Configure the active directory

Assignment Help Computer Networking
Reference no: EM132300412

Assignment - Network Design and Implementation

Scenario A

You are a network specialist for ActiveDirectoryxx.com (where xx is the number of your assigned account student-xx to login to VSphere Client). You company have 4 servers running window server 2012 (Root-DC, Com-A, Com-B and Com-C). You are given a subnet 50.50.xx.0 (the value of xx is the same as above), mask 255.255.255.0. You are required to design and configure a network with active directory according to the following requirement:

Two server computers must act as active directory domain controller for the ActiveDirectoryxx.com, to support the high volume of user for your company. Among them, one should be configured as Read Only Domain Controller which does not allow modification of the active directory database. The root Domain Controller is located in Melbourne. Your company opens one branch in Sydney and takes the child domain name as Syd.ActiveDirectoryxx.com. Another computer should be configured as a member computer of the root domain.

Note: You can use the VMware provided in the Labs on campus or setting up your own VWware on your PC for this assignment.

If you choose to use the Labs' computers, before attempting the assignment tasks, you should take a Snapshot of the VMware DC, SYD-A, SYD-B and SYD-Core for backup.

If you choose to use your own PC, you are responsible for installation and maintenance of your own systems.

Task 1: Computer Preparation

If you use your own PC:

• Install fresh window server 2012 R2 on your VMware platform.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly.

If you use the VMware in computer labs:

• Take snapshots of your VMware for backup.
• Remove all Active Directory Installation from all computers.
• Name computers as Root-DC, Com-A, Com-B and Com-C
• Use ipconfig /all command in Windows Powershell and take screenshots show the names of your computers have been configured properly, and computers are not in any domain.

Task 2: Active Directory Design and Initial Setup

• Design and draw the network topology based on the above requirement. Clearly label the server computer names, assigned IP addresses, assigned domains, and DNS IP addresses.
• Set up the computers IP address and DNS IP address according to the proposed design.
• Use commands ipconfig /all to verify the configurations and ping to verify connection between computers, take screenshots of the computer information and pings.

Task 3: Active Directory Installation

• Configure the active directory following the proposed design.
• Capture necessary screenshots to demonstrate the steps taken to configure the network, and provide some explanation for your steps.
• After completed the configuration, take screenshot of Computers and Domain Controllers folder in Active Directory User and Computers of the root domain controller to verify the existing domain controllers and member computer in the network.

Task 4: Active Directory Management A - Group Management
• Create a security group named Melbourne_Group. Create a new group Managed Service Account named Sydney. Configure the group Managed Service Account to be used by computers that are members of the Melbourne_Group.

B - User Account Management:

• Create a new user named ADTest_User, and request user must change password at the first logon. Log on using a member computer to verify the setting is working. (Take screenshots of the account creation and log in process)
• Try to logon to the root domain controller using ADTest_User account. Why can't you login? Perform necessary configuration to enable ADTest_User to be able to login onto the root domain controller.

C - Policies Applications:

• Use Group Policy preferences to automatically delete the contents of the c:\Windows\Temp folder each time user ADTest_User signs on to a computer. Create some text files in the Temp folder, then log off and log in again using ADTest_User to verify the policy has been applied.

D - Software Restriction:

• Use a software restriction policy to block ADTest_User from opening iexplore.exe on any computer in the domain ActiveDirectoryxx.com.
• Log into a computer using ADTest_User and verify that ADTest_User cannot open iexplore.exe
• Log on to any computer using Administrator account and verify that iexplore.exe can be opened.

Assignment Specific Requirements

• You are required implement the active directory according to the tasks specified above.
• You will prepare a documentation that provides the network design and describes the steps taken and the screenshots of the system.
• The description of steps does not need to be as detailed as in the lab manual, but it should provide enough information for reader to understand what you did to achieve the desired outcome.
• Mark will be given to screenshot of the system and quality of the step description.

Verified Expert

This assignment is about VMWare workstation.Window Server and Active Directory Installation.We study the requirement for the installation and according to company requirement we perform the installation and that is for according to company requirement.

Reference no: EM132300412

Questions Cloud

Conducting performance appraisal on your manager : Today is the day in which your dm is collecting information from you and conducting a performance appraisal on your manager about their leadership style
What material has had the highest quantity sold : In the year that had the highest Net Sales, what division had the least Net Sales - What is the average customerRevenuein the Bikes Division in 2016
What are the characteristics of open communication climate : What are the characteristics of an open communication climate? Describe the organizational benefits of managers cultivating an open communication climate.
Time elements related to total lead time-value adds time : As the information collection process does include time elements related to total lead time, value adds time,
Configure the active directory : Active Directory Design and Initial Setup - Active Directory Management A - Group Management - Configure the active directory following the proposed design
Information to all employees about different markets : You are at a meeting with your manager and a group of employees. Your manager is giving financial information to all employees about different markets.
How does minor traffic violation apply to business law : Do you believe that ethical leaders are more successful in organizations? How does Minor traffic violation apply to business law?
Sales representatives on frequent basis : Contracting officers interact with suppliers and sales representatives on a frequent basis.
How might packing improvements affect transportation costs : How might packing improvements affect transportation costs?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd