Skip to content

raj-leroy/enterprise-security-lab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Enterprise Security Lab: Active Directory Attack & Detection

This project simulates a small enterprise Windows domain to demonstrate hands-on skills in identity management, authentication monitoring, and security event correlation. A Windows Server domain controller and Windows 11 client were deployed to generate, collect, and analyze real Active Directory security events.

The lab focuses on detecting account creation, privilege escalation, and authentication activity using native Windows logging. Events were correlated into a forensic timeline and mapped to the MITRE ATT&CK framework to demonstrate adversary technique awareness.

Key Outcomes

Built and secured an Active Directory domain environment

Generated real authentication and group-management security events

Collected and preserved evidence from domain controller and client

Correlated logs into a forensic timeline

Mapped activity to MITRE ATT&CK (T1136.002 – Local Account Creation)

Documented findings in a repeatable, enterprise-style workflow

Skills Demonstrated

Active Directory administration

Windows Security Event Logging

Incident detection and log analysis

Forensic evidence handling

MITRE ATT&CK mapping

PowerShell for security operations

Enterprise documentation and reporting

About

Enterprise Active Directory security lab focused on privileged access hardening, audit policy configuration, detection engineering, and incident response. Simulates unauthorized privilege escalation attacks with forensic log analysis and MITRE ATT&CK mapping.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors