Analyse client system requirements

Assignment Help Operating System
Reference no: EM132861879

Operating Systems & Architecture

Assessment - Virtual Windows Active Directory Network / Server Virtualization

Learning Outcome 1: Analyse client system requirements and select the most suitable hardware, software or combination solution to meet those requirements
Learning Outcome 2: Employ industry best practices to the maintenance of a secure system, identifying security risks and implementing security measures

Specific Requirements for this virtualized network:

Part 1: Installing the network and setting up the network infrastructure

1. Using virtualization software, install 2 virtual machines. Use Server 2016 R2 (Desktop - GUI). One VM will act as the Domain Controller Server and the other VM will act as a Web server

2. Rename the server using the name DC followed by your student number as the server name. For example, if my student number is 2020123 I would name my server DC2020123

Rename this computer Windows System Properties.

Rename the second server using the name Web followed by your student number as the server name. For example, if my student number is 2020123 I would name my server Web2020123. Use Windows PowerShell to rename this computer.
3. Assign the server static IP addressing using the following configuration.
Server address: 192.168.0.100/24
The /24 indicates the subnet mask. Use 192.168.0.1 as the default gateway, for the preferred DNS Server address use 192.168.0.100 and for or the alternate DNS Server use 8.8.8.8
Web address: 192.168.0.200/24
The /24 indicates the subnet mask. Use 192.168.0.1 as the default gateway, for the preferred DNS Server address use 192.168.0.100 and for or the alternate DNS Server use 8.8.8.8
4. Test and demonstrate connectivity between the two devices by using the PING command.
5. Convert the first server (DC) into a Domain Controller. Notice that the DNS service is installed during the DC installation procedure (in other words your server will act as its own DNS server and the DNS service will get installed while Active Directory is installed). You will create an Active Directory domain following these specifications:
Use the name Domain2020-xyz.abc where xyz are the last 3 numbers of your student number (If your student number is 2020-123 you will use the name Domain2020-123.abc).
6. After the Domain Controller has been installed, join the Web computer to the Domain.
Part 2: Setting up the resources and network users
7. DigiTech has two departments. Using Active Directory Users and Computers (ADUC), create 2 departments (Organizational Units) called Accounting-Dublin and Sales-Dublin. Inside the Accounting-Dublin OU and in the Sales-Dublin OU create user accounts, and network groups as specified below:

8. Inside the Accounting-Dublin OU create a Global Security group called Accounting and then create the 5 Accounting users accounts shown below, using the names supplied. Inside the Sales-Dublin OU create a Global Security group called Sales and then create the 5 Sales users accounts shown below, using the names supplied.
For the PW: Use pass1234! And set it so user changes PW at next logon

9. Use ADUC to add each of the 10 users to their groups (Accounting and Sales).
10. Inside each departmental OU (Accounting-Dublin and Sales-Dublin), create and share two folders (one for each department) and apply permissions as specified here:

Create one folder for each department (Sales-Documents for the sales department and Accounting-Documents for the accounting department). Share each of the folders applying permissions as follows: You will apply both Share permissions and NTFS permissions.
The Sales group should have Full Control permissions for the Sales-Documents folder. Give the Accounting group Full Control permissions for the Accounting-Documents folder. You should remove the Everyone group when applying the share permissions.
Note: you will need to set the permissions on both the Share and Security tabs.
11. Test the permissions for both the Sales-Documents folder and the Accounting- Documents folder by logging onto the Web computer by using a user account from Dublin-Sales or a user account from Dublin-Accounting [for example, the Sales- Dublin user should be able to access Sale-Documents but not Accounting- Documents]. If asked to change the password during the first log-in, use pass1234$ for the password as we have been using.

Use UNC format to check the permissions: \\Server-name\Share-name

If the permissions do not work, go back to the Domain Controller and troubleshoot!

Testing the resources permissions: You should be able to demonstrate that the permissions are working for both the Sales and the Account folders. For example, if you log onto the Web server as a member of the Sales group, you should be able to access the Sales_Documents folder but have Access Denied on the Accounting folder.

12. Apply a password policy and an account lockout policy for the entire domain as follows: The password should have 9 characters, the account history should be 12 months, the maximum password age should be 30 days and the minimum should be 29 days.
The user should be locked out for 1 hour after 4 bad log-in attempts.
Part 3: Setting up and testing a simple web site.
1. Create a simple one-page Website for a company called DigiTech.abc (you do not need a fancy web page but include at least one picture and your name).
2. Using Internet Information Server (IIS) use the web page you created to set up a Web site on the Web computer (not the Domain Controller).
3. Use the DNS console to set up a DNS entry for the DigiTech web site.
4. From the Domain Controller you should use Internet Explorer to demonstrate that the Web site is working.
Part 4: Setting Up a DHCP Server for the Domain
1. Add the DHCP server role to the Domain Controller server computer using the Add Roles and Features in the Server Manager console [for this project, you do not need to add support for WINS or IPv6].
Configure DHCP using the DHCP console in Administrative Tools.
Use to following range of IP addresses for the IP Address Scope:
The DHCP Scope Name should be the name of your Domain (such as Domain2020123).
Starting IP address is 192.168.0.1 / Ending IP address is 192.168.0.254
The subnet mask should be /24 and the default gateway should be 192.168.0.1
The DNS server address should be 192.168.0.100. The lease duration should be for 24 hours
2. You will need to create four DHCP address exclusions. In the Address Pool create the following four exclusion ranges:
From 192.168.0.1 to 192.168.0.1
From 192.168.0.50 to 192.168.0.50
From 192.168.0.100 to 192.168.0.100
From 192.168.0.200 to 192.168.0.200
You will also need to create an address reservation for the Web computer... from Administrative Tools access the DHCP console.
In the Web computer find the MAC address of the Network Card (IPCONFIG/ ALL) and then go to the DHCP console and make a reservation called Web2020xyz where xyz are last digits of your student number and assign the IP address of 192.168.0.50
3. Configure the Web computer to dynamically receive the IP address from the reservation instead of using the static IP address (there is information that you will need to obtain from the Web computer). Demonstrate that both computers can still ping each other.

Part 5a: This is a challenge task. Attempt this only if you are willing to do some proper research. Download the software package needed for the Notepad++ software. Be sure to download the MSI version of the software installation program.
• Perform research that will show you how to use Active Directory Group Policy to install (assign) a software package (Notepad++.msi) from a shared network location. Notepad++.msi can be downloaded from the Internet.
• Create a Group Policy attached to the Sales department Organizational Unit. The policy should Assign the Notepad++ software to anyone from the Sales department who logs into the domain. Demonstrate that you have this working by logging into the Web Server as a member of the Sales group and provide screen captures showing that Notepad++ works.

Part 5b: This is a challenge task. This is a research project... only attempt it if you have time to perform proper research. Show all sources of reference for your research for this item.
• Use the Sale-Department and Accounting-Department JPEG images that are posted onto Moodle to set the wallpaper for each department. If a user logs on as a member of the Sales-Department they should see the wallpaper for that department and if they log in as a member of the Accounting-Department they should see the wallpaper for that department as the background on their PC desktop.

Part5c: Research assignment: Use examples to explain some of the advantages of using group policy in a Domain environment. In your explanation discuss what group policy is and how it helps a network administrator accomplish tasks rapidly. You must include at least two examples and you must include research references and explain why you chose these references.

Part 5d: DigiTech would like to have their ‘Employee Handbook' available from their Website through an FTP server. Add the FTP server feature to the DigiTech website that you installed in Part 3 above. There is a text file on Moodle called ‘DigiTech-Acceptable-Use-Policy.txt' that you should have the FTP server issue to requesting users.

Part5e: The users in the Accounting group should only be able to log in the network between 9 am and 5 pm. The users in the Sales group should only be able to log in the network between 8 am and 6 pm.

Attachment:- Operating Systems.rar

Reference no: EM132861879

Questions Cloud

Analyze political-economic-cultural and legal challenges : Analyze the political, economic, cultural and legal challenges the company currently faces in any of the country it operates
How can adp communicate value proposition : How can ADP communicate value proposition, as an employer of choice, to key talent segments with 3-5 years experience who would not traditionally think of ADP>
Highest return for the invested resource : Is it more prudent to hire contractors or in-house? Which arrangement produces the highest return for the invested resource?
Assignment on separation of duties : Discuss the importance of separation of duties within the information systems department.
Analyse client system requirements : Employ industry best practices to the maintenance of a secure system, identifying security risks and implementing security measures
Does the rise of e-government portend a degree of greater : Does the rise of "e-government" portend a degree of greater democratic participation in administrative decision making? Why or why not?
Compute the amount of depreciation to be recognized : Central Auto Rentals purchased 60 new automobiles at a cost of $15,760 per car. Compute the amount of depreciation to be recognized for each mile
What is transcultural corporate ethics : What is transcultural corporate ethics and how would this assist you if you had to create a global code of conduct for your company
What is market check : What is a "market check"? What is the usefulness - from either a legal or a business perspective - of conducting a market check?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd