In this Lab, you will learn how to configure Active Directory on Windows Server 2022 on Virtual Box
In this tutorial we walk through the complete installation and configuration of Active Directory Domain Services (AD DS) on Windows Server 2022 running inside a VirtualBox virtual machine. This is part of the General Tutorial Series — a broad-scope series covering everything from server administration and OS configuration to networking and software setup across multiple platforms.
By the end of this tutorial you will have promoted a standalone server to a Domain Controller, configured DNS, created Organisational Units, user accounts and security groups, joined a Windows 11 client to the domain, and applied your first Group Policy Object — all running safely in an isolated virtual environment.
DC01) running Windows Server 2022, and one for the client machine (Client-Win11) running Windows 11. Configure both VMs with a NAT adapter for internet access and a Host-Only Network adapter for the isolated internal lab network.DC01 and perform a clean installation. Select Windows Server 2022 Standard (Desktop Experience) to get the full GUI. After installation, rename the server to DC01 and assign a static IP of 192.168.180.1 on the internal adapter with DNS set to 127.0.0.1. Default Gateway can be left blank.Install-WindowsFeature AD-Domain-Services -IncludeManagementTools. This installs the required binaries and management tools without yet creating the domain.lab.local. Set Forest and Domain functional levels to Windows Server 2016, configure the DSRM password, and proceed through the wizard. The server will configure AD DS and reboot automatically.lab.local forward lookup zone was created with _msdcs, _tcp, and _udp SRV subfolders. Confirm the reverse lookup zone for 192.168.180.0/24 is present. Run Resolve-DnsName lab.local and nltest /dsgetdc:lab.local in PowerShell to verify.lab.local: IT, HR, and Lab Computers. Create user accounts — jadmin (John Admin) in IT and smiller (Sarah Miller) in HR. Create a Global Security Group called IT-Admins in the IT OU and add jadmin as a member.Client-Win11, assign a static IP of 192.168.180.101 and set DNS to 192.168.180.1 so it can resolve lab.local. Join via System → Rename this PC (advanced) → Domain: lab.local using LAB\Administrator credentials. After reboot, log in as LAB\jadmin to confirm domain authentication is working.HR-Restrictions linked to the HR OU. Navigate to User Configuration → Policies → Administrative Templates → Control Panel and enable Prohibit access to Control Panel and PC settings. Run gpupdate /force on the client and verify LAB\smiller is blocked from Control Panel while LAB\jadmin retains full access.General Tutorial Series (GTS) — This tutorial is part of a broad-scope series covering a wide range of IT topics including server administration, operating systems, networking, and software configuration across multiple platforms. Future episodes will cover Linux administration, additional Windows Server roles, networking fundamentals, and software-specific deep dives.
All steps are demonstrated in an isolated VirtualBox environment. Not intended for production use.
Discussion