Analyse system requirement to implement active directory

Assignment Help Computer Engineering
Reference no: EM131445058

Lab 1

Task 1. Install and configure the server 1 as domain controller with DNS service.

1.1 analyse the system requirement to implement active directory

1.2 install the active directory domain services (AD DS)

1.2 install the active directory domain services (AD DS)

1.4 install a child Domain named as camera.hitech.com

1.5 install DNS role on freshly installed AD

Task 2. Introduction to Group policy and configuring the user and computer environment using group policy and active directory administration and security planning and administrative delegation.

2.1 create OUs and group according to following table 2:

2.2 create users and add them to specified groups as shown in table 3.

2.3 Add management Staff to new roles as following:

2.4 create a new group "market analyst" under sales group and add PetersonWilson and James Robert under Market analyst Group.

2.5 Delegating authority: Assign delegating administrative Authority to market Analyst group.

Task 3: create two share folders in C drive as I) C:\sec-tech\sales and ii) C:\sec-tech\training. Now perform the following:

3.1 sales folder can only be access by sales department with full control.

3.2 training folder is access by team leader department in read only mode and manager group should have full control.

Task 4: introduction to group policy and configuring the user and computer environment using group policy.

4.1 configure the GPO of OU-Finance to do the followings:

Task 5: planning a group policy management and implementation strategy:

5.1 configure a domain wide password policy for the users are required to use 14 characters.

5.2 configure a domain wide account lockout policy for user's three invalid logon attempts.

5.3 configure audit policies for the confidential files.

Task 6: active directory maintenance, troubleshooting and disaster revoery.

6.1 perform windows server backup at daily basis

6.2 perform an authoritative restore

Lab 2: as demand grows, recently company open one new branch in wellington. Now as system admin your task is to join two different sites or subnets as shown in figure 1.

Task 1. Working with active directory sites.

Router 1
1.1 Router server has two LAN cards one facing at Auckland DCI- 192.168.25.254 and another one at wellington DC2- 192.168.30.254.

1.2 Install routing and remote access role at router server.

Task 2. Configure the wellington DC2 (e.g. domain controller 2).

2.1 move a computer from one site to another.

2.2 create a site link object and verify the replication

Lab 3. Configure name resolution and additional services.
A) Access the designated resource (e.g. file share) with restricted privilege.
B) Both parties are allowed to access the resource in either way.

Task 1. Explain the concept of trust in window server 2008 and identify the trust requirements for the problem mentioned above.

Task 2. Create trust between two domains using following steps:
1) Setting up forwarders
2) Configure reverse lookup zone
3) Create trust

Task 3. Share the resource and check from user end.

Lab 4. Performing software installation with group policy

Task 1. Prepare software distribution share.

Task 2. Publish software using group policy

Task 3 assign software using group poilcy objects.

Lab 5. Configuring active directory certificate service.

Task 1. Install active directory certificate services.

Task 2. Install the online responder.

https://www.dropbox.com/s/222e0nzkjj4uhmh/linux%20assignment.pdf?dl=0

Reference no: EM131445058

Questions Cloud

Find the value of r2 and explain its meaning : Use the given data to find the correlation coefficient r, regression equation and scatter plot in MS Excel.Based on the linear correlation coefficient r, is this a good model? Explain.What is the best predicted test score for a student who spent 7 h..
Produced from the reduction of titanium : Titanium metal can be produced from the reduction of titanium(IV) chloride with Magnesium metal: TiCl4(g) +2 Mg (l) --> Ti(s) + 2Mg Cl2(l)
Describe recidivism : Describe recidivism. Are there various levels, or is it narrowly defined by commission of the same offense? Provide examples and cite the sources that helped you arrive at your conclusion
Water bottle to boiling : Is there enough energy in a Bic lighter (5 g of butane) to heat the water in a 500 ml water bottle to boiling? Assume the water is initially at 25 C. Is this also enough energy to boil all of the water? Assume water is 1g/ml. If not, how many ligh..
Analyse system requirement to implement active directory : Analyse the system requirement to implement active directory and install the active directory domain services (AD DS) - implement active directory
Explain what are the supply chain uncertainties and risks : Explore the concepts of Lean Supply Management based on what can be referenced in the concurrent literatures; discuss the critical importance of value adding, waste reduction and high efficiency that the lean approach can bring about.
Describe chaining procedure by listing the links in chain : Describe the chaining procedure by listing the links in the chain.  What will be the final reinforcer?  How will you transition this to a natural reinforce
Explain role of access controls in implementing a security : Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access ..
Radioactivity that is known as isotope-scanning : To that extent, the medical use of radioactivity that is known as isotope-scanning, is often considered as being extreme. What are the dangers of this procedure? Do the pros outweigh the cons?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Communication among different constituents in terms of time

communication among various constituents in terms of time and place is key to project management consideration.

  Questionmodify this function to check to see if one list is

questionmodify this function to check to see if one list is a shallow copy of other.def firstmismatchlst1 lst2-list of

  Provide a technical overview of dhcp on server 2008

Explain the concept of a domain and detail how this is accomplished within a Microsoft environment. Please be sure to provide sufficient detail including the various components like DNS, DHCP, etc.

  How we will be interacting with technology in 20 years

Examine at the development of technology over the last 10 years. How do you think we will be interacting with technology in 20 years time compared to now. Be imaginative.

  What are the two largest gui implementations for linux

What are the two largest GUI implementations for Linux? Explain how it can crack the password so quickly using hash values when you don't have a supercomputer.x

  The bookstore wants you to make an object-oriented model

student bookstore at pleasant creek community college situation the bookstore staff at pleasant creek community college

  Brightidea is in the file storage business they give file

brightidea is in the file storage business. they provide file storage to free and paid clients all over the world. at

  What single question can you ask a person

assume you were in a country where each person was either a truth teller or a liar. (A truth teller always tells the truth, a liar always lies.) What single question could you ask a person that would allow you to detect whether that person was a t..

  Appraise the individual and organizational consequences of

while information systems has one meaning it can be used in different ways for companies to keep a competitive edge

  Search for movies by movie name or kind of movie

Search for movies that have a certain actor (note that some movies will have more than one actor worth searching on). Search for customers by last name or phone number.

  What interview techniques do companies employ

Watch the "Interview" video found on the student media website. What interview techniques do companies employ? From your experience, have you been in an interview when these were used? Describe the differences and the approach to being successful ..

  Write the advantages of star and delta connected systems

Write the advantages of star and delta connected systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd