Managing access to an active directory environment located

Assignment Help Computer Networking
Reference no: EM13754192

Read the Managing Access to an Active Directory Environment located on the student website and select one option to complete the assignment.

Option 1: Managing Access to an Active Directory Environment

Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules:

· The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president's administrative assistant.

· The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president's administrative assistant.

· The director of store operations can use any equipment in any location.

Design group objects to implement group policies to manage access to these resources. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data.

· How do you plan to recover from these types of loss of current AD DS and other critical information?

· What utilities might you investigate to help accomplish your plan?

Option 2: Managing Access to an Active Directory Environment (Graphical)

Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location.

Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?

Option 3: Managing Access to an Active Directory Environment (Advanced)

Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufacturing has four locations. Recent visits by members of the executive team to these locations have generated a new set of access requirements. These are the rules you have been provided:

· President and CEO Dr. Michael Riordan is the only person authorized to have full access to all files and equipment at all locations.

· Senior Vice President Kenneth Collins and Chief Operating Officer Hugh McCauley are to have access to one PC and one printer/scanner/fax located in the management office of each location.

· Executive Assistant Jane McCall is to have access to the printer/scanner/fax machine located in the management offices of each location.

· The managers of each location are to have access to Executive Assistant Jane McCall's executive office printer/scanner/fax machine.

Design group objects to implement group policies to manage access to these resources. Use either a table as in Option 1 or graphical representation as in Option 2.

Working with the Hangzhou, China network, you notice that the single domain has recently been organized using four subnets.

Write a 1-page report that answers the following questions:

· What problems related to replication might this situation cause?

· What is your recommended solution?

Reference no: EM13754192

Questions Cloud

Types of executive compensation arrangements : Ajax Corporation is a young high-growth company engaged in the manufacture and distribution of automotive parts. Its common stock has doubled in value since the company was listed on the NASDAQ exchange about two years ago. Ajax currently has a high ..
Ending finished goods inventory is budgeted : Jasmine Company produces hand tools. Budgeted sales for March are 10,000 units. Beginning finished goods inventory in March is budgeted to be 1,400 units, and ending finished goods inventory is budgeted to be 1,300 units. How many units will be produ..
Which enlightened monarch was the most enlightened : provided links to primary sources that you will examine to help you answer the focus question: Which enlightened monarch was the most enlightened?
What amount of these investigation costs can angel deduct : While she was a college student, angel lived by a bookstore located near campus. she thinks a bookstore located on the other side of campus would be successful. she incurs expenses of 42,800 (legal fees, accounting fees, marketing survey, etc.) in ex..
Managing access to an active directory environment located : How do you plan to recover from these types of loss of current AD DS and other critical information. What utilities might you investigate to help accomplish your plan
Markup percentage using a total-cost approach : Morales Corporation produces microwave units. The following per unit cost information is available: direct materials $36; direct labor $24; variable manufacturing overhead $18; fixed manufacturing overhead $40; variable selling and administrative exp..
Describe the accomplishments of copernicus and vesalius : Describe the accomplishments of Copernicus and Vesalius. Why were they considered founders of the Scientific Revolution?
Compute the target selling price : Mussatto Corporation produces snowboards. The following per unit cost information is available: direct materials $12; direct labor $8; variable manufacturing overhead $6; fixed manufacturing overhead $14;
What is the true horizontal length of a recorded distance ab : A 100-ft steel tape of cross-sectional area of 0.0020 in2, weight 2.4 lb, and standardized at 68Fo is 100.008 ft between end marks when supported throughout under a 15-lb pull. What is the true horizontal length of a recorded distance AB for the cond..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd