This project simulates an enterprise Windows security environment designed for centralized monitoring, endpoint visibility, and attack detection.
The lab combines Active Directory, endpoint telemetry, and SIEM monitoring to demonstrate how security events can be collected, analyzed, and investigated in a controlled domain environment.
The objective is to build a practical security monitoring environment aligned with enterprise security operations and selected ISO/IEC 27001 security controls.
- Active Directory Domain Services
- Windows Server
- Sysmon
- Splunk Enterprise
- Splunk Universal Forwarder
- Kali Linux
Kali Linux
↓
Windows Workstations (GICHINGA / MWAURA)
↓
Sysmon + Windows Event Logs
↓
Splunk Universal Forwarder
↓
Splunk Enterprise on MAXWELL
- MAXWELL
- GICHINGA
- MWAURA
- Kali Linux
corp.local
Includes:
- Domain creation
- Organizational Unit design
- Group Policy enforcement
- Domain joining
Documentation:
lab_setup/active_directory_setup.md
Includes:
- Endpoint telemetry collection
- Process monitoring
- Network event logging
- Registry visibility
Documentation:
lab_setup/sysmon_installation.md
Includes:
- Centralized log ingestion
- Index creation
- Search validation
Documentation:
lab_setup/splunk_installation.md
Includes:
- Windows event forwarding
- Sysmon log forwarding
- Endpoint log centralization
Documentation:
lab_setup/forwarder_configuration.md
Custom Splunk detections were created for common attack patterns.
detection_queries/failed_logins.spl
Detects:
- brute-force attempts
- password spraying
detection_queries/powershell_detection.spl
Detects:
- suspicious PowerShell execution
- encoded command usage
detection_queries/lateral_movement.spl
Detects:
- remote network logons
- administrative pivoting
Controlled attack simulations were performed from Kali Linux to validate detection coverage.
Documentation:
reports/incident_simulation.md
Simulated scenarios:
- failed authentication attempts
- PowerShell execution
- remote logon activity
This lab demonstrates:
- endpoint visibility
- centralized detection
- event investigation workflow
- enterprise monitoring fundamentals
The environment supports selected security control areas:
- centralized authentication
- domain policy enforcement
- event collection
- SIEM ingestion
- detection validation
- incident visibility
Enterprise-AD-Security-Lab/
├── README.md
├── lab_setup/
│ ├── active_directory_setup.md
│ ├── sysmon_installation.md
│ ├── splunk_installation.md
│ ├── forwarder_configuration.md
│
├── detection_queries/
│ ├── failed_logins.spl
│ ├── powershell_detection.spl
│ ├── lateral_movement.spl
│
├── reports/
│ ├── incident_simulation.md
│
├── screenshots/
The screenshots folder contains evidence of:
- Active Directory configuration
- Sysmon events
- Splunk searches
- Detection results
Planned expansion:
- MITRE ATT&CK mapping
- Splunk dashboards
- executive incident reporting
- additional attack simulations
This project demonstrates practical SOC-oriented monitoring using enterprise Windows infrastructure.