Provide a brief explanation of what you accomplish

Assignment Help Other Subject
Reference no: EM133732584

Question: The principles of separation, isolation, encapsulation, fail-safe defaults/fail secure, and modularity will be implemented to help the network with layering defense security. This is important for the defense of the network.

Refer to the "2-2 Operating System Administration Lab" video to complete this assignment.

Part 1:

Provide screenshots to illustrate the successful completion of each task, and be sure to include the verification that the AD user restrictions are working. For each screenshot, include 1-2 sentences summarizing what the screenshot is illustrating.

In the Azure cloud environment, perform the following tasks onthe Windows Server 2019 VM:

Install patches and updates for the server.

In Active Directory, create security policies as described in the following bullet points, which will adapt the user accounts management and enforce restrictions on account usage.

Using the 10 users created in the "Topic 1 Benchmark - Active Directory Lab," add 3 users to the Research and Development Department group, 3 users to the Human Resources Department group, and the remaining 4 users to the IT Department group.
Limit the users in the Research and Development Department group to log-on hours from 9 a.m. to 8 p.m., Monday through Friday. Then enable and push out a group policy to automatically log users off the system when their log-on hours expire.
Apply the principle of least privilege to the users in the Human Resources (HR) Department group. Allow HR users to read and write access to all AD user account information.
Apply the principle of least privilege to the users in the IT Department group. Allow IT users to reset passwords and force a password change at the next log-on for all AD user accounts.

Verify that an HR user can edit a user account in AD.
Verify that an IT user can change a password and cannot edit a user account in AD.
Part 2:
Write a 250- to 500-word summary addressing the following:
Provide a brief explanation of what you accomplish when you install an operating system.
Explain why it is important to install patches and updates as an operating systems administrator.

Explain the significance of configuring appropriate authentication group policies as part of managing system services and user accounts.

Explain the interaction between security and system usability, and the importance of minimizing the effects of security mechanisms.

Reference no: EM133732584

Questions Cloud

How will apply primary-secondary source to future research : How will you apply primary and secondary source to future research?
Developing a leadership training plan : Developing a Leadership Training Plan - Present a brief description of charismatic and transformational leadership, and identify the attributes
What are implications for industrial relations environment : What are the implications for the industrial relations environment? Discuss your view of the NUPW's decision. In your opinion could this be political posturing
Calculate the ng consumption : Calculate the NG consumption in kg and Nm3. What is the efficiency Of the cycle in percentage? What is the ideal efficiency possible
Provide a brief explanation of what you accomplish : Provide a brief explanation of what you accomplish when you install an operating system. Explain why it is important to install patches and updates
Evaluate two interventions or techniques : Evaluate two interventions or techniques (CBT and experiential Therapy) and explore how these will be applied to the chosen case scenario.
Create an original posting : Discuss the following: After watching the video above, please discuss 3 key ideas you took from it. Instructions: Please review the expectations
Analyze their marketing strategy : analyze their marketing strategy (how does the local environment influence them), or create a hypothetical go-to-market strategy for expanding that organization
How does the short story battle royal connect to key themes : How does the short story, Battle Royal, connect to the key themes for the readings? How does Chimamanda Ngozi Adichie's TED talk intersect with the concepts?

Reviews

Write a Review

Other Subject Questions & Answers

  Robert merton conceptualization of strain theory

Robert Merton's conceptualization of Strain Theory involves the relationship between which two factors?

  Practices of bud-sex and straight girls kissing

Why do you think the practices of "bud-sex" and "straight girls kissing" exist?

  Q1 list and explain at least two other forms of persuasion

q1. list and explain at least two other forms of persuasion you engage in or are confronted by on a regular basis. are

  What are some of your fears about starting this internship

What are some of your fears about starting this internship? Did the speaker touch on anything that resonated with you as a new intern

  Explain the personal values and professional codes of ethics

Explain two conflicts between personal values and professional code of ethics that social workers encounter when working with the client in the video segment.

  What physical exam techniques would you focus

What physical exam techniques would you focus on for this patient? What diagnostic tests would you order for this patient? Be specific as if you were writing

  Stockbroker as communication specialist

Suppose you work for a stockbroker as a communication specialist, and you are given the task of notifying customers of a data breach that occurred.

  What is the difference between methodology and design

What is the difference between methodology and design as it relates to your QI projects? How will you be able to take the course concepts.

  What is the american dream

What is the "American dream?" How did the growth of big business impact the American dream? Explain which leisure opportunities could be part of the American dream

  Briefly describe the biochemical mechanisms

Briefly describe the biochemical mechanisms which are involved in and contribute to cerebral ischemic damage and stroke

  What is identity theft

What is identity theft? How can identities be stolen? What can be done to reduce the impact of identity theft on victims?

  Organization of ideas

Follow the links found in the Readings or Activities folder to learn about the Tuskegee Syphilis Study. Then search online for 2 more good sources of information about this experiment. Good sources could include websites, YouTube videos, scholarly..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd