How will the procedures for making changes

Assignment Help Computer Network Security
Reference no: EM132816084

Project: Securing a Microsoft Windows Environment

Project Part 1: Active Directory Recommendations

Scenario
Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company's network.

Tasks
Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access.In Active Directory, where will system administrators createusers?

2. How will the procedures for making changes to the user accounts, such as password changes,be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts afterconverting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers,how will Active Directory address that issue?

SECTION 1: Hands-On Demonstration

Part 1. User and Group Administration

23. Make a screen capture showing the members of the Managers group and paste it into your Lab Report file.

Part 2. Resource Management

Make a screen capture showing the updated share permissions for the MGRfile folder and paste it into your lab report.

Make a screen capture showing the updated share permissions for the HRfiles folder and paste it into your lab report.

Make a screen capture showing the updated share permissions for the SFfiles folder and paste it into your lab report.

Part 3. Practical Application

Make a screen capture showing the text file for HRUser01 in the HRfiles folder and paste it into your Lab Report file.

Make a screen capture showing the text file for SFManager in the SFfiles folder and paste it into your Lab Report file.

Make a screen capture showing the text file for SFManager in the MGRfiles folder and paste it into your Lab Report file.

SECTION 2: Applied Learning

Part 1. User and Group Administration

7 Make a screen capture showing the two new users within the Contractors OU and paste it into your Lab Report file.

Part 2. Resource Management

4. Make a screen capture showing the contents of the CoreFiles directory and paste it into the Lab Report file

14. Make a screen capture showing Advanced Security Settings for the yourtown directory and paste it into the Lab Report file.

Part 3. Modify Permissions Using a Script

5. Make a screen capture showing the result of attempting to create a new test file and paste it into the Lab Report file.

7. Repeat steps 2-4 for the ANewuser account and describe the results in the Lab Report file.

10. Repeat step 4 and describe the results in the Lab Report file.

In the Lab Report file, explain why you received the results you did in steps 4, 7, and 10.

SECTION 3: Lab Challenge and Analysis

Analysis and Discussion

Use the Internet to research the SYSTEM account. Why is it necessary to include this account with full control on a directory?

Tools and Commands

Using the icacls utility, document the command that will give the ANewuser account write access to the yourschool folder.

Challenge Exercise
Using your work in this lab as a guide, create a three-level directory structure for your family tree (grandparents, parents, children). You will need to create user accounts for each member of the family (at least 2 in each generation), create groups for each generation, and then secure the folders so that only members of a single generation can write to files within that generation's directory. Make screen captures to document your progress and describe your process.

Attachment:- Active Directory Recommendations.rar

Reference no: EM132816084

Questions Cloud

How should tim report the nol : June 30, 2019 the LLC reports an operating loss for $30,000. Tim is a 10% member of the LLC and has $2,300 basis for the LLC. How should Tim report the NOL?
Should the proposal be accepted for a price per unit : Davis Kitchen Supply produces stoves for commercial kitchens. Should the proposal be accepted for a price of $216 per unit to the outside contractor?
Forecasting model to estimate afn for the upcoming year : A firm has developed a forecasting model to estimate its AFN for the upcoming year. All else being equal, which of the following factors
Differences between descriptive and predictive categories : What are FOUR (4) differences between descriptive and Predictive categories of Data Mining. Each difference discussed must be clearly stated before describing.
How will the procedures for making changes : Evaluate the option of adding Active Directory to the companys network - System administrators currently create users on each computer where users need access
What in-house unit cost should be used to compare : What in-house unit cost should be used to compare with the quotation received from the supplier? Assume the payment to the outside contractor is $216.
Discuss about the infotech in a global economy : Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity.
What is the minimum acceptable selling price for the units : What is the minimum acceptable selling price for these units? An inventory of 460 units of an obsolete model of the stove remains in the stockroom
Determine the net impact of sale on the us current account : Determine the net impact of this sale on the U.S current account, capital account and overall balance of payment for the year 2018.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the rmf and how it relates to the cia concepts

Describe the RMF and how it relates to the CIA concepts and expands on them. Explain how this framework is used to address the need to protect information

  How can we identify security risks and assess their levels

So, how can we identify security risks, assess their levels, implement appropriate tests and other controls, and report security test results based on risk?

  How effective would this algorithm be against cryptanalysis

Consider radix-64 conversion as a form of encryption. In this case, there is no key. How effective would this algorithm be against cryptanalysis?

  Explain the functionality of a firewall and give an example

Explain the functionality of a firewall and give an example of a firewall. 200 word response. Describe a Network Address Translation (NAT). Provide an example of NAT.200 word response.

  Comparison of voice and ear biometrics

Need assistance on how to write a good report on named "comparison of Voice and ear Biometrics as a measure to passport control"

  Identify the type of internet access that you use at home

Identify the type of Internet access that you use at home or in school. Discuss the pros and cons of the service available within your area. Justify your response.

  How does the design meet the high availability requirement

How does the design meet the high availability requirement? Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks.

  Analyze the itil service management guidelines and principle

Describe the software engineering process, the challenges in managing software development activities, and the potential interface issues from the software development perspective.

  Compare various issues of building security into a system

Compare and contrast the various issues of building security into a system from the initial implementation versus adding security to an existing system. Discuss the problems and issues of one approach versus the other

  Organization managing public information on its web server

omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..

  Represent the encryption of plaintext

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Suppose y = DES(x, K) and y' = DES(c(x), c(K)), where c(·) denotes the bitwise complement of its argument

  Discuss tools and techniques for removing malware

Discuss tools and techniques for removing Malware? Discuss the role of the configuration control board (CCB) in the process of configuration control

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd