Home Lab

Screenshot 1: Simulated User Directory – Home Lab Environment
The image below showcases the list of user accounts that form the foundation of my home lab setup. These accounts are structured to reflect a realistic organizational hierarchy, including various departments, roles, and permission levels, allowing for accurate testing of policies, access controls, and IT workflows.

Screenshot 2: Domain-Joined Workstation
This screenshot demonstrates a client PC successfully joined to the Active Directory domain within my home lab environment. Domain joining allows centralized management of user accounts, group policies, and security configurations—essential for replicating enterprise IT infrastructure and administration practices.

Screenshot 3: Password Reset via Active Directory Users and Computers (ADUC)
This screenshot captures the process of resetting a user’s password through the Active Directory Users and Computers console. This functionality is essential for account recovery and user support in enterprise environments, showcasing administrative control over identity and access management within the domain.

Screenshot 4: Disabling a User in Active Directory
This screenshot shows a user account being disabled via Active Directory Users and Computers (ADUC). Disabling accounts helps manage user access during offboarding or security-related events while preserving account data.

Screenshot 5: Restricting Command Line Access via Group Policy
This screenshot shows a Group Policy setting applied to prevent standard users from accessing the Command Prompt. This helps enforce security by limiting unauthorized script execution and system-level changes.

Screenshot 6: Hosting a Website with IIS Manager
This screenshot displays a website hosted locally using Internet Information Services (IIS) Manager. IIS allows for testing and deploying web applications in a controlled environment within the home lab.

Screenshot 7: Configuring VPN for Remote Access
This screenshot shows the setup of a VPN server to enable secure remote access to the home lab network. VPN access allows for offsite management and testing of network resources as if connected locally.

Screenshot 8: Inventory Management with Spiceworks
This screenshot shows Spiceworks deployed to track hardware and software assets within the home lab. It provides centralized inventory management, helping simulate real-world IT asset monitoring and reporting.

Screenshot 9: Creating a User Account in Microsoft 365 Admin Center
This screenshot shows the creation of a new user account through the Microsoft 365 portal. It simulates cloud identity management, allowing integration with Azure AD and access to Microsoft 365 services.

Screenshot 10: Endpoint Protection – Malicious File Detection
This screenshot shows a simulated malicious folder copied to an endpoint device. It’s used to test endpoint protection response, ensuring security tools detect and block unauthorized or harmful files.

Screenshot 11: Threat Detection by McAfee Endpoint Security
This screenshot shows McAfee Endpoint Security successfully scanning the suspicious folder and identifying it as a threat. It demonstrates effective endpoint protection and real-time threat detection within the lab environment.

Screenshot 12: Malicious File Downloaded from Unsafe Website
This screenshot captures a user downloading a malicious file from a suspicious website. It’s used to simulate real-world threat scenarios and test web protection, endpoint security, and user access policies.

Screenshot 13: Configuring TrueNAS File Server
This screenshot shows the setup of a TrueNAS server for centralized file storage and sharing within the home lab. TrueNAS provides robust, scalable, and secure network-attached storage (NAS) capabilities.

Screenshot 14: Hard Drive Encryption with BitLocker
This screenshot shows a hard drive encrypted using BitLocker to secure data at rest. BitLocker helps protect sensitive information by preventing unauthorized access if the device is lost or stolen.

Screenshot 15: Ticketing System Client View Setup
This screenshot shows the client and Tech Support interface of the ticketing system configured in the home lab. It enables users to submit and track support requests, simulating real-world IT service management workflows.