What is the syntax command-line utility for joining a domain

Assignment Help Computer Networking
Reference no: EM133552195

Project

Complete the tasks and questions from this project

Part 1: IP Structure

1. You will be subnetting 10.0.0.0/24 for the Sandbox network.

2. The first usable IP address of the "Servers and Workstations" subnet will be used as the gateway IP address for the Servers and Workstations

3. You will need to subnet your network with the following information, please create a VLSM structure for your Sandbox:
Infrastructure: 9
Servers and Workstations: 120
Printers: 15
Wireless Aps: 32

Task 1. Enter your VLSM in the table provided in the workbook attached

Question 1: If the population of the network doubles, what will the Network ID and CIDR be? (Enter your answer in the workbook attached)

Part 2: Virtualization

4. Create a switch labelled WAS3-Proj-YOURFIRSTNAME-SW, on the Windows 10 Host machine (Please be sure to change "YOURFIRSTNAME" to your first name

5. Run the PowerShell cmdlets function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

then
Get-VMSwitch -Name "WAS3-Proj*"

3. Take a screenshot and paste it in the workbook attached

Task 2. Provide the screenshot in the workbook attached

Task 3. Provide the screenshot in the workbook attached

Question 2: What full Powershell command will create the virtual switch in this section? (Enter your answer in the workbook attached)

Question 3: When should you use the .vhdx format instead of .vhd format? (Enter your answer in the workbook attached)

Part 3: Installation and Configuration

6. Subnet Mask: of the Servers and Workstations Subnet

7. DNS: Second IP of the Servers and Workstations subnet

8. Gateway: First IP of the Servers and Workstations subnet

9. Enable: Remote desktop without network level authentication

10. Change: the time zone and time settings so the time is correct

11. Local Administrator account: "LocalYOURFIRSTNAME" replace "YOURFIRSTNAME" with your first name *** Make sure it has the same privileges as the Default Administrator Account, and so the password never expires.
- OPERATING SYSTEM: Server 2016 Datacenter with GUI
- IP: Second IP of the Servers and Workstations subnet
- Change: The hostname of the server to DC1

- As a security measure log into the Local Administrator account you created in step 1

Task 4. Provide the screenshot in the workbook attached

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Get-NetIPAddress | Format-Table

Task 5. Provide the screenshot in the workbook attached

- OPERATING SYSTEM: Server 2016 Datacenter with GUI
- IP: Third IP of the Servers and Workstations subnet
- Change: The hostname of the server to SVR1
- As a security measure log into the Local Administrator account you created in step 1

Task 6. Provide the screenshot in the workbook attached

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Task 7. Provide the screenshot in the workbook attached

- OPERATING SYSTEM: Windows 10 Pro
- IP: Fourth IP of the Servers and Workstations subnet
- Change: The hostname of the server to WS1
- As a security measure log into the Local Administrator account you created in step 1

Task 8. Provide the screenshot in the workbook attached

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Hostname

Get-timezone

Then
Get-NetIPConfiguration

c. Take a screenshot of all three commands and paste it in the workbook attached

Task 9. Provide the screenshot in the workbook attached

Question 4: A user returning from holidays has attempted to login 6 times, the account is locked out. Which Powershell command will you need to execute to allow the user to log into the domain again? (Enter your answer in the workbook attached)

Question 5: What Powershell cmdlet would you use to start an interactive session with a remote computer by the name of WS1? (Enter your answer in the workbook attached)

Part 4: DNS
12. Install the DNS role on DC1
13. Create the Domain called YOURFIRSTNAME.com replacing "YOURFIRSTNAME" with
your first name
14. Make sure that you allow both secure and nonsecure dynamic updates
15. Enable Reverse lookup zone for your domain
16. Make sure that you allow both secure and nonsecure dynamic updates
17. Create zone records:
function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-DnsServerResourceRecord -ZoneName YOURFIRSTNAME.com

Get-DnsServerResourceRecord -ComputerName DC1 -ZoneName "0.0.10.in- addr.arpa"

Task 10. Provide the screenshot in the workbook attached
Question 6: List 2 record types that are found on an AD DS integrated DNS that you
wouldn't find on a public DNS server (Enter your answer in the workbook attached)

Part 5: AD DS
a. Install the AD DS role on DC1

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-WindowsFeature | Where-Object {$_. name -eq "DNS"} | Format-List Name,Installstate
Then
Get-WindowsFeature | Where-Object {$_. name -eq "AD-Domain-Services"}
| Format-List Name,Installstate
g. Take a screenshot in the workbook attached

Task 11. Provide the screenshot in the workbook attached

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then

Get-ADOrganizationalUnit -Filter 'Name -like "*"' | Format-Table Name, DistinguishedName

f. Take a screenshot in the workbook attached

Task 12. Provide the screenshot in the workbook attached
3. Create a Global Security group for each OU

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADGroup -Filter 'Name -like "*Group"' | Format-Table Name,
Distinguishedname
c. Take a screenshot in the workbook attached
Task 13. Provide the screenshot in the workbook attached

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-ADUser -Filter 'Name -like "--*"' | Format-Table Name,
Distinguishedname,Enabled
e. Take a screenshot in the workbook attached

Task 14. Provide the screenshot in the workbook attached

Question 7: When is a user's access token created? (Enter your answer in the workbook attached)

Question 8: What is the interface within Active Directory Administrative Center that simplifies the delegation of permissions for domains, OUs, or containers? (Enter your answer in the workbook attached)

Question 9: Which term is described as the process of configuring one or more groups as members of another group? (Enter your answer in the workbook attached)

Part 6: Join Computers to the domain

18. Create an OU called Servers, and one called Workstations

19. Join SVR1 and WS1 to the Domain

20. Move SVR1 to the Servers OU

21. Move WS1 to the Workstations OU

22. Log into DC1 with your YOURFIRSTNAME-IT account you created

23. Open an administrative PowerShell prompt, and type the following Powershell cmdlets: function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
get-adcomputer -filter 'Name -like "*"' | FT DNSHostName,Enabled,DistinguishedName,SID
Take a screenshot in the workbook attached

Task 15. Provide the screenshot in the workbook attached

Question 10 What is the syntax command-line utility for joining a domain using Netdom.exe? (Enter your answer in the workbook attached)

Question 11 List an example of two graphical tool in Windows Server 2016 that can create user objects. (Enter your answer in the workbook attached)

Part 7: Group Policy
24. Create a Group Policy Object called "Workstations":

Task 16. Provide the screenshot in the workbook attached

25. Install the AD CS Certification Authority Role on SVR1

function global:prompt {[Environment]::MachineName+" "+[Environment]::UserName+" PS> "}

Then
Get-CACrlDistributionPoint
3. Take a screenshot in the workbook attached

Task 17. Provide the screenshot in the workbook attached

26. The Sandbox network will also require the use of IPv6 for future use when the company transitions to it. Using the standard IPv6 addressing and its built in subnets, create a subnetting scheme for future use with the Sandbox. Use ULA addresses for this IP architecture.
27. fc00:db8:2:1a:20:ab00::

Task 18. Enter your subnets in the table provided in the workbook attached

Attachment:- Project Workbook.rar

Reference no: EM133552195

Questions Cloud

How much can you save inpresent value terms by following : Which alternative would you recommend? How much can you save in present value terms by following your recommended alternative as opposed to issuing the EUR bond
What is he or she missing that is a critical component : What do you agree with regarding your peer's post? What did he or she illuminate for you? How has he or she helped you see the topic from a different
Describe organic and inorganic molecules required for life : Create a table using Word or PowerPoint to outline/describe the major organic and inorganic molecules required for life.
Summarize the gaap versus ifrs existing and pending : Summarize the GAAP versus IFRS existing and pending (if any) requirements for accounting for leases. Analyze the impact of GAAP and IFRS on the reporting
What is the syntax command-line utility for joining a domain : What is the syntax command-line utility for joining a domain using Netdom.exe and List an example of two graphical tool in Windows Server 2016 that can create
Describe the advantages of traditional or e-learning methods : Describing the advantages and disadvantages of the traditional or e-learning methods for teaching/learning of Anatomy and Physiology.
What is the balance in the investment account : taking into account that for the year ended DEC 31,2023. May reports 550,000 in net Income and declared dividends of 30,000. What is the Balance
What is larger net income attributable to the firm or cash : What is larger net income attributable to the firm or cash flow provided by operating activities? Did Kimberly-Clark pay more money to repurchase long-term
Why an average of hundred points be a biased estimate : Do you think that taking one of those classes would give a test taker 100 extra points? Why might an average of 100 points be a biased estimate?

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the purpose of an optical attenuator

Why is a tunable laser of importance in optical networking?

  Compare the multiplexing techniques tdma and fdma

What is the purpose of a mixer? Include a discussion of sidebands in your answer. Compare and contrast the multiplexing techniques TDMA and FDMA in the area of wireless networking.

  Write a short program to use and test data types

We have used several data types in the programs in chapter. Write a short program to use and test them. Write a short program to test memory functions we used.

  Theories of human factors as related to network design

What kinds of questions would you ask to better understand their environment and each group of users - assessment plan of the applications for performance

  Evaluate this situation in terms of how to best fine tune

situation you work for a large data processing organization. you are the network security administrator for the

  Explain the concepts of information systems security

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the org..

  Identify troubleshooting tools needed to verify

Identify troubleshooting tools needed to verify and manage your security settings. Identify at least three tools. Overall, the presentation will have 10 to 12.

  Effect of cell phone use

Can cell phone use while driving be compared with drunk driving? Why or why not? What other variables (such as age) can affect driving while using a cell phone?

  Determine whether you prefer a laptop or desktop

From the e-Activity, determine whether you prefer a laptop or desktop. Elaborate on the features that you would want your desktop or laptop to offer.

  List user access policies based on your research

List user access policies based on your research, and place them into a table with an introduction explaining the following: who, what, when, why.

  Question 1which one of the following statements about

question 1which one of the following statements about lot-sizing rules is true? the periodic order quantity poq rule

  BN208 Networked Applications Assignment

BN208 Networked Applications Assignment Help and Solution, Network Performance Analysis Assessment Writing Service - Melbourne Institute of Technology

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd