This post documents the process of building and finalizing the Windows 10 Pro 22H2 template for use in the OPFORGE cyber lab environment.

๐Ÿ› ๏ธ Version & Baseline

  • OS: Windows 10 Pro 22H2 (fully patched as of 2025-05-25)
  • Build Source: Clean ISO install (22H2), upgraded from legacy 10240
  • Purpose: Golden template for domain-joined endpoint clones (opf-mbr01, future victim hosts)

๐Ÿ“ฆ Tool Installation via Script

After installation and patching, the following tools were installed using the custom script:

Install-OPFORGE-WindowsTools.ps1

Tools Installed:

  • Sysmon
  • Winlogbeat
  • 7zip
  • VSCode
  • Notepad++
  • Sysinternals Suite
  • Wireshark
  • Autoruns
  • Process Explorer

๐Ÿ” System Hardening

Included in the setup:

  • Removal of bloatware and telemetry
  • Disabling Cortana, Xbox services, OneDrive
  • Clean Start Menu layout
  • Chocolatey configured for repeat installs

๐Ÿงฝ Final Cleanup & Snapshot

Prior to cloning or Sysprep:

cleanmgr /sagerun:1
powercfg -h off

Snapshot taken:

base-windows10-template - win10_22H2_tools_installed

โœ… Status

This image is ready to be cloned into production boxes like:

  • opf-mbr01
  • Future detection test targets
  • Domain-joined Windows clients

For installation automation, refer to: Install-OPFORGE-WindowsTools.ps1