From Installation to Domain Controller: Remarkable Windows Server 2022 Home Lab Setup

Table of Contents

  • Introduction
  • Active Directory Basics
  • Getting Started with Add Roles and Features
    1. Before You Begin
    2. Installation Type
    3. Select Destination Server
    4. Select Server Roles
    5. Select Features
    6. Active Directory Domain Services (AD DS)
    7. Remote Access
    8. Remote Access Role Services
    9. DNS Server
    10. Web Server (IIS)
    11. Web Server Role Services
    12. Confirmation
    13. Installation Progress
    14. Promote This Server to a Domain Controller
  • Active Directory Domain Services Configuration Wizard
    1. Select Forest and Domain Functional Levels
    2. DNS Options
    3. Additional Options – NetBIOS Domain Name
    4. Database, Log, and SYSVOL Paths
    5. Review Options
    6. Prerequisites Check
    7. Installation
    8. Restart and Sign In
  • Working with Active Directory Users and Computers
    1. How to Open ADUC
    2. Creating an Organizational Unit (OU)
    3. What is an OU?
    4. Creating Groups in Organizational Units (OUs)
    5. What is a Group?
    6. Group Scope Options
    7. Group Types
    8. Example in Our Lab
    9. Creating a New User in Active Directory
    10. How to Create a New User
    11. Logging In with the New User
    12. Conclusion

    Introduction

    In our last blog, we successfully set up Windows Server 2022 on a virtual machine, fixed common installation issues, and logged in for the very first time. That was our starting point—getting the server up and running in a home lab environment.

    Now, it’s time to take the next step and transform our fresh installation into a fully functional server. In today’s journey, we’ll explore the “Add Roles and Features” wizard in Windows Server 2022. This is where we assign the server specific responsibilities, such as acting as a DNS server, managing users and computers through Active Directory Domain Services (AD DS), enabling Remote Access, and controlling settings across the network with Group Policy Management.

    By the end of this guide, you’ll have a clearer understanding of what roles and features are, why they’re important, and how to install the key ones needed for building your own domain environment in a home lab.

     Download Windows Server 2022

    What is Active Directory?

    Before we start adding roles and features, it’s important to understand the backbone of many Windows Server environments—Active Directory.

    Think of Active Directory (AD) as the control center of your network. It’s where all the important information about users, computers, and resources is stored and managed. Instead of setting up every single computer one by one, AD allows you to manage everything centrally.

    For example:

    • You can create user accounts so everyone logs in with their own ID and password.

    • You can join multiple computers to the same domain, so they all follow the same rules.

    • You can apply policies (like password strength or desktop restrictions) across every system in your lab.

    In short, Active Directory saves time, keeps things organized, and makes managing many devices much easier—even if you’re just practicing in a home lab.

  • Getting Started with Add Roles and Features

    Once your Windows Server 2022 is set up and running, the first screen you’ll usually see is the Server Manager Dashboard. This is the main control panel where you manage your server.

    To begin adding roles and features:

    1. Look at the top-right corner of the dashboard.

    2. Click on Manage.

    3. From the drop-down menu, select Add Roles and Features.

    This will launch the setup wizard, which guides you step by step in choosing what roles and features to install on your server.

    Getting Started With Roles and Features

    After clicking Add Roles and Features, the setup wizard will open. This wizard guides you through the process of installing new server roles and features. Let’s walk through it step by step.

    1. Before You Begin

    The first page is just an introduction. Nothing to change here—simply click Next.

    Before you Begin Widget Screen

    2. Installation Type

    On the next window, you’ll be asked to choose the installation type. You’ll see two options:

    • Role-based or feature-based installation

    • Remote Desktop Services installation

    Installation Type widget screen

    What do these mean?

    • Role-based or feature-based installation
      This is the standard option and the one we need. It lets you add roles like DNS, Active Directory Domain Services, and features like Group Policy Management directly to your server.

    • Remote Desktop Services installation
      This option is used when you want your server to provide virtual desktops or apps to multiple users (like a remote work setup where people log in and get a Windows desktop streamed from the server). It’s more advanced and not needed for building a simple home lab.

    👉 That’s why we choose Role-based or feature-based installation and click Next.

    3. Select Destination Server

    On the next screen, the wizard asks you to select the destination server—in other words, decide which server you want to install the roles and features on.

    You’ll see two options here:

    1. Select a server from the server pool

      • This option shows you a list of servers that are part of your network or lab (in our case, the Windows Server we just set up).

      • Since we are working on our own server VM, we’ll choose this option.

    2. Select a virtual hard disk

      • This allows you to mount a virtual hard disk (VHD) and install roles/features onto it, even if it’s not currently attached to a running server.

      • This is useful in large environments where admins prepare disks separately, but for a home lab it’s unnecessary.

    👉 We will select Option 1 (Server from the server pool).
    Below this, you’ll see your server listed under the Server Pool. Simply select it and click Next.

    Select Destination Server widget window click server pool

    4. Select Server Roles

    Now the wizard asks you to choose which server roles you want to install. This is the exciting part—this is where we decide what jobs our server will take on.

    1. Active Directory Domain Services (AD DS)

      • This is the brain of our server setup. AD DS allows us to create a domain, manage users, and control computers from one central place.

      • When you check this option, a pop-up will appear asking you to add features required for Active Directory Domain Services.

      • Leave everything at the default and click Add Features.

    Click on Active Directory Domain Services


    1. DNS Server

      • DNS is like a phonebook for the network—it translates names (like veildefender.local) into IP addresses.

      • AD DS depends on DNS to work properly, which is why we add this role alongside it.

      • If another window opens asking to add features, leave defaults and click Add Features.

    1. Remote Access

      • This role allows us to set up secure connections, such as VPN or routing, so we can access our lab network remotely.

      • For a lab setup, it’s useful to practice and understand how remote connectivity works.

      • Again, if the wizard asks for additional features, simply accept defaults and click Add Features.

    Check the options DNS server and Remote Access Server

    👉 By the end of this step, we will have selected three key roles:

    • Active Directory Domain Services

    • DNS Server

    • Remote Access

    Then, click Next to continue.

    5. Select Features

    On this screen, you’ll see a long list of optional features. Some are already selected by default (because they’re required by the roles we chose earlier).

    👉 For our home lab, the only additional feature we need to select is Group Policy Management.

    • Why Group Policy Management?
      Because it allows us to easily create and manage rules (policies) for all the computers and users in our domain. For example, you could enforce password rules, block certain apps, or set default wallpapers. For a home lab, this single feature is more than enough to practice and understand centralized management.

    ⚠️ Important: Don’t uncheck the features that are already selected by default. They are automatically required for the roles we picked earlier.

    Click Next to continue.

    Select Features Widget Window

    6. Active Directory Domain Services (AD DS)

    The next screen introduces AD DS. Here you’ll get a short explanation about what Active Directory is and why it’s needed.

    No action is required here—just review the information and click Next.

    Active Directory Domain Services Widget Screen

    7. Remote Access

    Now you’ll see an introduction screen for Remote Access. This role allows the server to provide secure connections like VPN and routing.

    Again, this is just an informational screen—read through it and click Next.

    Remote Access Widget Window

    8. Remote Access Role Services

    Here, the wizard asks you to select which role services you want to install under Remote Access.

    • ✅ Check Routing

    • The option DirectAccess and VPN (RAS) will be auto-selected when you choose Routing. Leave it as it is.

    👉 Why Routing?
    Routing allows internal traffic from your domain to flow properly. It handles things like NAT (Network Address Translation), which makes it possible for computers in your AD DS environment to communicate with each other and with outside networks.

    Click Next to continue.

    Select Role Services for Remote Access Server

    9. DNS Server

    Now the wizard shows the introduction to the DNS Server role. DNS is essential for Active Directory—it translates names (like veildefender.local) into IP addresses so everything can find each other on the network.

    Read through the intro and click Next.

    DNS server widget screen

    10. Web Server (IIS)

    The wizard also shows a screen for Web Server (IIS). This isn’t our main focus right now, but it is sometimes included because certain services rely on it.

    No changes are needed here—just click Next.

    Web Server Role (IIS) widget screen

    11. Web Server Role Services

    Here you’ll see a list of role services under IIS. Some are already selected by default.

    👉 Do not uncheck anything—just go with the default selections and click Next.

    Select the Role Services to install for web server
    Select the Role Services to install for web server

    12. Confirmation

    Finally, the wizard shows you a Confirmation screen with all the roles and features you selected.

    Click Install to begin the installation.

    Confirm Installation Selection Widget Screen
    Confirm Installation Selection Widget Screen

    13. Installation Progress

    The installation will now start. You’ll see a progress bar as Windows Server adds the roles and features.

    ⚠️ Important: Do not close this window until the installation is complete.

    Once finished, you’ll see a success message confirming that the roles and features have been installed.

    Installation Progress Widget Screen
    Installation Progress Widget Screen

    14. Promote This Server to a Domain Controller

    Once the installation is complete, you’ll notice a yellow warning flag at the top of the Server Manager Dashboard. It includes an option that says:
    “Promote this server to a domain controller.” 

    What does that mean?
    A Domain Controller (DC) is the heart of an Active Directory environment. It’s the server that stores all the user accounts, enforces security policies, and authenticates logins across the network. Without promoting your server to a domain controller, Active Directory Domain Services (AD DS) won’t actually start working.

    Click on Promote this server to a domain controller to begin the configuration.

    Promote this Server to a domain controller
    Promote this Server to a domain controller

    Active Directory Domain Services Configuration Wizard

    This will open the AD DS Configuration Wizard. On the first screen, you’ll see Deployment Configuration with three options:

    1. Add a domain controller to an existing domain

      Use this if you already have a domain (like company.local) and want this server to act as an additional domain controller for redundancy.

    2. Add a new domain to an existing forest

      Use this if you already have a forest (a collection of domains) and want to add a separate child domain under it. For example, if you have company.local, you could add branch.company.local.

    3. Add a new forest ✅

      This is the option we’ll select because we are starting fresh in our home lab with no existing domain. A forest is the top-level structure in Active Directory, and creating a new one means we’re building our own domain environment from scratch.

    Select Add a new forest.

    Next, you’ll be asked to provide a Root Domain Name. This is the main name of your domain. You can use anything you like, such as:

    • domain.local
    • domain.com
    • or something custom for your lab

    For this lab, I’ll use: veildefender.local

    Active Directory Domain Services Configuration Wizard
    Active Directory Domain Services Configuration Wizard

    2. Select Forest and Domain Functional Levels

    On this screen, you need to choose the functional level for the new forest and root domain.

    • Forest Functional Level: This defines what features will be available across the entire forest.

    • Domain Functional Level: This defines what features will be available for your specific domain.

    For a new lab setup, you can simply leave these at their defaults (Windows Server 2016 or 2019/2022 depending on your version). These defaults allow the latest Active Directory features while still maintaining backward compatibility with slightly older systems.

    Below that, you’ll be asked to type a Directory Services Restore Mode (DSRM) password.

    • This password is used if you ever need to boot the domain controller into recovery mode.

    • Enter and confirm a secure password, then continue.

    Select Forest and Domain Functional Levels
    Select Forest and Domain Functional Levels

    3. DNS Options

    On the next screen, you may see a warning about DNS Delegation.

    • What is DNS Delegation?
      DNS Delegation is when responsibility for a part of a domain namespace is handed off to another DNS server. For example, delegating branch.domain.local to a different DNS server.

    • Why the warning?
      Since we are creating a brand-new domain (veildefender.local), there’s no existing “parent” DNS zone. That’s why the wizard says:
      “A delegation for this DNS server cannot be created because the authoritative parent zone cannot be found.”

    This is expected in a new lab environment. Simply click Next.

    DNS Options
    DNS Options

    4. Additional Options – NetBIOS Domain Name

    The wizard now assigns a NetBIOS name for your domain.

    • What is a NetBIOS Domain Name?
      This is the short, legacy-friendly name used by older Windows systems. For example, if your domain is veildefender.local, the wizard might assign VEILDEFENDER as the NetBIOS name.

    You can leave this as the default or change it if you prefer a shorter name. For our lab, we’ll keep the default.

    Additional Options – NetBIOS Domain Name
    Additional Options – NetBIOS Domain Name

    5. Paths

    Here, you’ll see three folder locations:

    • Database Folder → Where the Active Directory database (NTDS.dit) is stored.

    • Log Files Folder → Where Active Directory keeps its transaction logs.

    • SYSVOL Folder → A shared folder that stores policies and scripts which are replicated across all domain controllers.

    For a home lab, it’s fine to leave these at their default paths.

    AD - DS configuration wizard Screen
    AD – DS configuration wizard Walk Through

    6. Review Options

    This screen simply shows a summary of all the settings you chose. Review them to confirm everything looks correct, then click Next.

    Review Option Widget Screen of AD - DS
    Review Option Widget Screen of AD – DS

    7. Prerequisites Check

    The wizard now runs a prerequisites check. If all checks are passed successfully, you’ll be able to click Install.

    Prerequisites Check - AD Domain Services
    Prerequisites Check – Active Directory Domain Services

    8. Installation

    The installation will now begin. You’ll see progress as Active Directory Domain Services and DNS are configured.

    ⚠️ Don’t close the window during this process.

    Active Directory Domain Services Configuration wizard installation Setup
    Active Directory Domain Services Configuration wizard installation Setup

    Once installation completes, you’ll see a message:
    “You are about to be signed out.”

    Click Close.

    You are About to Sign Out
    Window Server Configuration Done

    9. Restart and Sign In

    Your server will restart to apply the changes.

    Applying all setting that we done till now
    Applying all setting that we done till now

    After reboot, you’ll notice the login screen now shows:

    VEILDEFENDER\Administrator

    This means your server is officially part of the new domain, and you can log in using the domain Administrator account.

    Window Server 2022
    Window Server Login Screen

    Working with Active Directory Users and Computers

    Now that our Windows Server is fully set up and promoted to a Domain Controller, we can finally start using one of the most important tools: Active Directory Users and Computers (ADUC).

    This is where you’ll manage everything—users, groups, and organizational units (OUs)—inside your domain.

Active Directory User and Computers

How to Open ADUC

  1. Click on the Windows Start icon.

  2. Search for Active Directory Users and Computers.

  3. Open it, and you’ll see two main sections on the left:

    • Saved Queries (used for advanced searches)

    • veildefenders.local (this is our domain)

Active Directory User and Computer Dashboard

Creating an Organizational Unit (OU)

  1. Expand veildefenders.local.

  2. Right-click on veildefenders.local.

  3. Go to New → Organizational Unit.

Creating an Organizational Unit on Window Server

What is an OU?

An Organizational Unit (OU) is like a folder inside your domain. It helps you organize and manage objects such as users, groups, and computers.

For example:

  • You can create an OU called Students and another called Teachers.

  • Inside each OU, you place the relevant user accounts.

  • Later, you can apply Group Policies to an OU (like password rules or desktop restrictions), and those settings will only affect the users or computers inside that OU.

Think of an OU as a way to structure your network like departments in an organization—clean, organized, and easy to manage.

Creating Groups in Organizational Units (OUs)

Now that we’ve created our OUs (like Multan, Islamabad, Users, Computers etc.), the next step is to create Groups inside each OU. Groups help us manage users more efficiently.

What is a Group?

A Group in Active Directory is a collection of users, computers, or even other groups. Instead of assigning permissions to each user one by one, you assign them to a group—and every member of that group automatically gets those permissions.

Example: Instead of giving 10 IT staff access to a shared folder individually, you just put them in an IT Group and give permissions once.

Create Groups on Window Server

Group Scope Options

When creating a group, you’ll see three Group Scope options:

  1. Domain Local

    • Used to assign permissions within the same domain only.

    • Best for resources like shared printers or folders limited to one domain.

  2. Global

    • Used to group users within the same domain and can be assigned permissions across domains.

    • Most common choice for departmental groups (like IT, HR, Sales).

    • We select Global here because we’re creating groups for OUs in our single-domain lab.

  3. Universal

    • Used in multi-domain environments.

    • Can contain users and groups from multiple domains in the forest.

    • Not needed for our simple home lab setup.

Group Types

You’ll also see two Group Types:

  1. Security Groups

    • Used to assign permissions (e.g., file access, system rights, printer access).

    • Example: An IT Security Group can be given admin rights to manage systems.

    • We’ll use this for our IT group, since it needs security permissions.

  2. Distribution Groups

    • Used only for email distribution lists (cannot assign permissions).

    • Example: A DL-ITAdmin group could be used to send one email to all IT admins at once.

    • We’ll use this for communication purposes only.

Example in Our Lab

  • Security Group: IT → Used to manage permissions for IT staff.

  • Distribution Group: DL-ITAdmin → Used to send emails or announcements to IT staff.

 This way, we keep our environment structured:

  • OUs organize users.

  • Groups manage permissions and communication.

IT security Group on Window Server
IT security Group on Window Server
DL-IT admin group on window server
DL-ITAdmin → Used to send emails or announcements to IT staff.

Creating a New User in Active Directory

Now that we have our OUs and Groups ready, the next step is to create users and place them inside the right OU.

How to Create a New User

  1. Open Active Directory Users and Computers (ADUC).

  2. Expand your domain (e.g., veildefenders.local).

  3. Right-click on the OU where you want the user (for example, User, Computers).

  4. Select New → User.

Create New User on Window Server

Fill in the details:

  • First Name / Last Name

  • User Logon Name (username) → e.g., shehroz

New User on Window Server

Set a password. You’ll see options like:

  • User must change password at next logon

  • Password never expires

  • Account is disabled

  • For lab testing, you can check Password never expires.

  • but for that i go with option 1

Set Password for New User on Server

Now your new user account is created in Active Directory.

Logging In with the New User

  1. Log out of your Windows Server 2022 session.

  2. On the login screen, click Other User.

  3. Type the username and password you just created.

    • Example:

      • Username: VEILDEFENDERS\shehrozkhan

      • Password: (the one you set during user creation)

  4. If everything is configured correctly, the server will accept the login and load the desktop for that new user.

Conclusion

In this journey, we took a plain installation of Windows Server 2022 and step by step transformed it into a fully functional domain controller for our home lab. Along the way, we:

  • Installed essential roles and features such as Active Directory Domain Services (AD DS), DNS, Remote Access, and Group Policy Management.

  • Promoted the server to a Domain Controller and created our own domain (veildefenders.local).

  • Explored key concepts like forests, domains, OUs, groups, and users.

  • Organized our environment with Organizational Units (OUs), built Security and Distribution Groups, and finally created a user account to log in and test our setup.

By completing these steps, you now have a solid Active Directory environment in your home lab. This foundation will allow you to practice real-world IT administration tasks—like applying group policies, managing permissions, and simulating organizational structures—without risking a production system.

This is just the beginning. From here, we can dive deeper into:

  • Group Policy Management for applying security and desktop settings.

  • File and Printer Sharing with access control.

  • Advanced DNS and DHCP configurations.

  • Remote access and VPN setup for connecting securely.

Your home lab is now ready to grow with you as you continue learning system administration and cybersecurity.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *