Managing the full Windows infrastructure stack for a 100-user multi-site manufacturing environment — Active Directory, Group Policy, Windows Server, Microsoft 365/Entra ID, patch management, and backup systems. Built and hardened from the ground up as the sole IT administrator.
| Component | Detail |
|---|---|
| Organization | Multi-site manufacturing company, 4 locations (anonymized) |
| User base | ~100 users — office staff, production floor, management |
| Infrastructure | On-premises Windows Server + Microsoft 365 hybrid deployment |
| Role | Sole IT administrator — System Administrator → IT Manager |
| Responsibility scope | Full infrastructure stack: servers, AD, M365, networking, endpoints, backup, vendors |
Inherited an Active Directory environment with minimal documentation, inconsistent OU structure, and several legacy configurations carried forward from a previous IT provider. The environment was functional but not well-governed — stale user accounts, no standardized naming conventions, and Group Policy applied inconsistently across sites.
Audited and rebuilt Group Policy to address security gaps and standardize desktop configurations across 4 sites:
| GPO | Purpose | Scope |
|---|---|---|
| Security Baseline | Password complexity (12+ chars), account lockout after 5 failures, screen lock after 10 min inactivity | All domain-joined machines |
| Software Restriction | Block execution from user-writable paths (%AppData%, %Temp%) — mitigate macro malware and drive-by execution | Workstations (excluding dev machines) |
| Windows Firewall | Enforce Windows Defender Firewall on; block inbound connections except explicitly managed rules | All workstations |
| Windows Update | WSUS-directed updates, automatic install during maintenance window (2am Sun), defer feature updates 30 days | All domain-joined machines |
| Drive Mapping | Map departmental file shares at logon by OU membership — automated, no manual drive mapping required | All users |
| Printer Deployment | Deploy site-specific printers by OU — production floor, office, and management printers deployed silently | By site/department OU |
| BitLocker | Enforce BitLocker encryption on all laptops and portable workstations; store recovery keys in AD | Laptop OU |
| Server Role | Configuration |
|---|---|
| Domain Controller (Primary) | Windows Server 2019 — AD DS, DNS, DHCP for primary site |
| Domain Controller (Secondary) | Windows Server 2019 — AD replication, DNS failover, DHCP failover cluster |
| File Server | Windows Server 2019 — departmental shares with NTFS + share-level permissions; DFS namespace for consistent UNC paths across sites |
| Print Server | Centralized print queue management; print driver deployment via GPO |
| WSUS Server | Windows Server Update Services — centralized patch management for all domain-joined machines |
Managed the Microsoft 365 tenant alongside on-premises AD, maintaining hybrid identity with Entra ID Connect (Azure AD Connect) synchronization.
| System | Configuration |
|---|---|
| Server backup | Nightly full backup of all servers to local NAS; weekly off-site rotation via Datto BCDR appliance — immutable backup with 1-year retention |
| Workstation backup | OneDrive known folder move — Desktop, Documents, Pictures synced to M365 for all users; no local-only data risk |
| Recovery testing | Quarterly bare-metal restore test on isolated network; documented RTO/RPO: <4 hours for file server, <8 hours for domain controller |
| AD backup | System State backup of both DCs nightly; AD recycle bin enabled for accidental deletion recovery |
Managed all IT vendor relationships and served as the single point of contact for internal IT support:
| Achievement | Detail |
|---|---|
| Patch compliance | 95%+ endpoints within 30-day SLA — up from ~50% inherited baseline |
| License savings | ~$2,400/year recovered from stale M365 license audit |
| AD hygiene | 23 stale accounts disabled/removed; OU structure rebuilt with full documentation |
| Infrastructure uptime | 99.8% availability across all 4 sites over 12-month period |
| MFA coverage | 0% → 100% enforced MFA across all M365 users |
| Backup coverage | All servers and workstations covered; quarterly restore tests passed |