Create system to find all ad-authenticated logins for server

Assignment Help Computer Networking
Reference no: EM131195353

Topics:

1. Agent-less inventory system for all hardware in CS department. Must be web-based and integrate with CS AD.

2. Create/ setup system to query CS printers during specified times of the year. system will let specified users (via email or windows message) status of consumables, estimated life of each component, any errors or warnings since the last notification, etc.

3. Create system to find all AD-authenticated logins for all servers and workstations (would include non-windows machines that authenticate to AD). Should be a web-based system. Needs to be secure, only using AD admins.

4. Inventory all production servers and workstations within the CS domain. determine what software w/ versions have been installed. This query will then be automated, sending reports to the CS sys admin when discrepancies between machines are discovered.

Instructions:

For each, create a project proposal by listing the following:

- a description and overview of the project; completely describe the project as you understand it at this moment. This description should be at least a paragraph (not a single sentence)

- a brief description of the problem that needs to be solved

- reason why you wish to work on the project

Rank your 4 proposals in order by preference.

Reference no: EM131195353

Questions Cloud

Concepts of market segmentation-targeting : In this assessment, you will analyze and use the concepts of market segmentation, targeting, and positioning to develop a product strategy for your selected product. This analysis includes describing the information used to determine appropriate m..
Prepare journal entries to record the issuance : Prepare an amortization table showing the allocation of each of the four semiannual payments between interest expense and reductions in the principal amount of the note.
Different areas of the international monetary system : This question deals discusses issues in three different areas of the international monetary system. The GOLD STANDARD eriod was roughly 1870 to 1914. The gold standard has some strong automatic mechanisms that lead to 8 in a long run sense) simultane..
Analysis of a art software : Develop a SWOT analysis of a art software geared towards students in K-12. The software develops as the students move along within their grade. This product can be geared like Adobe Art Software.
Create system to find all ad-authenticated logins for server : Create system to find all AD-authenticated logins for all servers and workstations (would include non-windows machines that authenticate to AD). Should be a web-based system. Needs to be secure, only using AD admins.
Prepare the draft report to the royal pets : Given the Case Study Analysis. - You are providing advice for The Royal Pets Hotel and Spa.-  Prepare the draft report to The Royal Pets.
Evaluate the viscosity of the liquid : Develop an algebraic expression for the viscosity of the liquid in the device in terms of M, g, Vm, r, R, a, and H. Evaluate the viscosity of the liquid using: M = 0.10 kg r = 25 mm R = 50 mm a = 0.20 mm H = 80 mm Vm = 30 mm/s
What is the maximum number of applications per hour : Henry found that each step was assigned to a different person.  Each application is a separate process in the sequence shown above and when a worker is through with his work for one person, he starts the next person in line. What is the maximum nu..
What are some differences between the ucr and the ncvs : What challenges might you face with open ended questions regarding collecting, collating (or summarizing) the data, or interpreting the answers?

Reviews

Write a Review

Computer Networking Questions & Answers

  Differences between application software and system software

differences between application software and system software?

  Switch configured for three different vlan

A switch has been configured for three different VLANs: VLAN2, VLAN3, and VLAN4. A router has been added to provide communication between the VLANs. What type of interface is necessary on the router if only one connection is to be made between the..

  Software controls provide security for the lan-to-wan domain

The CIO has tasked you with proposing a series of hardware and software controls designed to provide security for the LAN-to-WAN domain.

  What is the server ip address

What is the server IP address, what is the application layer protocol involved and what is the client port number for data download - What is its transmission distance from radio to radio?

  Has this network been sub-netted

Assume a host computer has the following configuration: IP Address: 145.20.110.176 Subnet Mask: 255.255.0.0 Default Gateway: 145.20.1.1 a. What is the Class of this network?

  Describe the company network and interconnection

Describe the company network, interconnection, and communication environment. Assess risk based on the GFI, Inc. network diagram scenario

  Problem on subnet masking and designing small networks

Subnet masking and designing small networks for fictitious organizations - provides system administration and networking services to organizations

  Reduce wan traffic

Create VLAN, as appropriate, to minimize and Isolate broadcast traffic and Reduce WAN Traffic

  Kind of challenges did irs encounter when implementing cdw

What kind of challenges did the IRS encounter when implementing its CDW? What management,organization, and technology issues had to be addressed?

  Advantages and disadvantages of moving to a saas provider

Should SoftArc move to a SaaS provider in order to provide email and office automation services for their employees? What are the advantages and disadvantages of moving to a SaaS provider for these services

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Describe the key to fault tolerance in network design

Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies. Define mirroring and server mirroring.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd