Active directory recommendations

Assignment Help Basic Computer Science
Reference no: EM132883822

Project Part 1: Active Directory Recommendations

Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection. Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company's information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company's network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access.In Active Directory, where will system administrators createusers?

2. How will the procedures for making changes to the user accounts, such as password changes,be different in ActiveDirectory?

3. What action should administrators take for the existing workgroup user accounts afterconverting to ActiveDirectory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers,how will Active Directory address that issue? (Hint: Consider security identifiers[SIDs].)

Reference no: EM132883822

Questions Cloud

Determine variable factory overhead controllable variance : The actual variable factory overhead was $19,050. Determine the variable factory overhead controllable variance
What is the direct materials cost variance : he standard price is $0.90 per pound. If 500 units required 2,350 pounds, what is the direct materials cost variance
How does learning python or other languages benefit : How does learning Python or other languages benefit you? As a developer, it is important that you find the right language to master.
How does globalization impact union in united states : Globalization impacts all business, foreign and domestic. How does globalization impact a union in the United States?
Active directory recommendations : System administrators currently create users on each computer where users need access.In Active Directory, where will system administrators createusers?
How are technolgy trends in the business environment : How are technolgy trends in the business environment impacting on human resource development (HRD)? discuss it in detail. References please use and include chal
Standard for purchasing positions and controlling cost : The supply chain management unit at Fresh Munchables is creating an entirely new international purchasing team solely focused on purchasing food ingredients, ma
What is population you would like to address : What is the population you would like to address? What is the cited problem? The problem you want to address has to come from the literature,
Analyze backup solutions and why are important : Investigate and identify a ranking of disaster types. What are some alternate site considerations? Analyze backup solutions and why they are important.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd