Active Directory is an important tool in SOC. It is used to manage user accounts, groups, and permissions across the entire network. It plays an important role in the Principle of Least Privilege and in Identity and Access Management. Active Directory logs every password change, login attempt, and access change. It can also create Group Policy Objects to enforce security settings. Lastly, Active Directory logs can be forwarded to SIEMs.

First, we downloaded Windows Server 2022 ISO file.
Windows Server 2022 | Microsoft Evaluation Center
After downloading the .iso file I created a new machine with the file.

Make sure when you create the VM that you select Windows Server 2022 Standard Evaluation (Desktop Experience). I originally selected the other option and there was no GUI.

After creating it, I established one adapter attached to the Internal Network and named it Green.

After starting the machine, the Microsoft Server OS begins to install.

After instillation I was automatically logged in and Server Manager automatically opened.

Go to Network and Internet Settings.

Click on Ethernet, then Ethernet Properties, then IPV 4 Properties.


We want our Windows Server 2022 IPV4 IP address to be in the same range as the pfSense LAN (192.168.1.1/24). We want the Default Gateway to match the IP for pfSense LAN, The DNS server address can also be the same.

Afterwards we restart the VM.

After restart, we click “Add roles and features”.




Follow all of the above steps to successfully install Active Directory.

Next, we click “Promote this server to a domain controller”.

Then we “Add a new forest” and name the Root domain name.

Leave these settings on default and assign a DSRM password. Just leave the DNS Options as is. Click “Next”.

Click “Next” for the rest of the settings and then install it.

It automatically restarted.

Next, we will install BadBlood, which will populate Active Directory with fake users, groups, and permissions. This will be a good way to simulate a real SOC environment and practice.
I had some issues connecting my Windows Server 2022 VM to the internet and installing Git so that I could install BadBlood. So I spent some time troubleshooting. Then I found the issue…




The issue was that my pfSense adapter 1 was NAT and adapter 2 was Internal Network (Green), but on Windows Server it was reversed, so adapter 1 was Internal Network (Green) and adapter 2 was NAT. Each adapter should match, like displayed above. The internet is now working. Another point is that pfSense must be open in order for the Windows Server 2022 VM to have internet access.


First, I had to install Git so that I could install the BadBlood package.

After installing Git, I entered this command to install the BadBlood package.




The BadBlood installation finished and now Active Directory has 2500 users, 500 groups, OU, 100 computers, etc. This will allow us to simulate a real SOC environment. For the next addition to our SOC lab, we will set up Windows Workstation.