You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Home lab Active Directory environment with automated provisioning, security monitoring, and SOC detection scenarios. Built to simulate a small enterprise domain for practising IT support, systems administration, and security operations.
Hands-on detection scenarios with attack simulations and SOC playbooks. Each scenario includes a simulation script to generate realistic telemetry and a playbook walking through the full detect, investigate, and respond workflow.
Insider threat with unauthorized group changes and backdoor accounts, full kill chain investigation
Quick Start
Prerequisites
Windows Server 2022 (evaluation ISO works)
Hypervisor: VirtualBox, Hyper-V, or VMware
At least 8 GB RAM for DC + 1 workstation
Step 1: Promote Domain Controller
# Run as Administrator on Windows Server
.\scripts\01-Install-ADForest.ps1# Server will reboot automatically
Step 2: Build OU Structure and Provision Users
# After reboot, run in order:
.\scripts\02-Create-OUStructure.ps1
.\scripts\03-Create-Users.ps1
.\scripts\04-Create-SecurityGroups.ps1
.\scripts\05-Configure-GPOs.ps1
.\scripts\06-Configure-DHCP.ps1
.\scripts\07-Create-ServiceAccounts.ps1
Step 3: Deploy Security Monitoring
# Deploy Sysmon (requires Sysmon64.exe — see script for download instructions)
.\scripts\08-Deploy-Sysmon.ps1# Configure Windows Event Forwarding (centralise logs on DC01)
.\scripts\09-Configure-WEF.ps1
# Simulate a brute force attack and investigate
.\scenarios\01-brute-force\Simulate-BruteForce.ps1
.\scripts\soc-queries\Get-FailedLogons.ps1-Hours 1# Simulate privilege escalation and investigate
.\scenarios\02-privilege-escalation\Simulate-PrivilegeEscalation.ps1
.\scripts\soc-queries\Get-PrivilegeEscalation.ps1-Hours 1
Repository Structure
AD-Lab-Setup/
├── scripts/
│ ├── 01-Install-ADForest.ps1 # Promote server to DC and create forest
│ ├── 02-Create-OUStructure.ps1 # Build OU hierarchy
│ ├── 03-Create-Users.ps1 # Bulk user provisioning from CSV
│ ├── 04-Create-SecurityGroups.ps1 # Security groups and membership
│ ├── 05-Configure-GPOs.ps1 # Group Policy (password, audit, USB, updates)
│ ├── 06-Configure-DHCP.ps1 # DHCP scope and options (3 VLANs)
│ ├── 07-Create-ServiceAccounts.ps1 # Service account provisioning
│ ├── 08-Deploy-Sysmon.ps1 # Sysmon deployment and config updates
│ ├── 09-Configure-WEF.ps1 # Windows Event Forwarding setup
│ ├── soc-queries/
│ │ ├── Get-FailedLogons.ps1 # Detect brute-force attempts (T1110)
│ │ ├── Get-AccountLockouts.ps1 # Track lockouts with source correlation
│ │ ├── Get-PrivilegeEscalation.ps1 # Monitor privilege and group changes (T1078/T1098)
│ │ └── Get-SuspiciousProcesses.ps1 # Flag suspicious process patterns (T1059/T1218)
│ └── users.csv # Sample user data (no passwords)
├── sysmon/
│ └── sysmon-config.xml # SOC-tuned Sysmon config (ATT&CK-mapped)
├── scenarios/
│ ├── 01-brute-force/
│ │ ├── Simulate-BruteForce.ps1 # Attack simulation (brute force + password spray)
│ │ └── PLAYBOOK.md # SOC detection and response playbook
│ └── 02-privilege-escalation/
│ ├── Simulate-PrivilegeEscalation.ps1 # Insider threat simulation
│ └── PLAYBOOK.md # SOC investigation playbook (full kill chain)
├── diagrams/
│ └── architecture.png # Architecture diagram
├── docs/
│ ├── 01-DC-Setup.md # Domain Controller build guide
│ ├── 02-Workstation-Join.md # Domain join procedure
│ └── 03-Troubleshooting.md # Common issues and fixes
└── README.md