Active directory recommendations

Assignment Help Basic Computer Science
Reference no: EM132516566

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the  company's network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as  password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have
different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Reference no: EM132516566

Questions Cloud

Use of biometrics is invasion of privacy : Many people believe that the use of biometrics is an invasion of privacy. An eye scanning device records the inner structure of a person's eye
Business drivers for information security policies : You would not want to. Taking risks and making a return on those risks are essential to business. How you manage that risk is what makes businesses successful.
Ethical hacking-generally found on the darknet : What type pf content is generally found on the Darknet? What kind of information can be found using the hiddenwiki?
Analyze data from mobile devices : Do some research. What are the top two or three popular commercial forensic software that can forensically collect and analyze data from mobile devices?
Active directory recommendations : You are entry-level security administrator working for Always Fresh. You have been asked to evaluate option of adding Active Directory to company's network.
Globalization Of BMW-Rolls-Royce And The MINI : How do you think BMW integrates its various unique brands into global effort that works for them (BMW, Rolls-Royce, and the MINI) across world's global markets?
Newton method and Secant method : What is the difference between Newton's method and the Secant method? What is the difference between an array, a matrix, and a vector?
Grahics design : The memory in a frame buffer must be fast enough to allow the display to be refreshed at a rate sufficiently high to avoid flicker.
Corporate social responsibility or ethical culture : Pick one of the following terms for your research: Morals, principles, values, corporate social responsibility, or ethical culture.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Active directory replication topology for company

How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.

  Concept of whistleblowing as tattling

Why is it important not to view the concept of "whistleblowing" as "tattling" or "ratting" on another employee?

  Competitive value at the time of sale

How much is the bond's approximate (within $50) competitive value at the time of sale?

  What are the advantages of using group decision making

What are the advantages of using group decision making? Discuss the difficulties associated with sharing and collaboration in two processes

  Retrieve e-mail from a server

Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server?

  What procedure would you recommend in reaching a solution

At the same time, offending Bryant could lead her and perhaps other valuable engineers whom she supervises to leave the company. What procedure would you recommend in reaching a solution?

  Closed-looped methodology brings learning full circle

Whirlpool Mixes Up Its Managerial Training: Closed-Looped Methodology Brings Learning Full Circle

  Compute the sample size to achieve 80 percent power

Describe how you would compute the sample size to achieve 80% power, alpha = .05, and the appropriate effect size.

  What is the new internal diameter of the specimen

Assume that in the coefficient of friction is 0.16. If all other parameters remain the same, what is the new internal diameter of the specimen?

  What role end-users typically play in incident reporting

Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences?

  Summarize risk management and the book

Summarize risk management and the book in 250 - 300 of your own words. Was there any bias in any of the resources you used, and if so, how do you agree or disagree with the author?

  Describe solution to securely connect remote worker

Describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd