I wanted to have a quick and easy and disposable Windows Active Directory lab environment to use for testing of 802.1x authentication setups. With virtual machines and an eval VHD from Microsoft this is pretty easily done. See my post on how to use VMware Workstation Pro and linked clones to save storage space and deploy multiple machines from the same base setup.
Items Needed
Steps
- Install VMware Workstation Pro or whatever VM environment of choice
- Setup the Windows Server 2012 R2 virtual machine but do not power it on
- I highly recommend working from a copy of the original file rather than the original, doing so will save you from downloading the thing again down the road
- Make a snapshot (Initial) of the Virtual Machine prior to power on
- Power on the virtual machine, allow Windows to get itself ready and then install VMware Tools (or tool of choice equivalent)
- Copy lab setup scripts into the virtual machine (C:\Temp or somesuch)
- Power off the virtual machine and make a snapshot (Pre-AD Setup)
- Power on the virtual machine and login
- Open PowerShell and set execution rights to allow the scripts to run
-
Set-ExecutionPolicy RemoteSigned
-
- Run 1-AddAdPrereqs.ps1 and wait for reboot
- After auto-logon and PowerShell console opens run 2-AddAdFeatures.ps1
- Look at the log and make sure everything installed that needed installing
- Run 3-InstallNewForest.ps1, when the reboot is finished you now have a brand new Windows Active Directory environment to play around with
- Run 4-AddOtherItems.ps1 for additional server configuration
Scripts Used
There are four scripts used to prep and then install the Active Directory services on the Windows Server 2012 R2 Virtual Machine. These scripts are based on the works from over here with some additional items on setting Windows Auto-Logon and DHCP server setup.
1-AddAdPrereqs.ps1
Make sure to set the IP addressing appropriately for your virtual machine environment. For the auto-logon to work you’ll need to change the username and password to whatever you set when Windows Server first powered on.
#1-AddAdPrereqs.ps1
#set static IP address
$ipaddress = '192.168.128.11'
$ipprefix = '24'
$ipgw = '192.168.128.2'
$ipdns = '192.168.128.11'
$ipif = (Get-NetAdapter).ifIndex
New-NetIPAddress -IPAddress $ipaddress -PrefixLength $ipprefix
-InterfaceIndex $ipif -DefaultGateway $ipgw
Set-DnsClientServerAddress -InterfaceIndex $ipif -ServerAddresses $ipdns
#rename the computer
$newname = 'dc01'
Rename-Computer -NewName $newname -force
#install features
$LogPath = 'c:\poshlog\'
$LogFile = 'featurelog.txt'
$LogFullPath = $LogPath + $LogFile
If (!(Test-Path $LogPath)) {New-Item $LogPath -type directory}
New-Item $LogFullPath -ItemType file -Force
ipconfig /all >>$LogFullPath
Get-WindowsFeature | Where installed >>$LogFullPath
# =====================
#
# Set automatic login for next boot
#Registry path declaration
$RegPath = 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon'
$RegROPath = 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce'
$DefaultUsername = 'Administrator'
$DefaultPassword = 'XXXXXXXX'
$AutoLogonCount = 1
$ScriptKey = 'PowerShell'
$Script = 'c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe -nologo -noexit -command "& {cd c:\temp}"'
#setting registry values
Set-ItemProperty $RegPath 'AutoAdminLogon' -Value 1 -type String
Set-ItemProperty $RegPath 'DefaultUsername' -Value $DefaultUsername -type String
Set-ItemProperty $RegPath 'DefaultPassword' -Value $DefaultPassword -type String
Set-ItemProperty $RegPath 'AutoLogonCount' -Value $AutoLogonCount -type DWord
If (!(Test-Path $RegROPath)) {New-Item -Path $RegROPath}
Set-ItemProperty $RegROPath $ScriptKey -Value $Script -type String
#======================
#
#restart the computer
Restart-Computer
2-AddAdFeatures.ps1
Installs some of the basic items necessary for AD to be provisioned. Yes, this could be made into one script with 3-InstallNewForest.ps1 but the source author had it as two so I left it that way.
#2-AddAdFeatures.ps1 #Install AD DS, DNS and GPMC $LogPath = 'c:\poshlog\' $LogFile = 'featurelog.txt' $LogFullPath = $LogPath + $LogFile If (!(Test-Path $LogPath)) {New-Item $LogPath -type directory} If (!(Test-Path $LogFullPath)) {New-Item $LogFullPath -type file} start-job -Name addFeature -ScriptBlock { Add-WindowsFeature -Name 'RSAT-AD-Tools' Add-WindowsFeature -Name 'ad-domain-services -IncludeAllSubFeature -IncludeManagementTools Add-WindowsFeature -Name 'dns' -IncludeAllSubFeature -IncludeManagementTools Add-WindowsFeature -Name 'gpmc' -IncludeAllSubFeature -IncludeManagementTools } Wait-Job -Name addFeature Get-WindowsFeature | Where installed >>$LogFullPath
3-InstallNewForest.ps1
Create the new AD Forest and Domain.
#3-InstallNewForest.ps1 # Create New Forest, add Domain Controller $domainname = 'network.lab' $netbiosName = 'NETWORK' $pwd = ConvertTo-SecureString 'XXXXXXXX' -AsPlaintext -Force Import-Module ADDSDeployment Install-ADDSForest -CreateDnsDelegation:$false-DatabasePath 'C:\Windows\NTDS' -DomainMode Win2012 -DomainName $domainname
-DomainNetbiosName $netbiosName -ForestMode Win2012-SafeModeAdministratorPassword $pwd -InstallDns:$true
-LogPath 'C:\Windows\NTDS' -NoRebootOnCompletion:$false ` -SysvolPath 'C:\Windows\SYSVOL' -Force:$true
4-AddOtherItems.ps1
- Sets up DHCP server for local network
- Enables Remote Desktop
#4-AddOtherItems.ps1 # #Add Features and Roles start-job -Name addFeature -ScriptBlock { Add-WindowsFeature -Name "dhcp" -IncludeManagementTools } Wait-Job -Name addFeature Get-WindowsFeature | Where installed >>$LogFullPath # ===================== # Configure DHCP Server # # DHCP Scope Information $ScopeName = 'Lab' $ScopeID = '192.168.128.0' $ScopeStartRange = '192.168.128.1' $ScopeEndRange = '192.168.128.254' $ScopeSubnetMask = '255.255.255.0' # # DHCP Scope Exclusion $ScopeExStartRange = '192.168.128.1' $ScopeExEndRange = '192.168.128.20' # # DHCP Scope Options $ScopeDNS = '192.168.128.11' $ScopeDomain = 'network.lab' $ScopeGateway = '192.168.128.2' # # Add security groups to local DHCP server Add-DhcpServerSecurityGroup Restart-Service dhcpserver # Register DHCP in AD Add-DhcpServerInDC # Tell Server Manager that configuration is complete Set-ItemProperty –Path registry::HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ServerManager\Roles\12 –Name ConfigurationState –Value 2 # Create DHCP scope with applicable options/settings Add-DhcpServerv4Scope -Name $ScopeName -StartRange $ScopeStartRange -EndRange $ScopeEndRange -SubnetMask $ScopeSubnetMask Add-Dhcpserverv4ExclusionRange -ScopeId $ScopeID -StartRange $ScopeExStartRange -EndRange $ScopeExEndRange Set-DhcpServerv4OptionValue -ScopeId $ScopeID -DnsServer $ScopeDNS -DnsDomain $ScopeDomain -Router $ScopeGateway # ===================== # # Enable Remote Desktop Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name 'fDenyTSConnections' -Value 0 Enable-NetFirewallRule -DisplayGroup 'Remote Desktop' Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -Name 'UserAuthentication' -Value 1