Determine the required GPO based on Organisation

Assignment Help Computer Networking
Reference no: EM132185840

Install and maintain valid authentication processes Assignment -

PART A - Report Writing

Nubex Pty Ltd is an Aged care centre located in a St James in a developing community. Nubex has been established for many years, watching the area grow. The company is constantly looking for innovative ideas to provide improved service and to increase security performance.

Currently, there are 30 Desktop computers with One Server. All of desktop computers has installed Windows 7 Operating System and Server has installed Windows Server 2008.

Hardware requirements for Server has been given below:

  • Processor: 2 GHz (for x64 processors)
  • RAM: 32 GB
  • DVD-ROM drive
  • Super VGA (800 x 600)
  • Keyboard and mouse
  • Internet access

Hardware requirement for Client machine has been given below:

  • Processors: 1.70 GHz (for x64 processors)
  • RAM: 8 GB
  • DVD-R/W Drive
  • Keyboard and mouse
  • Intel Graphics Family
  • Internet access.

The problem with current infrastructure is computer is very slow, No Group policy has not been configured, and all of the users are using generic password

In this Regards, Nubex has requested you to do the following tasks:

  • Identify the security requirements with reference to enterprise security plan.
  • Identify and analyse authentication options according to user and enterprise requirements.
  • Determine the required GPO based on Organisation.
  • Develop or obtain authentication protocols as required.
  • Develop and Deliver the Presentation Slides.

PART B - Practical Demonstration

Required Software:

  • Oracle Virtual Box
  • Windows Server 2008
  • Windows 7

Student must perform the following Tasks in Class:

Task 1: Make sure that Windows 2008 server and Windows 7 in virtual machine is working in your PC. Logon as administrator to begin.

Task 2: Change the TCP/IP properties of the network card to use a static class C IP address of 192.168.10. xx.

Task 3: Install active directory with ahic.com as domain name. Make sure that you add Windows 7 in a domain.

Task 4: Set up password policy as password complexity disabled and minimum password length zero in Windows 2008 Server. Update password policy. Which command did you use?

Task 5: Create two new users. One is John Black and the other is Teresa Green using simple password such as ahic1234.

Create a network folder called test and allow John full permission and deny access to Teresa.

Task 6: AHIC has three Organizational units under domain such as IT and Marketing and Admin. As a Network administrator you need to format the system for Admin department by this weekend. Make a group policy that when the users of IT department log on the System they will get the Message that "C Drive will be formatted soon. Please take a backup in other drive".

Task 7: Make a GPO that user can't access the Control Panel.

Verified Expert

Security requirements needed for Nubex Pty Ltd are identified.Then,the authentication options which are required for Nubex Pty Ltd, is identified and analysed.Required Group policy object for Nubex Pty Ltd aged care centre is determined.Authentication protocols are obtained as per the requirement of Nubex Pty Ltd.

Reference no: EM132185840

Questions Cloud

Provide a brief description of a decision scenario : Provide a brief description of a decision scenario from your own experience that was particularly challenging. State the organizational level of decision making
Hidden feature that you never use : Do you find the Charms Bar beneficial or just a hidden feature that you never use?
Implied in the indexed addressing mode : Assuming R1 is implied in the indexed addressing mode, determine the actual value loaded into the accumulator and fill in the table below:
Employee monitoring software : What are some technologies used in a Employee monitoring software and what are some pros and cons of the technologies used?
Determine the required GPO based on Organisation : ICTNWK503 Install and maintain valid authentication processes Assignment, Australian Harbour International College. Determine required GPO based on Organisation
Government or for a non-profit organization : Cam studied international relations in college and is interested in working for the government or for a non-profit organization. Which job sites should he use?
Compare and contrast two algorithm : Compare and contrast this two algorithm: Dijkstra's Shortest Path Algorithm and Bellman-Ford's Shortest Path Algorithm.
Discuss the key issues that should be addressed : Discuss the key issues that should be addressed in a security policy for handling user accounts/rights for an employee?
Process for managing major nuclear disaster : Does the United States' emergency response plan have a process for managing a major nuclear disaster?

Reviews

len2185840

12/4/2018 10:59:37 PM

There are two one word file , one in virtual box with screen shots in word file and power point. Submission Requirements: PART A: Written Report ( Approximately 4pages), Cover page, Executive summary, 4 tasks, conclusion, Presentation Slide ( at least 10 slides). PART B: Screen Shot of all practical tasks (Task 1 – Task 7) and paste in Microsoft Words.

len2185840

12/4/2018 10:59:31 PM

This assessment is to be completed according to the instructions given. Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmit in showing your competence with this unit. If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. Please refer to the College re-submission and re-sit policy for more information. If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately. Please read the Tasks carefully then complete all Tasks.

len2185840

12/4/2018 10:59:25 PM

To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment. This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor. Remember, that it must be your own work and if you use other sources then you must reference these appropriately. Resources required completing the assessment tasks are Learner guide, PowerPoint presentation, Unit Assessment Pack (UAP), Access to other learning materials such as textbooks, Access to a computer, the Internet and word-processing system such as MS Word. In addition, Student Need following software to perform all Practical Tasks.

len2185840

12/4/2018 10:59:19 PM

Oracle Virtual Box, Windows Server 2008 and Windows 7, Cisco Packet Tracer / Physical Cisco Router and Switch. Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12 and line spacing has to be Single line. This is Individual Assessments. Once you have completed the assessment, please upload the softcopy of the Assessment into AHIC Moodle.

Write a Review

Computer Networking Questions & Answers

  Explain how do you manage concurrency in a distributed and

write 400-600 words that respond to the following questions with your thoughts ideas and comments. this will be the

  A corporation is in requirement of setting up a new network

a corporation is in need of setting up a new network which requires four subnets of 250 ip addresses which are required

  Explain how would you perform the batch configuration

you install a proxy server system in a midsize organization with about 100 separate hosts distributed among several

  What is the network address-broadcast and range

How many systems are involved in the communications in this capture? What are their operating systems (including version information if you can tell), MAC addresses, IPs, services presented to the network

  Assume that you can access the caches in the local dns

suppose you can access the caches in the local dns servers of your department. can you propose a way to roughly

  Work breakdown structure

"The definition of tasks and their sequence is referred to as the Work Breakdown Structure" (WBS) (Systems Implementation and Training, n.d., p. 146). There is a particular skill in breaking down project tasks into the right-sized chunks.

  Write research paper on network cost assessment

Write Research paper on network cost assessment

  What would be the advantages of having a large mtu

The MTUs range from 296 to 65,535. What would be the advantages of having a large MTU? What would be the advantages of having a small MTU?

  What makes an effective game world

Choose a game design professional or theorist not featured as a speaker within this class. What Makes an Effective Game World

  Discussion of any five variants of ransomware

MN502 Overview of Network Security Assessment - Potential threats and mitigation tools for ransomware. Melbourne Institute of Technology, Australia

  Suggest lan and wireless lan wiring considerations

Suggest LAN and Wireless LAN (WLAN) wiring considerations. Identify the single point of failure, and recommend potential mitigation strategies.

  Define the main function of modem device

Define the main function of modem(modulator demodulator) device.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd