Managing access to an active directory environment located

Assignment Help Computer Networking
Reference no: EM13754192

Read the Managing Access to an Active Directory Environment located on the student website and select one option to complete the assignment.

Option 1: Managing Access to an Active Directory Environment

Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules:

· The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president's administrative assistant.

· The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president's administrative assistant.

· The director of store operations can use any equipment in any location.

Design group objects to implement group policies to manage access to these resources. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data.

· How do you plan to recover from these types of loss of current AD DS and other critical information?

· What utilities might you investigate to help accomplish your plan?

Option 2: Managing Access to an Active Directory Environment (Graphical)

Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location.

Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?

Option 3: Managing Access to an Active Directory Environment (Advanced)

Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufacturing has four locations. Recent visits by members of the executive team to these locations have generated a new set of access requirements. These are the rules you have been provided:

· President and CEO Dr. Michael Riordan is the only person authorized to have full access to all files and equipment at all locations.

· Senior Vice President Kenneth Collins and Chief Operating Officer Hugh McCauley are to have access to one PC and one printer/scanner/fax located in the management office of each location.

· Executive Assistant Jane McCall is to have access to the printer/scanner/fax machine located in the management offices of each location.

· The managers of each location are to have access to Executive Assistant Jane McCall's executive office printer/scanner/fax machine.

Design group objects to implement group policies to manage access to these resources. Use either a table as in Option 1 or graphical representation as in Option 2.

Working with the Hangzhou, China network, you notice that the single domain has recently been organized using four subnets.

Write a 1-page report that answers the following questions:

· What problems related to replication might this situation cause?

· What is your recommended solution?

Reference no: EM13754192

Questions Cloud

Types of executive compensation arrangements : Ajax Corporation is a young high-growth company engaged in the manufacture and distribution of automotive parts. Its common stock has doubled in value since the company was listed on the NASDAQ exchange about two years ago. Ajax currently has a high ..
Ending finished goods inventory is budgeted : Jasmine Company produces hand tools. Budgeted sales for March are 10,000 units. Beginning finished goods inventory in March is budgeted to be 1,400 units, and ending finished goods inventory is budgeted to be 1,300 units. How many units will be produ..
Which enlightened monarch was the most enlightened : provided links to primary sources that you will examine to help you answer the focus question: Which enlightened monarch was the most enlightened?
What amount of these investigation costs can angel deduct : While she was a college student, angel lived by a bookstore located near campus. she thinks a bookstore located on the other side of campus would be successful. she incurs expenses of 42,800 (legal fees, accounting fees, marketing survey, etc.) in ex..
Managing access to an active directory environment located : How do you plan to recover from these types of loss of current AD DS and other critical information. What utilities might you investigate to help accomplish your plan
Markup percentage using a total-cost approach : Morales Corporation produces microwave units. The following per unit cost information is available: direct materials $36; direct labor $24; variable manufacturing overhead $18; fixed manufacturing overhead $40; variable selling and administrative exp..
Describe the accomplishments of copernicus and vesalius : Describe the accomplishments of Copernicus and Vesalius. Why were they considered founders of the Scientific Revolution?
Compute the target selling price : Mussatto Corporation produces snowboards. The following per unit cost information is available: direct materials $12; direct labor $8; variable manufacturing overhead $6; fixed manufacturing overhead $14;
What is the true horizontal length of a recorded distance ab : A 100-ft steel tape of cross-sectional area of 0.0020 in2, weight 2.4 lb, and standardized at 68Fo is 100.008 ft between end marks when supported throughout under a 15-lb pull. What is the true horizontal length of a recorded distance AB for the cond..

Reviews

Write a Review

Computer Networking Questions & Answers

  Clusters can be implemented by leveraging most of the

clusters can be implemented by leveraging many operating systems and applications. in a report of 1-2 pages complete

  1 you are performing a path analysis of a 24 mile link

1 you are performing a path analysis of a 24 mile link between two facilities. the path profile reveals three

  What to make sure network infrastructure is more secured

The CIO has asked you to explain why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities, explain to your CIO what you can do to make sure your network infrastructure is more secur..

  Part-11 generalize the basic approaches we used for making

part-11 generalize the basic approaches we used for making the best out of best effort service for real-time

  Which of the following best describes https

Name one acceptable form of 802.11 wireless LAN security/encryption AND name one unacceptable form.

  Case study - diane the consultant

Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

  Question nbsprouter x running rip has the following routing

question nbsprouter x running rip has the following routing tabledestinationcostnext routernet17anet23bnet34cnet43da

  The fiber distributed data interface fddi backbone is the

based of your understanding of remote monitoring rmonin a microsoft word document configure a rmon and create a 3- to

  Compare how state and local governments mirror three

write 500-750 words that respond to the following questions with your thoughts ideas and comments. this will be the

  What is the size of data in the ipv4 datagram

An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the size of data in the IPv4 datagram?

  The geostationary satellite used for communication systems

The geostationary satellite used for communication systems.  Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:

  Conduct a research on network address translation

Research network address translation (NAT). While conducting your research, consider purpose of NAT, compatibility with IPv6, and functions of automatic IP assignment and automatic name resolution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd