Determine the required GPO based on Organisation

Assignment Help Computer Networking
Reference no: EM132185840

Install and maintain valid authentication processes Assignment -

PART A - Report Writing

Nubex Pty Ltd is an Aged care centre located in a St James in a developing community. Nubex has been established for many years, watching the area grow. The company is constantly looking for innovative ideas to provide improved service and to increase security performance.

Currently, there are 30 Desktop computers with One Server. All of desktop computers has installed Windows 7 Operating System and Server has installed Windows Server 2008.

Hardware requirements for Server has been given below:

  • Processor: 2 GHz (for x64 processors)
  • RAM: 32 GB
  • DVD-ROM drive
  • Super VGA (800 x 600)
  • Keyboard and mouse
  • Internet access

Hardware requirement for Client machine has been given below:

  • Processors: 1.70 GHz (for x64 processors)
  • RAM: 8 GB
  • DVD-R/W Drive
  • Keyboard and mouse
  • Intel Graphics Family
  • Internet access.

The problem with current infrastructure is computer is very slow, No Group policy has not been configured, and all of the users are using generic password

In this Regards, Nubex has requested you to do the following tasks:

  • Identify the security requirements with reference to enterprise security plan.
  • Identify and analyse authentication options according to user and enterprise requirements.
  • Determine the required GPO based on Organisation.
  • Develop or obtain authentication protocols as required.
  • Develop and Deliver the Presentation Slides.

PART B - Practical Demonstration

Required Software:

  • Oracle Virtual Box
  • Windows Server 2008
  • Windows 7

Student must perform the following Tasks in Class:

Task 1: Make sure that Windows 2008 server and Windows 7 in virtual machine is working in your PC. Logon as administrator to begin.

Task 2: Change the TCP/IP properties of the network card to use a static class C IP address of 192.168.10. xx.

Task 3: Install active directory with ahic.com as domain name. Make sure that you add Windows 7 in a domain.

Task 4: Set up password policy as password complexity disabled and minimum password length zero in Windows 2008 Server. Update password policy. Which command did you use?

Task 5: Create two new users. One is John Black and the other is Teresa Green using simple password such as ahic1234.

Create a network folder called test and allow John full permission and deny access to Teresa.

Task 6: AHIC has three Organizational units under domain such as IT and Marketing and Admin. As a Network administrator you need to format the system for Admin department by this weekend. Make a group policy that when the users of IT department log on the System they will get the Message that "C Drive will be formatted soon. Please take a backup in other drive".

Task 7: Make a GPO that user can't access the Control Panel.

Verified Expert

Security requirements needed for Nubex Pty Ltd are identified.Then,the authentication options which are required for Nubex Pty Ltd, is identified and analysed.Required Group policy object for Nubex Pty Ltd aged care centre is determined.Authentication protocols are obtained as per the requirement of Nubex Pty Ltd.

Reference no: EM132185840

Questions Cloud

Provide a brief description of a decision scenario : Provide a brief description of a decision scenario from your own experience that was particularly challenging. State the organizational level of decision making
Hidden feature that you never use : Do you find the Charms Bar beneficial or just a hidden feature that you never use?
Implied in the indexed addressing mode : Assuming R1 is implied in the indexed addressing mode, determine the actual value loaded into the accumulator and fill in the table below:
Employee monitoring software : What are some technologies used in a Employee monitoring software and what are some pros and cons of the technologies used?
Determine the required GPO based on Organisation : ICTNWK503 Install and maintain valid authentication processes Assignment, Australian Harbour International College. Determine required GPO based on Organisation
Government or for a non-profit organization : Cam studied international relations in college and is interested in working for the government or for a non-profit organization. Which job sites should he use?
Compare and contrast two algorithm : Compare and contrast this two algorithm: Dijkstra's Shortest Path Algorithm and Bellman-Ford's Shortest Path Algorithm.
Discuss the key issues that should be addressed : Discuss the key issues that should be addressed in a security policy for handling user accounts/rights for an employee?
Process for managing major nuclear disaster : Does the United States' emergency response plan have a process for managing a major nuclear disaster?

Reviews

len2185840

12/4/2018 10:59:37 PM

There are two one word file , one in virtual box with screen shots in word file and power point. Submission Requirements: PART A: Written Report ( Approximately 4pages), Cover page, Executive summary, 4 tasks, conclusion, Presentation Slide ( at least 10 slides). PART B: Screen Shot of all practical tasks (Task 1 – Task 7) and paste in Microsoft Words.

len2185840

12/4/2018 10:59:31 PM

This assessment is to be completed according to the instructions given. Should you not answer the tasks correctly, you will be given feedback on the results and gaps in knowledge. You will be entitled to one (1) resubmit in showing your competence with this unit. If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. Please refer to the College re-submission and re-sit policy for more information. If you have questions and other concerns that may affect your performance in the Assessment, please inform the assessor immediately. Please read the Tasks carefully then complete all Tasks.

len2185840

12/4/2018 10:59:25 PM

To be deemed competent for this unit you must achieve a satisfactory result with tasks of this Assessment along with a satisfactory result for another Assessment. This is an Open book assessment which you will do in your own time but complete in the time designated by your assessor. Remember, that it must be your own work and if you use other sources then you must reference these appropriately. Resources required completing the assessment tasks are Learner guide, PowerPoint presentation, Unit Assessment Pack (UAP), Access to other learning materials such as textbooks, Access to a computer, the Internet and word-processing system such as MS Word. In addition, Student Need following software to perform all Practical Tasks.

len2185840

12/4/2018 10:59:19 PM

Oracle Virtual Box, Windows Server 2008 and Windows 7, Cisco Packet Tracer / Physical Cisco Router and Switch. Submitted document must follow the given criteria. Font must be Times New Roman, Font size need to be 12 and line spacing has to be Single line. This is Individual Assessments. Once you have completed the assessment, please upload the softcopy of the Assessment into AHIC Moodle.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd