Prepare a plan for utilizing active directory

Assignment Help Management Information Sys
Reference no: EM131581973 , Length: 3

Assignment : Permissions Oversight and Overview

Suppose you were contracted by a local medium-sized business to speak with its business unit leaders about the importance of resource permissions in organizations.

In your first moments on the job, you learn from a senior-level employee that the company just experienced a data theft incident at the hands of an employee, primarily due to the lack of permissions and resource segregation in the company.

You later learn that there are multiple file servers on the network on which full control permissions are applied for the domain "Everyone" group.

Write a two to three (2-3) page paper in which you:

Explain the basic need for and concepts of file / folder permissions and business unit resource segregation in organizations so the company leaders will understand the importance of each.

Specify the strategy you would utilize for leveraging the business unit leaders to gain the necessary buy-in to implement your plan for resource and data segregation in the company.

Justify the use of NTFS permissions for the folders / files on the network and explain the top two to three (2-3) reasons this is the most reliable option at the business unit leaders' disposal.

Prepare a plan for utilizing Active Directory and Group Policy Objects to achieve the goals of setting secure permissions on business unit resources.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Explain the various types of servers and services required within organizations.

Describe the need for and benefits of hardware and software integration in a server environment.

Demonstrate the ability to prepare, install, configure, maintain, and update a computer system for use as a server.

Demonstrate the ability to configure networking, file, remote management, and print services.

Describe the major functional challenges and configuration solutions associated with data storage.

Describe and configure secure systems, networks, and computing applications.

Analyze the creation, configuration, and maintenance of virtual servers, storage, and networks.

Use technology and information resources to research issues in server environments.

Write clearly and concisely about server administration topics using proper writing mechanics and technical style conventions.

Reference no: EM131581973

Questions Cloud

Prepare journal entries to record the preceding transactions : Prepare journal entries to record the preceding transactions on the assumption that the bonus (or no revaluation) method is used
Solve the equation : Solve the given equation - 11x-4yv(x^2+1 ) dy/dx=0
Define state health inspection services : In which line (or lines) of Table (the product approach) would the value of each of the following be counted? "Not counted in any category" is also an option.
What are the primary audiences for written communication : What are the primary audiences for written communication? What kind of tone would be most appropriate for this workplace?
Prepare a plan for utilizing active directory : Prepare a plan for utilizing Active Directory and Group Policy Objects to achieve the goals of setting secure permissions on business unit resources.
Resort when preparing chart : Do check year 2017's calendar and note the major festive season(s), public holidays and other events that are deemed relevant to the resort when preparing your.
What is the capital balance of the remaining three partners : Assume that the partners share profits and losses 3:3:2:2, respectively. If the goodwill method is used, what is the capital balance of remaining three partners
Define emerging technology in law enforcement : Provide one article or detailed advertisement regarding an application of emerging technology in law enforcement.
Paula wishes te grant te her daughter : Paula wishes te grant te her daughter, Sandy, the ability te live in a heme Paula purchased years age as an investment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Designing compliance within the lan-to-wan domain

Designing Compliance within the LAN-to-WAN Domain

  Develop a logical model of a proposed system

What potential problems would arise if you didn't develop a logical model and went straight to developing the technical design?

  Web servers and processorsif web servers do not need the

web servers and processorsif web servers do not need the fastest processors. yet when we look at the manufacturers and

  Managerial accounting case studies1 the opening paragraph

managerial accounting case studies1. the opening paragraph of an accounting textbook says managers need accounting

  Brief explanation of a strategic management

brief explanation of a strategic management processstrategic management process analysis implementation and evaluation

  Describe a specific web or mobile application purpose

Describe a specific web or mobile application'spurpose. How is it used? What changes has it brought about to its users?

  What is the standard time

The college uses a total allowance factor of 12%. Tate decides to delete all unusual observations from the time study. What is the standard time?

  Explain how the data collected in the project stakeholders

Explain how the data collected in the Project Stakeholders table could assist the project management team in defining the project scope

  What problems does a company face when someone hacks data

What problems does a company face when someone hacks into their data? Identify the legal aspects of loss of customer personal information? Compare and contrast the advantages of tables and views.

  Describe direct manipulation and virtual environments

Describe the three (3) principles of direct manipulation and give examples as to how they are used in video game controls.Analyze video game-type interfaces and discuss three (3) reasons why video game-type interfaces would not be effective for rea..

  Write a memo to the ceo of the company

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd