All Projects
IT Management Windows Server Active Directory 10–14 min read

Windows Infrastructure
Active Directory & Server Management

Managing the full Windows infrastructure stack for a 100-user multi-site manufacturing environment — Active Directory, Group Policy, Windows Server, Microsoft 365/Entra ID, patch management, and backup systems. Built and hardened from the ground up as the sole IT administrator.

Environment Overview

Active Directory Administration

Inherited an Active Directory environment with minimal documentation, inconsistent OU structure, and several legacy configurations carried forward from a previous IT provider. The environment was functional but not well-governed — stale user accounts, no standardized naming conventions, and Group Policy applied inconsistently across sites.

OU Structure & Account Management

  • Redesigned OU structure to reflect actual organizational hierarchy — department-based OUs for targeted GPO application
  • Audited all user accounts — disabled and eventually removed 23 stale accounts (terminated employees, vendors, temp staff) that retained active credentials
  • Implemented standardized naming convention for user accounts, computer accounts, and security groups
  • Created and maintained security groups for resource access — file share permissions, printer access, application licensing groups
  • Documented the full AD schema including all GPO linkages, security group memberships, and delegation assignments

Group Policy

Audited and rebuilt Group Policy to address security gaps and standardize desktop configurations across 4 sites:

Windows Server Management

Server Infrastructure

Server Maintenance & Patching

  • Monthly patch cycle: approve Patch Tuesday updates in WSUS → push to test group (IT machines) → monitor for 48hrs → approve for production deployment
  • Quarterly Windows Server patch cycle during planned production maintenance windows
  • Patch compliance tracking: achieved 95%+ 30-day patch compliance across all managed endpoints
  • Critical vulnerability patches (zero-day) fast-tracked outside normal cycle with same-day or next-business-day deployment

Microsoft 365 & Entra ID Administration

Managed the Microsoft 365 tenant alongside on-premises AD, maintaining hybrid identity with Entra ID Connect (Azure AD Connect) synchronization.

  • License management: Assigned and tracked M365 Business Premium licenses; reclaimed licenses from inactive accounts; saved ~$2,400/year in license waste identified during quarterly audit
  • Exchange Online: Managed mailboxes, shared mailboxes, distribution groups, mail flow rules; handled delivery issues and spam rule maintenance
  • SharePoint/OneDrive: Managed site permissions and storage quotas; migrated departmental file shares to SharePoint Online (project data and management-layer documents)
  • Teams administration: Managed team creation governance, external access policies, guest user lifecycle
  • MFA rollout: Planned and executed MFA enforcement campaign — from 40% voluntary enrollment to 100% enforced via Conditional Access
  • Intune MDM: Enrolled all corporate laptops; deployed compliance policy (BitLocker, AV, patch level); enforced via Conditional Access

Backup & Disaster Recovery

Vendor & Ticket Management

Managed all IT vendor relationships and served as the single point of contact for internal IT support:

  • Averaged 30 support tickets/week across all sites — hardware failures, account issues, application support, network troubleshooting
  • Managed ISP relationships for 4 sites — coordinated circuit upgrades, outage escalations, and SLA enforcement
  • Coordinated hardware procurement: standardized workstation spec across all sites, managed warranty claims and replacement logistics
  • Vendor management: SentinelOne, Fortinet, Microsoft, Datto, Ubiquiti

Key Achievements

Tools & Platforms

Windows Server 2019
Active Directory
Group Policy
WSUS
Microsoft 365
Entra ID (Azure AD)
Entra ID Connect
Exchange Online
SharePoint Online
Microsoft Intune
Datto BCDR
Datto RMM
PowerShell
DFS