on the domain controller, reviewed the server's network interface bindings, and configured an external DNS forwarder (Google DNS 8.8.8.8) to handle queries outside the anik.local namespace.
ℹ
External forwarder validation failed in nslookup — this was expected and correct. UTM on Apple Silicon uses NAT-only networking, meaning the domain controller cannot reach external DNS servers directly (traffic is routed through the macOS host). This is a platform limitation, not a DNS misconfiguration. The forwarder settings are correctly configured for the lab environment.
DNS Manager open on CLCT4003-1DC — server interfaces reviewedDNS Forwarders — 8.8.8.8 added as external forwardernslookup test — timeout expected due to UTM NAT-only networkingDNS zones visible — anik.local forward and reverse lookup zones
PHASE 09Workstation Integration — Joining anik.local & Verifying Everything Works
The final proof of a working domain is the workstation. I configured the Windows 11 VM (GB-WS-01-ANIK) with DNS pointing to 192.168.10.10 (the domain controller), verified a successful ping to the DC, and ran nslookup to confirm name resolution. The domain join prompt required domain admin credentials — and returned the "Welcome to the anik.local domain" confirmation.
Post-join, the workstation received its DHCP-assigned IP, applied both computer and user GPOs (confirmed via gpresult /r), and successfully connected to the CompanyShare folder. Every service built throughout this case study — DHCP, DNS, AD DS, GPO, file sharing — was verified to be working end-to-end from a domain-joined client.
Workstation system properties — hostname GB-WS-02-ANIK, currently in WORKGROUPipconfig — workstation received 192.168.10.50, DNS set to 192.168.10.10Ping to domain controller 192.168.10.10 — successful, network confirmedDomain join prompt — entering anik.local credentialsWelcome to the anik.local domain — domain join confirmedDHCP verification — ipconfig /all showing correct lease from Toronto scopegpupdate /force on workstation — policies refreshedgpresult /r — Default Domain Policy and TOR-UserLockdown-GPO both applied
Project Reflection
What This Built in Me
These two case studies weren't just coursework — they were a complete walkthrough of the enterprise Windows stack from both ends. On the client side, I learned how IT teams provision, harden, and manage endpoints at scale. On the server side, I built the infrastructure those endpoints connect to.
Working within hardware constraints — Apple Silicon, UTM's NAT networking — forced me to understand why configurations are done the way they are, not just how to click through wizards. Every limitation I documented taught me something a lab manual couldn't.
The skills demonstrated here aren't academic — they're the foundation of real systems administration work: AD DS, DHCP, GPO, NTFS permissions, PowerShell, Storage Spaces, provisioning packages. This is what enterprise Windows looks like before the cloud takes over — and understanding it makes every cloud migration conversation richer.
Active Directory & Identity
Forest creation, DC promotion, OU hierarchy, user/group administration, ADUC
Network Services
DHCP multi-scope design, static IP assignment, DNS configuration, forwarders