What account configuration would you recommend be used

Assignment Help Computer Engineering
Reference no: EM133404581

Case: A manufacturing company is running an Active Directory controlled network. They have localized service that operates as middleware between the industrial control system and the operator control software. To maintain operations, the computer always must remain on so that the machine is operational, otherwise the machine will error out and it will require maintenance staff to reset it prior to running again.

Currently you have the computer configured using a shared account. The shared account is setup so that multiple operators can come and go during the run of the day without disrupting the machine. Your security policy has recently been updated to remove the use of shared credentials and force users to login as themselves. This will help enforce password complexity, password history, and auditing. You need to replace the shared account.

What account configuration would you recommend be used?

Questions:

A. Configure the software to run using service account and have it running on boot

B. Configure guest account access on that local machine and segment it from the network

C. Let maintenance know that they will need to dedicate a user at each shift change to restart the machine

D. special OU for the operator account and remove the default domain policy from it

 

Reference no: EM133404581

Questions Cloud

What do you think about the fbi response to the discovery : Read the article below about the Arby's security breach. What do you think about the FBI's response to the discovery of the attack initially?
What has been your experience so far with microsoft windows : What has been your experience so far with Microsoft Windows?
Which condition involves extra chromosome : Which condition involves an extra chromosome? Which period begins when a sperm fertilizes an egg?
Write a program that uses a loop to display : which currently charges $2,500 per year for membership, has announced it will increase its membership fee by 4 percent each year for the next 6 years.
What account configuration would you recommend be used : Configure the software to run using service account and have it running on boot. Configure guest account access on that local machine and segment it from
How does windows 11 now come into play : What are some reasons why Windows 10 might/ might not be preferred in a medium to large business environment. Many businesses continue to run on Windows XP
Review the above ted talk with dame jocelyn bell burnell : Review the above TED Talk with Dame Jocelyn Bell Burnell, "Reflections on Women in Science--Diversity & Discomfort." What does she say about the gender roles
Nudge theory to make sense as tool individual : What is the basic assumption that must be accepted in order for nudge theory to make sense as a tool an individual,
List the details for all tournaments that have members : List the details for all tournaments that have members that play on TeamBlue have played in. Suppress rows with duplicate information. Sequence by tournament

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss two advantages of agile methods

Discuss two advantages and two disadvantages of agile methods. What is scope creep in software development? Explain three ways to deal with scope creep.

  Discuss the pgp and five services provided by pgp

Discuss the PGP and five services provided by PGP and Potential mobile device security risks and some potential solutions.

  Conduct research on a topic related to data analytics

Conduct research on a topic related to Data Analytics, or Machine Learning. It is highly recommended that the topic is related to your research area of interest

  Create a document containing pseudocode

Create a 1/2- to 1-page document containing pseudocode based on the revised program needs. Add the pseudocode statements to the existing pseudocode program.

  How can machine learning improve marketing

How Machine Learning Is Improving Work in Business. Read through the case and familiarize yourself with the reading assignment of this week and then go ahead.

  Describe success factors of erm program at mars incorporated

What represents the key success factors of the ERM program at Mars Incorporated? What improvements would you make? Create a new thread. As indicated above.

  Make a phonebook application using c++

make a Phonebook application using C++ STL (standard template library). Use the telephone number as the key and the name as the value.

  Write the line that declare and creates a 2-d array of chars

Write the line that declare and creates a two-dimensional array of chars, tictactoe, with 3 rows, each with 3 elements , and initialize it to all space.

  How knowledge or theories of security architecture applied

Provide a reflection of at least 600 words (or 2 pages double-spaced) of how the knowledge, skills, or theories of security architecture and design.

  Write a program in java that initializes a string

Write a program in java that initializes a string with "Mississippi". Then replace all "i" with "ii" and print the length of the resulting string.

  You will create a page in the folder named index html

You will create a page in the folder named index.html that should be an HTML page containing a link to every JPEG file in the directory.

  How does it seem they are converting letters to numbers

Eve intercepts the RSA message 365, 0, 4845, 14930, 2608, 2608, 0 sent from Alice to Bob. Alice and Bob are not using the scheme above.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd