What edition of windows will be used for each server

Assignment Help Computer Network Security
Reference no: EM131319695

Windows Server Deployment Proposal

Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assignment is meant for students to enhance their mastery of the material and to provide a creative and realistic way in which to apply knowledge from this course.

Scenario

Global Advertising, Inc. (referred to as "GAI") has hired you as an IT consultant for implementing their Windows network infrastructure. GAI is a new advertising firm, and they are currently hiring staff, establishing two locations, and have a need to get their internal IT services configured. They do not yet have an IT staff, but when they do, the IT staff will take over all aspects of IT administration. You are required to supply GAI with a solution which describes the implementation and configuration of their core IT services. Cost is not a significant concern - GAI wishes to implement the "right" solution to fit their needs now and for the next 2-3 years.

There are several details about GAI which will have an impact on your choices:

• GAI will start with 90 employees, in the following departments:

o Executives (9 employees) - manage and run the company
o Accounts and Sales Department (15 employees) - perform market research and maintain accounts
o Creative, Media and Production Department (49 employees) - advertising
o Human Resources and Finances (12 employees) - perform HR and financial duties
o IT (5 employees) - manage IT for the company
o GAI will have two sites, one in Los Angeles and one in New York. Most staff will be located in LA, with at least 1 person from each of the departments above located in NY.

• Networking equipment is already in place for both sites. A secure tunnel (using IPSec) will be established between the two sites so that inter-site traffic will be securely tunneled over the Internet. You may make whatever other assumptions you wish about intra-and inter-site connectivity.

• Security mechanisms (e.g., firewalls, intrusion detection) will be handled separately, and there is no need to describe them.

• Some departments will want their data to remain private from other departments (e.g., Finances personnel will not want Production staff to see the company's financial details). Your team may make assumptions about how data should be shared or kept private.

• Assumptions can be made regarding any information not included here; all assumptions should be identified, however.

Topics to Cover

Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.

Describe the technical and business reasons for each choice, citing other resources as appropriate.

The Windows Server 2012 operating system should be used for all aspects of the solution.

The topics include:

New Features of Windows Server 2012

• Describe new features of Windows Server 2012 that GAI can take advantages of.

Deployment and Server Editions

• How many total servers are needed? Which roles will be combined?
• What edition of Windows will be used for each server (e.g., Standard, Datacenter)?
• Will Server Core be used on any servers?
• Where are each of the servers located (which of the two sites)?
• How will the servers be deployed? Manual or automated?

Active Directory

• Number of AD domains?
• Will there be any Read-Only Domain Controllers?
• How will the second site factor into domain controller placement? How will AD sites be configured?
• How will AD organizational units be organized (considering how group policy will be used and users will be organized)?

DNS and DHCP

• DHCP scope design (e.g., lease times, number of scopes, address range)
• Will a form of DHCP fault tolerance be implemented?
• Will DHCP reservations be used for servers?
• DNS namespace design (e.g., domain name(s) chosen, split DNS for Internet/intranet, zones)
• How will DNS be handled for the second site?

Application Services

• How will applications be deployed? If using Group Policy, what are the details on how Group Policy will be used to deploy the software? Which software applications will likely be needed?

File and Printer Sharing

• What shares might be needed?
• DFS Needed?
• How will quotas/FSRM be configures?

Assignment Requirements

There are specific requirements for the assignment: The final submission should contain at least 6 pages' worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages' worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.

• At least one diagram must be included (not counted towards the minimum length described above); this could be a diagram describing Active Directory components, DHCP/DNS design, file share hierarchy, or anything else that is worth displaying graphically to enhance the reader's understanding of the proposal. Additional diagrams, images, or tables are welcome.

• The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. Additional topics may be covered as desired.

• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.

• At least two non-textbook, non-LabSim, non-Wikipedia reference is required; preferably, this would be a "best practice" guide or similar content from Microsoft or an experienced provider of Microsoft solutions.

Reference no: EM131319695

Questions Cloud

How many shares will he own after the reverse stock split : Worst Buy Company has had a lot of complaints from customers of late, and its stock price is now only $4 per share. It is going to employ a one-for-six reverse stock split to increase the stock value. Assume Dean Smith owns 108 shares. How many share..
What is the probability that jo has the disease : The final piece of background information is that 1% of people of Jo's age and background have the disease.OK - Jo has the test, and the result is positive. What is the probability that Jo has the disease?
Create a process map that shows the basic components of pki : Create a process map that shows the basic components of PKI (including certificates). Include each device's role in each step. Note: One device may have more than one role.
Describe the person era or event : Describe the person, era, or event and explain its significance. How did your chosen person, event, or era change the course of history? How did your chosen person, event, or era affect today's world
What edition of windows will be used for each server : How many total servers are needed? Which roles will be combined? What edition of Windows will be used for each server (e.g., Standard, Datacenter)? Will Server Core be used on any servers? Where are each of the servers located..
Confidence intervals for four different investments : Calculate the? 95% confidence intervals for the four different investments included in the following table. The? 95% confidence interval of small stocks is between ___% and ____%. The? 95% confidence interval of? T-bills is between ____% and ____%.
Discuss iterative design as it relates to databases overall : Imagine that you are a consultant to a large transaction-oriented Web-based company. Establish the key benefits of the IMDB to the company's CEO. Suggest the type of infrastructure changes that would be required.
Replacement from the wallet : Suppose there are three bills in a wallet. One of the bills is a $1 bill, one is a $5 bill, and the third is a $10 bill. You select two bills at random without replacement from the wallet, and note the value of the bills selected.
What was the impact of the revolution on slavery : What were the roots and significance of the stamp act controversy? What was the impact of the revolution on slavery? What were the achievements and problems of the confederation government? What issues made the politics of the 1790s so divisive

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  Network security auditing tools

Use the Web to conduct research on Network Security Auditing. Write a report which provides a list of and explains the following

  Explain how you would integrate security requirements

Explain how you would integrate security requirements such as confidentiality, integrity, or availability into an experiment-based evaluation of a web-based conferencing system

  Critical components of a responsible cybersecurity policy

Identify and discuss the roles that international standards play in international cybersecurity policy today - the roles that they can play in the future?

  Write one or two paragraphs about middleware

Write one or two paragraphs 300-400 words using examples of all three types of citations (a), (b) and (c). The research topic is Middleware.

  Will they become cult heroes or viewed as dangerous criminal

Will they become cult heroes or be viewed as dangerous criminals? Will continuing to increase prosecution of these individuals help or hurt the situation?

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

  Identify the security practice guideline that you believe

identify the security practice guideline that you believe consumers should educate themselves with the most in order to keep their data private and job secure.

  What was the volume of digital evidence

Select a real world event related to Cybersecurity. This could be a crime, a well-documented breach or intrusion, or an act of cyber warfare/espionage.Needs to be 10 pages.APA format along with no plagiarism. Will be run through plagiarism site ..

  Implementation of various systems moving forward

Explain how the impact of HIPPA and HITECH regulations will impact the implementation of various systems moving forward. Consider impacts to and from federal, local, software vendors/users, hardware vendors/users, infrastructure, and organizationa..

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  What is the main difference between a virus and a trojan

What is the main difference between a virus and a Trojan? A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd