Create a user with the following attributes

Assignment Help Basic Computer Science
Reference no: EM131413406

Hands-On Project 10-5: Denying Access to Specific Sites for Specific Users

Objective: Configure rule parameters to limit user access to Web functions.

Description: Although Internet access has become a necessity for many organizations, this access also presents problems. Employees might abuse their Internet access and hurt productivity by using social networking sites, or they could even endanger the organization by performing illegal acts through Internet access. TMG allows very specific restrictions to be configured. In this project, you create detailed restrictions for a single user.

1. On the Windows Server 2008 domain controller, create a user with the following attributes:

1920_90822440-fad2-4223-8b28-62164feb260a.png

2. In TMG, click Web Access Policy in the left frame. Click Create Access Rule in the right frame.

3. In the welcome window, type Web Abusers in the Access rule name text box, and click Next.

4. In the Rule Action window, verify that Deny is selected, and click Next.

5. In the Protocols window, HTTP and HTTPS are already selected. Click Add, expand All Protocols, select FTP, and click Add. Click Close, and click Next.

6. In the Access Rule Sources window, click Add, expand Networks, select Internal, and click Add. Click Close, and click Next.

7. In the Access Rule Destinations window, click Add, click the New menu, and click Domain Name Set. In the Name text box, type Social Networking Sites. Click Add, rename the New Domain as facebook.com, and click OK. From the Domain Name Sets list, select Social Networking Sites, and click Add. From the New menu, click Address Range. In the Name text box, type Linux Web Server. In both the Start Address text box and the End Address text box, type the IP address of the Linux Web server. Click OK. In the Address Ranges list, select Linux Web Server, and click Add. Click Close. Click Next.

8. In the User Sets window, select All Users, and click Remove. Click Add, and click the New menu. In the welcome window, type Web Abusers in the User set name text box, and click Next. In the Users window, click Add, and click Windows users and groups. In the Select Users or Groups window, click the Locations button. If the Windows Security window appears, enter administrator as the username and Pa$word as the password, and click OK. In the Locations window, expand Entire Directory, select Teamx.net, and click OK. In the Enter the object names to select text box, type cjack, and click Check Names. Captain Jack's name should appear underlined. Click OK, click Next, and click Finish. In the Add Users window, select Web Abusers, click Add, click Close, and click Next. Click Finish. Click Apply. In the Change description text box, type Web Abusers created and enabled. Click Apply, and click OK.

9. From the Windows 7 system, log on to the domain as Captain Jack. Open a Web browser and attempt to access the Linux Web server, as you did in Step 15 of Hands-On Project 10-3. Your attempt should fail. If your systems were connected to the Internet, access to Facebook and FTP sites would also be denied. 10. Log off the Windows 7 system, and log on as another domain user. Attempt to access the Linux Web server again. This attempt should succeed.

10. Log off all computers.

Reference no: EM131413406

Questions Cloud

Write a one to two page paper summarizing your findings : Write a one to two page paper summarizing your findings. The written summary should be double-spaced using 12-point Times New Roman font.
Nonprofit organization-differences from for-profit : Discuss briefly, but fully, a definition of a nonprofit organization and differences from a for-profit organization.
Identify and describe the stages of team development : Identify and describe the stages of team development.How might stronger team skills benefit you? How might you use teamwork skills in your job? Provide specific examples.What is it like to participate in a virtual meeting, such as web-based, teleconf..
Administration and politics dichotomy : What are the advantages and disadvantages of using such a dichotomy today as a way to advance that field of study? Support your case with examples.
Create a user with the following attributes : In the Protocols window, HTTP and HTTPS are already selected. Click Add, expand All Protocols, select FTP, and click Add. Click Close, and click Next.
Describe the discrepancy juxtaposing the theory and practice : Every HR manager has a list of "best practices" regarding personnel policies, but does the knowledge of these ideal practices always translate into their successful implementation? Unfortunately, there is often a discrepancy between an ideal pract..
Measure the performance of a warehouse : Provide a critical assessment based on the above article text readings, scholarly research, and personal experience. Cite your resources using APA format.
What are the three overall conclusions you have drawn : Based on all the information you are able to recover and your review, what are the three overall conclusions you have drawn about the health delivery sector you chose?
Adopting a centralized distribution system : Inventory can be reduced by (a) reducing order quantity, (b) adopting a centralized distribution system, (c) using common parts for different products, and (d) reducing lead time. Explain how inventory can indeed be reduced by each of the above fo..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd