Building a Home Lab – Part 3 – Benefits

It’s been a while since I made a post due to school and work, but I definitely wanted to finish the last part revolving around the benefits of building a home lab. Previously in Part 1, I talked about the history and hardware requirements to make a home lab. In Part 2, I talked about the design/functionality of a home lab, and now I will be talking about some of the overall benefits with running your own home lab. This post will be a bit wordy and contain a larger number of images to represent some of the technologies I have setup in my home lab environment.

Previously I explained why setting up your own home lab is extremely beneficial for any IT professional that is trying to sharpen their skills. Now I will highlight some of the immediate benefits I have been able to experience.

  • It is your own environment and you can do things whatever way you want. (No boss to tell you how to name things)
  • Not everyone has access to create test VMs at work or there are strict policies in how enterprise resources are utilized.
  • No need to hide your own test lab or VMs from the security team or your boss. (Again!)
  • Not having to worry so much about figuring out how to connect a test VM infrastructure into the network to gain internet access.
  • You are your own server admin, VM admin, AD admin, SCCM admin, whatever admin. (Also a drawback when you have no time to troubleshoot a forgotten home lab.)
  • You can learn from your mistakes, or at least I hope you can learn after you accidentally blow your lab away.
  • You can experience different products, technologies and configuration strategies when setting them up.
  • You can learn to automate things that you are not allowed to automate at work!
  • Best of all, you can look sharp in front of your boss when you say. “No problem, I’ve done this before.”

The following examples show how I was able to setup different technologies and configure them accordingly to test out a concept, product or technology. As I had mentioned in Part 2, I established the baseline which are domain controllers with basic roles such as DHCP/DNS and also performed a basic installation/configuration of SCCM 2012 R2. With that in mind, I was able to continue working on my lab to expand additional configurations with the following:

  • Upgrading SCCM 2012R2 to 1511 then 1602 – New Upgrading process (Everything is so much simpler.)

    • By having my own lab setup, I was able to see a lot of the new features and test them out in a small running lab environment. Immediately I was able to benefit from some new settings and prepare to support Windows 10. Extremely important to get familiar with new Operating systems that may end up running in almost every enterprise.

New Update & Servicing section inside of SCCM.


New Windows 10 Servicing section.


New Deployment safety rules


Creating your own OS Deployment Task Sequence

  • Building your own VMs on the fly through OS deployment.

    • Once you have installed SCCM, it is very easy to get VMs installed and configured as if this was an actual enterprise. This is something not everyone gets to experience and becomes an excellent skillset to have in your pocket.

Lab_Benefits_VMs2Lab_Benefits_VMs3 Lab_Benefits_VMs4

Lab_Benefits_VMs5 Lab_Benefits_VMs7 Lab_Benefits_VMs8

  • Backing up and Restoring VMs.

    • While it does sound kind of boring, it is an essential skill every administrator should have. More importantly being able to test your restores becomes even more critical as your virtual infrastructure grows.

Successfully Scheduling Backups


Going through a VM Restore


Monitoring the VM Restore Job

  • Setting up a Firewall Appliance and Mock DMZ Setup.

    • Being able to successfully setup a Firewall appliance and actually creating a DMZ subnet will enable you to experience the challenges required in managing and maintaining a growing list of Firewall rules. Also, enables you to monitor it for communication failures to further troubleshoot issues.

Base set of Firewall Rules


Free Firewall Appliance

  • Setting up a Root Certificate Authority and Sub-CA

    • Going through the annoying process of creating a Root CA and Sub-CA will definitely make you a better admin or an angry admin. However, understanding how this technology works may help you have a better grasp on it and maybe even help you upgrade to SHA2 if you still haven’t already upgraded your CA.


Creating CA Templates


  • Setting up an ADFS server and ADFS Proxy Server

    • By effectively utilizing DMZ zones, Certificates and VM automation, you can continue learning about AD Federation Services that may come in hand if your organization starts to consider Office 365. Definitely one of the most annoying setups in a lab environment, since it is very picky in how everything is done. It can also be broken very easily, so once you set it up correctly, be sure to write down some notes.

ADFS Auth Policies

  • Let’s Not Forget, Automating Tasks When Possible

    • So, want to keep your VM lab up to date with patches and want to save virtual resources. Simple, create a schedule task to turn on and turn off specific VMs every so often.

Scheduling a Repeating Task


A Simple PowerShell

So after all of these examples and screenshots, you should definitely dislike me or agree with me. The idea of running your own home lab environment seems quite beneficial to the IT enthusiast and IT professional looking to further expand their skills.


One thought on “Building a Home Lab – Part 3 – Benefits

  1. Pingback: Building a Home Lab – Part 2 – Functionality | OMG Tech Stuff

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s