How will the procedures for making changes

Assignment Help Computer Network Security
Reference no: EM132816084

Project: Securing a Microsoft Windows Environment

Project Part 1: Active Directory Recommendations

Scenario
Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company's network.

Tasks
Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access.In Active Directory, where will system administrators createusers?

2. How will the procedures for making changes to the user accounts, such as password changes,be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts afterconverting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers,how will Active Directory address that issue?

SECTION 1: Hands-On Demonstration

Part 1. User and Group Administration

23. Make a screen capture showing the members of the Managers group and paste it into your Lab Report file.

Part 2. Resource Management

Make a screen capture showing the updated share permissions for the MGRfile folder and paste it into your lab report.

Make a screen capture showing the updated share permissions for the HRfiles folder and paste it into your lab report.

Make a screen capture showing the updated share permissions for the SFfiles folder and paste it into your lab report.

Part 3. Practical Application

Make a screen capture showing the text file for HRUser01 in the HRfiles folder and paste it into your Lab Report file.

Make a screen capture showing the text file for SFManager in the SFfiles folder and paste it into your Lab Report file.

Make a screen capture showing the text file for SFManager in the MGRfiles folder and paste it into your Lab Report file.

SECTION 2: Applied Learning

Part 1. User and Group Administration

7 Make a screen capture showing the two new users within the Contractors OU and paste it into your Lab Report file.

Part 2. Resource Management

4. Make a screen capture showing the contents of the CoreFiles directory and paste it into the Lab Report file

14. Make a screen capture showing Advanced Security Settings for the yourtown directory and paste it into the Lab Report file.

Part 3. Modify Permissions Using a Script

5. Make a screen capture showing the result of attempting to create a new test file and paste it into the Lab Report file.

7. Repeat steps 2-4 for the ANewuser account and describe the results in the Lab Report file.

10. Repeat step 4 and describe the results in the Lab Report file.

In the Lab Report file, explain why you received the results you did in steps 4, 7, and 10.

SECTION 3: Lab Challenge and Analysis

Analysis and Discussion

Use the Internet to research the SYSTEM account. Why is it necessary to include this account with full control on a directory?

Tools and Commands

Using the icacls utility, document the command that will give the ANewuser account write access to the yourschool folder.

Challenge Exercise
Using your work in this lab as a guide, create a three-level directory structure for your family tree (grandparents, parents, children). You will need to create user accounts for each member of the family (at least 2 in each generation), create groups for each generation, and then secure the folders so that only members of a single generation can write to files within that generation's directory. Make screen captures to document your progress and describe your process.

Attachment:- Active Directory Recommendations.rar

Reference no: EM132816084

Questions Cloud

How should tim report the nol : June 30, 2019 the LLC reports an operating loss for $30,000. Tim is a 10% member of the LLC and has $2,300 basis for the LLC. How should Tim report the NOL?
Should the proposal be accepted for a price per unit : Davis Kitchen Supply produces stoves for commercial kitchens. Should the proposal be accepted for a price of $216 per unit to the outside contractor?
Forecasting model to estimate afn for the upcoming year : A firm has developed a forecasting model to estimate its AFN for the upcoming year. All else being equal, which of the following factors
Differences between descriptive and predictive categories : What are FOUR (4) differences between descriptive and Predictive categories of Data Mining. Each difference discussed must be clearly stated before describing.
How will the procedures for making changes : Evaluate the option of adding Active Directory to the companys network - System administrators currently create users on each computer where users need access
What in-house unit cost should be used to compare : What in-house unit cost should be used to compare with the quotation received from the supplier? Assume the payment to the outside contractor is $216.
Discuss about the infotech in a global economy : Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity.
What is the minimum acceptable selling price for the units : What is the minimum acceptable selling price for these units? An inventory of 460 units of an obsolete model of the stove remains in the stockroom
Determine the net impact of sale on the us current account : Determine the net impact of this sale on the U.S current account, capital account and overall balance of payment for the year 2018.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd