Free Essay

Active

In: Computers and Technology

Submitted By moham553
Words 491
Pages 2
TASK
Eduwin College is a successful private college in the outskirts of Lonport. You are required to create an Active Directory structure for the organization based upon a single domain. The organization has three sections each of which has of twelve computers which are Languages, Technology and Business. Each section should each be given their own organizational unit (OU) and the management of the OU in respect of resetting passwords and adding users should be delegated to the appropriate member of the staff who should also be able to read all the user details. This is Francoise Lebonne (Languages), Nick Neverhere (Technology), and Alison Primm (Business). There are six other members of staff with administrative access, Peter Smith-Hampstead who manages the organization, Caroline Cotswold who is the system administrator, Dorothy Liddleton a student records administrator, Donald Truss, a support officer and Brian Bennett a clerical assistant.
You should create a Security Group for the students who will be using the classrooms and and a further Security Group for the three section managers. You will need to be able create a group policy object for each section to set the computer usage, wallpaper and software to be installed on the computers for each section. All users should have access to the V: drive which is used to store applications such as Adobe Acrobat reader.
You are required to show evidence that you can make a sample course notes file read/write for the administrative staff but read only for the students. You are required to show evidence that you can make a student records file read/write for the appropriate section manager but read only for the other section managers.
You are required to discuss briefly the use of Inheritance blocking and forcing giving at least one example each of how it could be used within the Eduwin scenario.
You are required to show evidence that you can prevent student phone numbers on the user information from being read by anyone other than Dorothy Liddleton and the appropriate section manager

MARKING CRITERIA • Install Active Directory into a new domain creating a new domain which is MY ACADEMIC USERNAME: (SA12BCT) and introduce a client PC to the domain. A virtual machine will be made available for this test. (evidence should be implicit in the successful completion of other requirements)

• You are required to show evidence that you can create three new organizational units (OU) and delegate the management of the OU's to the appropriate persons as set out above in respect of resetting passwords and reading all user information to a small group of administrators.

• You are required to show that you can create a Security Group for all the students and a further Security Group for the three section managers.

• You are required to show evidence that you can create a new group policy object and link it to an OU to enforce a different desktop wallpaper for each section.

Similar Documents

Free Essay

Active Liberty

...Mariah WolfeHist 410Active Liberty Paper5/1/12 The book Active Liberty by Stephen Breyer is a response to Antonin Scalia’s A Matter of Interpretation. Breyer takes a liberal stance on issues that Scalia addresses. Three points that I found interesting are the six elements Breyer uses in interpreting law and how he emphasizes them, the difference between modern liberty and active liberty, and how Breyer applies active liberty in different scenarios. Early on in the book, Breyer says that there are six elements used when interpreting a law - language, history, tradition, precedent, purpose, and consequence. However, he goes on to say that although all judges uses these different elements, they emphasize them all differently. For example, one judge might put more emphasis on purpose and consequence, while another might concentrate more on tradition and language. This can affect whether or not a judge looks at a law with a loose or strict interpretation. One who uses the first combination might have a strict view of the law because he or she knows what will happen afterwards. Taking into account language and tradition, however, might allow one to have a broader view of the law because they are taking into account how the laws were used before and what exactly the law is saying. Another point that Breyer touches on, which could also be considered the main argument in the book, is the difference between modern and active liberty. Modern liberty, also known as civil liberty,......

Words: 593 - Pages: 3

Premium Essay

Active Directory

...Riordan Active Directory Migration Tyler Dresslar POS 421 September 3, 2012 R.Chung Riordan Active Directory Migration Introduction With regards to Riordan Manufacturing acquiring new severs with Active Directory Technology, the company must look at migrating to Windows Server 2008 R2 in order facilitate the streamlining of work for the Information Technology Department. Moving to Active Directory will save Riordan TIME and MONEY, the benefits of such a move and implementation will be explained in the following paragraphs. Microsoft Active Directory Domain Services are the foundation for distributed networks built on Windows 2000 Server, Windows Server 2003 and Microsoft Windows Server 2008 operating systems that use domain controllers. Active Directory Domain Services provide secure, structured, hierarchical data storage for objects in a network such as users, computers, printers, and services. Active Directory Domain Services provide support for locating and working with these objects. Windows 2000 Server and later operating systems provide a user interface for users and administrators to work with the objects and data in Active Directory Domain Services. Network administrators write scripts and applications that access Active Directory Domain Services to automate common administrative tasks, such as adding users and groups, managing printers, and setting permissions for network resources. Independent software vendors and end-user developers can use......

Words: 603 - Pages: 3

Premium Essay

Active Learning

...Active learning is learning which engages and challenges students thinking using real-life and imaginary situations. Students are encouraged for example through the method of pair work to develop their own thoughts and ideas, to resolve problems by themselves, and to talk to and listen to their peers improving on their listening skills. (Chickering and Gamson1987), suggests that students must do more than just listen. ‘They must read, write, discuss, or be engaged in solving problems. Most important, to be actively involved, students must engage in such higher-order thinking tasks as analysis, synthesis, and evaluation. Within this context, it is proposed that strategies promoting active learning be defined as instructional activities involving students in doing things and thinking about what they are doing’.Students and their learning needs are at the center of active learning which makes it very effective when introducing this pedagogical approach in any lesson. Some active-learning techniques are easier to use in your class and some are harder when it comes to teaching. Teaching methods are constantly changing with teacher and school introducing new pedagogical approaches to teaching, but time and time again active learning producing a much higher sense of achievement and accomplishment in comparison to the old didactic methods of route learning in school. Teaching is becoming more practical nowadays where students are becoming actively more and more involved in...

Words: 735 - Pages: 3

Free Essay

Active Directory

...To back up Active Directory, you must install the Windows Server Backup feature from the Server Manager console. To perform backups from the command line, you will also need to install Windows PowerShell. Windows Server Backup supports the use of the disk drives as backup destinations. Windows Server 2008 supports two types of backup: • Manual backup: This type of backup can be initiated by using Server Backup or the Wbadmin.exe command-line tool when a backup is needed. You must be a member of the Administrators group or the Backup Operators group to launch a manual backup. • Scheduled backup: Members of the local Administrators group can schedule backups using the Windows Server Backup utility or the Wbadmin.exe command-line tool. Scheduled backups will reformat the desired drive that hosts the backup files, and can only be performed on a local physical drive that does not have any critical volumes. With all this taken into consideration I would perform a manual backup every time a major change is taking place and then use a scheduled backup every month to make sure every small change is saved and is not over looked. When a domain has multiple domain controllers, the Active Directory database is replicated within each domain controller. Windows Server 2008 allows several different restoration methods, depending on the goals for your restore. Wbadmin, is the command-line component of the Windows Server Backup snap-in, which restores a single Active Directory domain......

Words: 423 - Pages: 2

Free Essay

Active Dir

...Active Directory Design Guide Thursday, 25 February 2010 Version 2.0.0.0 Baseline Prepared by Microsoft Prepared by Microsoft Copyright This document and/or software (“this Content”) has been created in partnership with the National Health Service (NHS) in England. Intellectual Property Rights to this Content are jointly owned by Microsoft and the NHS in England, although both Microsoft and the NHS are entitled to independently exercise their rights of ownership. Microsoft acknowledges the contribution of the NHS in England through their Common User Interface programme to this Content. Readers are referred to www.cui.nhs.uk for further information on the NHS CUI Programme. All trademarks are the property of their respective companies. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. © Microsoft Corporation 2010. All rights reserved. Disclaimer At the time of writing this document, Web sites are referenced using active hyperlinks to the correct Web page. Due to the dynamic nature of Web sites, in time, these links may become invalid. Microsoft is not responsible for the content of external Internet sites. Page ii Active Directory – Design Guide Prepared by Microsoft, Version 2.0.0.0 Last modified on 26 February 2010 Prepared by Microsoft TABLE OF CONTENTS 1 2 Executive Summary ..............................................................................................

Words: 43732 - Pages: 175

Premium Essay

Active Directory

...Chapter 1: 1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU 2. Which of the following domain controllers can be joined to a forest that is currently set at the Windows Server 2008 forest functional level? a. Windows 2000 b. Windows Server 2003 c. Windows Server 2008 d. Windows NT 4.0 3. You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers? a. Delegation of control b. Read-only domain controller c. Multimaster replication d. SRV records 4. The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called __________. a. Copying b. Osmosis c. Transferring d. Replication 5. The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not replicate its changes to other domain controllers within Active Directory. a. Secondary b. Primary c. Read-Only d. Mandatory 6. What type of trust is new to Windows Server 2008 and is only available when the forest functionality is set to Windows Server 2008? a. Parent-child trust b.......

Words: 591 - Pages: 3

Free Essay

Active Directory

...following Windows Server 2008 services: i. Active Directory Federation Services ii. Active Directory Lightweight Directory Services iii. Active Directory Certificate Services iv. Active Directory Rights Management Services i. Active Directory Federation Services is a standards-based service that allows the secure sharing of identity information between business partners (know as federations) across the extranet. When a user needs to access a Web application from one of its federation partners, the users own organization is responsible for authenticating the user and providing identity information in the form of "claims" to the partner that hosts the Web application. The hosting partner uses its trust policy to map the incoming claims to claims that are understood by its Web application, which uses the claims to make authorization decisions. ii. Active Directory Lightweight Directory Services is a Lightweight Directory Access Protocol (LDAP) directory service designed for use with directory-enabled applications. A directory-enabled application is one that uses a directory, as opposed to a database or flat file, for its data store. iii. Active Directory Certificate Services is an Identity and Access Control security technology that provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies. iv. Active Directory Rights Management Services is an......

Words: 563 - Pages: 3

Premium Essay

Active Directory

...Travis Miller There are two different way of backing up the computer that use the Active Directory on their computer systems. The first way that they would backup there computer that use the Active Directory is by using a Manual backup. The way that they would go by doing that would be going into the computer and open up the Administrators group or the Backup Operators group to launch a manual backup on their computers in the office. The other that they would backup there computer is by doing a schedule backup. They would have to go through the Administrators group on the computer then they would have to schedule a backup by picking when they would want the backup to start and what date they would like it on. They would also have to pick what files they would want to be saving and what drive they would like to be backup. The way to have a recovery plan for the Active Directory they would have to do a restore on the Active Directory because that is the only way to bring it back. That mean that they would have to go in the computer and they would have reinstall the Active Directory on the computer system that they are using at the time that it happen on the computer. To do a monitoring scheme on Active Directory they will have to go through the Administrative Tool folder on the computer. Then they would have to pick the one that say performance monitor. Then from there they could do whatever they want on the computer....

Words: 267 - Pages: 2

Free Essay

Active Directory

...Active Directory Scenario: The small business that you created new domain controllers for now wants you to develop a backup and recovery plan for Active Directory. You also need to develop a monitoring scheme to ensure the new Active Directory environment remains available. Explain this backup and recovery plan along with the tools needed to monitor the active directory environment. Submission Requirements: Submit your response in a 1-2 page Microsoft Word document through the Questa Learning Plan. Evaluation Criteria: Your instructor will use the following points for evaluating your performance in this assessment: * Did you discuss a backup strategy or Active Directory? * Did you discuss a recovery plan for Active Directory? * Did you discuss a monitoring scheme for Active Directory? Windows Server Backup provides several Group Policy settings that give you some limited control over how backups work on your servers. With these backup policies, you can mitigate some of the risks associated with people performing unauthorized backups to obtain access to unauthorized data. The options include: Allow Only System Backup If this is set, Windows Server Backup can only back up critical system volumes. It cannot perform volume backups. Disallow Locally Attached Storage as Backup Target When enabled, this setting does not allow backups to locally attached drives. You can only back up to a network share. Disallow Network as Backup Target This setting does......

Words: 297 - Pages: 2

Free Essay

Active Directory

...IS3340: Week 1 Assignment 1: Adding Active Directory Bob Johnson IS3340: Windows Security 11/02/2014 Arthur Salmon When evaluating the current set up for all of the PCs that we have at Ken 7 Windows and the purchase of a new enterprise resource planning (ERP) software package, I would definitely recommend that we use Active Directory (AD). There are several reasons to use AD. I will give a few reasons why we should use AD. My first reason is that with the purchase of the new servers we have a wider area to protect. With this being that, we have purchased several new servers that need to be more secure and restrict access to the key people or groups of people that need access to pertinent information. Secondly, by doing this we can activate a more secure password criteria. Making passwords of no less than eight characters long and they must contain a capital letter, a number, and a special character. These passwords will be set to renew anywhere from 30 – 90 days. The most common setting for this feature is 90 days. A notification will sent to the user 14 days prior to the password’s expiration and prompt the user to change their password. Thirdly, special access tokens will be used to insure the identity of the user. A smart card will be in place. This smart card slips into a slot and read a magnetic strip, a microchip that is imbedded into the card, or a by a bar code on the back of the card. Using the bar code will be the less expensive route to take.......

Words: 469 - Pages: 2

Premium Essay

Active Directory

...Project- Windows 2012 Management 12/5/14 Active Directory is a directory service that Microsoft developed for Windows domain networks and is included in most Windows Server operating systems as a set of processes and services. An Active Directory domain controller authenticates and allows all users and computers in a Windows domain type network- assigning and enforcing security policies for all computers and installing or updating software. When a user logs into a computer that is part of a Windows domain, Active Directory checks the submitted password and determines whether the user is a system administrator or normal user. Active Directory makes use of Lightweight Directory Access Protocol (LDAP) versions 2 and 3, Microsoft's version of Kerberos, and DNS. Active Directory, like many information-technology efforts, originated out of a democratization of design using Request for Comments or RFCs. The Internet Engineering Task Force (IETF), which oversees the RFC process, has accepted numerous RFCs initiated by widespread participants. Active Directory incorporates decades of communication technologies into the overarching Active Directory concept then makes improvements upon them. Microsoft previewed Active Directory in 1999, it was first released with Windows 2000 Server edition, and revised it to extend functionality and improve administration in Windows Server 2003. Additional improvements came with Windows Server 2003 R2, Windows Server 2008, and......

Words: 627 - Pages: 3

Premium Essay

Active Listening

...Monday, 10th August 2015 Anasthasia, Varsha, Kavi, Hussein, Sunny Customer Services Active Listening Presentation Anasthasia – Slide 3, 4 Slide 3 Ask the class what they understand by active listening. Take around 2, 3 answers. Listening is such a powerful tool – it conveys to people that you are here to listen to them – that you are not pre-occupied with something that is distant and irrelevant. To listen; To feel as well as words – Words, emotions, implications. Focus on the speaker; Don’t plan, speak or get distracted. Look at the speaker. Use verbal and non-verbal encouragements; Why encouragement ? [Ask the class if anyone knows why ] * Convey interest and Keep the person talking. * Concentrate attention upon the speaker * Don’t agree or disagree. Use noncommittal words in a positive tone of voice. * Repeat one or two words of the person's previous statement. * Be aware of your body language! * Use varying voice intonations Verbal encouragement; Make use of words like: * “I see” * “Right” * “Uh huh”… * “Okay” * “Sure” * “Yeah” * “Yes” * “Wow” * “Really?” Non verbal encouragement; * Maintaining appropriate eye contact with the interviewee. * Occasionally nodding affirmatively to display understanding and interest. * Using expectant pauses to indicate to the interviewee that more is expected Various forms of non-verbal communication: * touch ...

Words: 1005 - Pages: 5

Free Essay

Active Directory

...1.By using SYBEX, please write step by step to A) Create new subdomain named by KualaLumpurCampus B) Create site name TimaBuilding C) Create new TWO (2) server object within TimaBuilding site, type ExamUnitTima & AdminTima D) Create another site name BlockA with a server object name BlockALibrary E) Create OU structure F) Create Active directory object G) Create and publishing printer H) Create and publishing shared folder 2. Find step by step how to assigning user privileges using Active Directory. 1. Go to Start} Programs} Administrative Tools} Active Directory Users and Computers. 2. Double-click the domain node in the console tree. 3. Click the Users folder. 4. Right-click on the GFI_ESEC_Floppy_ReadOnly folder and click Properties. 5. Click the Members tab and click Add. 6. Click Look in to display a list of domains from which users and computers can be added to the group. 7. Select your domain. 8. Click on your user name and then click OK. Testing Since the user groups created by GFI EndPointSecurity are already configured (and assigned privileges) in the default protection policies. You will be automatically assigned read privileges as soon as you add your name to the GFI_ESEC_Floppy_ReadOnly group, without having to bring up the GFI EndPointSecurity user console. To verify this: 1. Insert a formatted floppy......

Words: 735 - Pages: 3

Free Essay

Active Shooter

...Active School Shooter Introduction The intention of this paper is to look at and present some issues and strategies that members of a school community think about when trying to create safer schools. Particularly when addressing an active shooter in a school setting. A major issue to consider when trying to keep all schools safe, is the simple fact that no two schools are the same. Understanding this can lead us to the conclusion that it is impossible to have one global plan or program that can be 100% effective in all schools. “Violence prevention programs work best when they incorporate multiple strategies and address the full range of possible acts of violence in schools. For any set of policies to work, it must be established and implemented with the full participation and support of school board members, administrators, parents, students, community members, emergency response personnel, and law enforcement.” (Kramen, 2008.) If these responsibilities were not shared, the success rate for safe school policies would be very low. Parents send their children to school and think that during that time they are studying and doing other productive, educational things. The last thing parents expect is something terrible happening to their child while at school. School violence is happening more frequently than it should and something needs to be done to stop it. Not only does an act of school violence, especially a school shooting, affect the individual student it reflects......

Words: 7891 - Pages: 32

Free Essay

Active Directory

...Windows Server 2003 Active Directory Judith Che Strayer University of Maryland Author Note Judith Che, Strayer University of Maryland. Any questions regarding this article should be address to Judith Che. Strayer University Maryland, White Marsh, MD 21085. Company’s today relay on good networking in order for their business to grow and succeed. A system engineer requires the ability, knowledge, and skill to plan and manage today’s networking which faces an ever-increasing variety of applications. We need to be skilled and informed to manage a network running Windows Server 2003 Active Directory. Present day networking administrators have difficulties ensuring that network resources are available to users when access is needed and securing the network in such a way that available resources are accessible to the proper user with the proper permission. We will have to solve networking problems including troubleshooting, configuration, installation, administration, and managing element. Starting from choosing the best Windows Server 2003 Edition that will meet the company’s needs in terms of price, performance and features; work group woes, name resolution nightmares and DNS name conflicts to server security. These problems can be solved with proper planning, managing, and designing a day-to-day administration of an Active Directory domain within their Windows Server 2003 network environment. We predict that implementing a Windows Server 2003 Active Directory will......

Words: 5782 - Pages: 24