Free Essay

Organizational Units (Ous) and Group Structure

In:

Submitted By robinmagg
Words 345
Pages 2
Organizational Units (OUs) and Group Structure name POS 421 date University of Phoenix

Organizational Units (OUs) and Group Structure
Option 1:
Each location contains two or more departments. Each department holds its own printer and computers allocated to a specific department and the main company officials. Communication will be set between each user, computer, data, and printer to ensure documents stay safe in within independent departments. User login and password will be assigned to each person inside the department’s group. Group privileges will be set according to job descriptions in each department and store in each department’s OU file. The Organization Unit (OU) will hold the hierarchy for users, data, and equipment permission for each location. The UO will ensure only the departments in each location have permissions for computers and printers for each department. CompanyA.com users will have unlimited access across the departments as shown in fig 1.1.
Domain Fig. 1.1

The group structurer allows administors to set groups and prived the nessary permission setting according to the resources needed for daily acitivies within the orginazation departmental structure. For example a manager group in one department might have different privlege setting to devices and data then the average employee group for the department. However people who work in the human resource department will have more abilitites to view vital data infromation then a person in the anther department whereas the CEO or the owner of the company may end up in a group the has privlages to all data and the IT department will have a group set to full permissions over all devices and data to help detect issues such as perform/user errors, updates, viruses, intruders, and other preventive maintence pratices. The group user structure is shown in fig 1.2.
Group Stucture Fig 1.2
Assigned to
Assigned to
Permissions
Permissions

Resources
Resources
Group
Group
User
User

References
Morimoto, R. (2010). «Windows Server 2008 R2 Unleashed» (Rev ed.). Unknown: Pearson Education Inc..
Panek, W. (2010). «MCTS Windows Server 2008 R2 Complete Study Guide» (Rev ed.). Unknown: SYBEX.

Similar Documents

Premium Essay

Structuring and Monitoring of Organizational Units

...Structuring and Monitoring of Organizational Units Should computer objects remain in a single OU, or should the objects be divided by site? If divided, should the site OUs be under a single parent OU? Why? I would make it so that each site would have its own OU. This gives you the ability to allow others to manage portions of the Active Directory structure without affecting the rest of the structure. Delegating authority at the OU level only affects that OU and its hierarchy. By doing this you gain 2 main advantages. First you minimize the number of administrators with global privileges, and secondly limit the scope of errors. Administrative mistakes would only affect the respective OU structure. I would make the site OUs under a single parent OU. When group policies are created for an OU, the policies are applied to that OU and all child OUs within the hierarchy by default. Designing an OU structure with this in mind will simplify such things as application deployments and account logon policies. Should the ability to manage computer objects in sites be delegated directly to the user accounts of the desktop support personnel, or should groups be created, even though those groups might have only one or two members? How would this be accomplished? I would set it up where groups would be created even if some of the groups might only have one or two members. Even if there are only a few people in the group once it is set up it is easy to add people to it if you need to...

Words: 670 - Pages: 3

Free Essay

Week 4 Best Answer

...Week 4 Best Answers George Macdonald NTC/324 Feb 15, 2016 Professor Jason Kaluzny Lesson 13 Best Answer What is the key difference between groups and Organizational Units (OUs)? a. Because groups are independent from domain structure, its members may be located anywhere in the domain or outside the domain. b. You cannot apply Group Policy settings directly to group objects. c. OUs are containers, whereas groups are not containers. d. There is essentially no difference between OUs and groups. 2. An Active Directory functional level must be low enough to ensure interoperability between domain controllers running different versions of Windows Server. How does the functional level affect the AD forest? a. Higher functional level means more efficient AD communication. b. Higher functional level means few Global Catalog errors. c. Lower functional level means fewer features available. d. Lower functional level means time to upgrade the lowest servers. 3. What is the primary reason for creating different sites on an Active Directory network? a. To create geographical divisions within the Active Directory b. To provide another boundary when applying Group Policy settings (along with domains and OUs) c. To provide a layer of access control between objects in differing sites d. To control the amount of traffic passing over the relatively slow and expensive WAN links between locations 4. What is the simplest way for administrators to upgrade their Active...

Words: 1019 - Pages: 5

Free Essay

Boogyman

...answered to proceed: 1. Do you have a domain name to use? 2. How many forests and what would they be named? 3. Is there 1 or more company locations? 4. How many Organization Units will there be? Names? 5. How do you want the DNS infrastructure and security strategies to be created? Windows Server 2003 supports the Active Directory containers of forest, domain, site, and organizational unit (OU). So the only real restriction of one forest per namespace, you can deploy as many domains, sites, and OUs as you deem necessary. Remember the key to Active Directory is simplicity. Try to keep the number of domains to a minimum whenever possible. If you really need department level divisions on your network that reflect the organization of your business, then use OUs instead. OUs are much more flexible and easier overall to manage than domains. Remember that it is not necessary to create separate domains to divide administrative privileges. It is possible to delegate administrative privileges based on organizational units, within Active Directory. (Active Directory Planning and Design Guide, 2005) Here are some guidelines when deciding which OUs will be created: * Keep the OU structure as simple as possible * Do not nest OUs more than 10 layers deep * Keep the number of OUs to a minimum...

Words: 503 - Pages: 3

Free Essay

Active Directory

...Create site name TimaBuilding C) Create new TWO (2) server object within TimaBuilding site, type ExamUnitTima & AdminTima D) Create another site name BlockA with a server object name BlockALibrary E) Create OU structure F) Create Active directory object G) Create and publishing printer H) Create and publishing shared folder 2. Find step by step how to assigning user privileges using Active Directory. 1. Go to Start} Programs} Administrative Tools} Active Directory Users and Computers. 2. Double-click the domain node in the console tree. 3. Click the Users folder. 4. Right-click on the GFI_ESEC_Floppy_ReadOnly folder and click Properties. 5. Click the Members tab and click Add. 6. Click Look in to display a list of domains from which users and computers can be added to the group. 7. Select your domain. 8. Click on your user name and then click OK. Testing Since the user groups created by GFI EndPointSecurity are already configured (and assigned privileges) in the default protection policies. You will be automatically assigned read privileges as soon as you add your name to the GFI_ESEC_Floppy_ReadOnly group, without having to bring up the GFI EndPointSecurity user console. To verify this: 1. Insert a formatted floppy disk in your floppy disk drive. 2. Open a text editor such as Notepad, type in some text and save the file on your desktop...

Words: 735 - Pages: 3

Premium Essay

Active Directory

...RFC process, has accepted numerous RFCs initiated by widespread participants. Active Directory incorporates decades of communication technologies into the overarching Active Directory concept then makes improvements upon them. Microsoft previewed Active Directory in 1999, it was first released with Windows 2000 Server edition, and revised it to extend functionality and improve administration in Windows Server 2003. Additional improvements came with Windows Server 2003 R2, Windows Server 2008, and Windows Server 2008 R2. With the release of the last, Microsoft renamed the domain controller role as Active Directory Domain Services (AD DS). It is also included in Windows Server 2012 and Windows Server 2012 R2. An Active Directory structure is an arrangement of information about objects. The objects fall into two broad categories: resources and security principals (user or computer...

Words: 627 - Pages: 3

Premium Essay

Unit 8 Active Directory Benefits

...Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains. Seeing through the forest The situation is different with Active Directory. Whereas the domain level was the highest level of abstraction in Windows NT, the highest level of abstraction in Windows 2000 and 2003 Server is the forest, which is basically a collection of domains. Microsoft chose to call this unit a forest because you can place domains into the forest, and you can place entire trees of domains into it. A domain tree consists of a parent, child, grandchildren, and great grandchildren domains. You can have as many layers of subdomains within a domain tree as is necessary to achieve the desired organizational structure. The Active Directory domain structure is handy to have whether your client’s network is big or small. As you may recall, in Windows NT, each domain had its own Administrator account and its own Domain Admin group that was responsible for managing that domain. In Windows 2000 and 2003 Server, the domain...

Words: 1131 - Pages: 5

Free Essay

Nt1330 Unit 7. Exercise 1. Ad Ou Planning Scenario

...NT1330 Unit 7. Exercise 1. AD OU Planning Scenario Review the following scenario: As an IT Administrator, you have been tasked with designing an Active Directory Domain Organizational Unit Structure for a new AD implementation at an existing organization. You are scheduled to meet with the management team and need to formulate a list of questions you will need answered in order to recommend an OU Structure appropriate to the organization. Develop a list of 5-10 questions to guide your design plan. 1.) How is the existing structure of the organization? 2.) How many departments will there be? 3.) How many sub-departments will be needed? These questions will help in documenting the existing structure of the organization so as to divide the administrative tasks into categories and document the administrators who are responsible for each category. Also, these will define the hierarchy of authority in the directory as well as what departments the company will have. 4.) What are the company’s physical/geographical sites? This will address the issue of different geographical divisions which will probably have different computer management needs. The design will be based on management of resources, users and geographical boundaries. This will make the administration easier. 5.) How many OUs will be needed within each Parent OU? 6.) Will departments need to share resources? 7.) What resources are required by each department? 8.) What group policies to be implemented and who’s...

Words: 331 - Pages: 2

Free Essay

Nt1230

...Stephanie McFadden NT1230 Unit 8 Assignment 1 The Just Legal Company in Figmont, Nebraska has acquired a new internet address - www.justafigmont.com. They want to set up a DNS server. What would a basic DNS file look like? Describe the file. The DNS or (Domain Name System) names the number mappings on your computer. For example www.justfigmont.com could be the number 160.92.3.6. This is achieved through the DNS. The DNS is a hierarchy. There are a small number of root domain name servers that are responsible for tracking the top level domains and who are under them. The root domain servers between them know about all the people who have name servers that are authoritative for domains under the root. A basic DNS file may look like this: C:\>nslookup Default Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 > set type=mx > bellcs.com Server: vnsc-bak.sys.gtei.net Address: 4.2.2.2 Non-authoritative answer: bellcs.com MX preference = 0, mail exchanger = bellcs.com bellcs.com nameserver = ns2.server766.net bellcs.com nameserver = ns.server766.net bellcs.com internet address = 66.78.26.7 "Setting up a Basic DNS Server for a Domain." Setting up a Basic DNS Server for a Domain. N.p., n.d. Web. 07 Aug. 2015. "Learn Exchange Server 2000: Setting Up DNS for Internet Access." RSS. N.p., n.d. Web. 07 Aug. 2015. Unit 8 Assignment 2 What benefits do you see in moving an organization to an Active Directory environment? Four Benefits of Moving...

Words: 689 - Pages: 3

Free Essay

2411 Chapter 1

...CHAPTER 1 · What are the main differences between the workgroup network model and the domain network model? · What might be a disadvantage of a large company using a peer-to-peer network model? · When considering the two GPO categories, how are they the same? How are they different? · What type of actions does the Local Policies/User Rights Assignments control? · In what order are policies applied? · How can you quickly identify a shortcut on the desktop? · What is a gadget on the desktop? · On the Start menu, what is the difference between the applications listed above the horizontal line and those listed below it? · What were some of the enhancements to the Start menu that were introduced in Windows 7? · Which keyboard shortcut allows you to view the desktop by making all windows on the desktop transparent? · In the Windows 8 interface, what replaces the Start button? · What different types of tiles are used and how can you differentiate them from each other? · What different methods can be used to bring up the App bar? · What is the difference between performing a swipe and a slide and the function of each? · How would you display the on-screen keyboard within a Windows 8 app? Within a traditional Desktop app? · Which keyboard shortcuts do you think you will consistently use? · How does the Search pane work differently from previous versions of Windows? NETWORKING MODELS A networking model defines how network components function and interact. The three...

Words: 3835 - Pages: 16

Premium Essay

Microsoft Active Directory Security

...leadership personnel from corporations large and small. The report will show how each company can independently profit from taking advantage from one or more of the strategies included. The report will explain the different strategies of the Infrastructure Optimization Model, how they can be implemented and the cost benefit for each. After reading through this report readers should have a greater understanding of how Active Directory secures a network and also how it can save on IT costs. Microsoft Active Directory English 101 Barb Simmons By Scott Morlin August 8, 2013 Computers are ubiquitous devices in our world today. Businesses and corporations rely heavily on computers to help keep their operations functioning as a cohesive unit. Everything from a company’s financial information, to product ideas, employee information, internal communications...

Words: 3558 - Pages: 15

Free Essay

What Are Functional Levels Designed to Do?

...WHAT ARE FUNCTIONAL LEVELS DESIGNED TO DO? Functional levels determine the available Active Directory Domain Services (AD DS) domain or forest capabilities. They also determine which Windows Server operating systems you can run on domain controllers in the domain or forest. However, functional levels do not affect which operating systems you can run on workstations and member servers that are joined to the domain or forest. What are the DNS requirements to install active directory? When you install Active Directory on a member server, the member server is promoted to a domain controller. Active Directory uses DNS as the location mechanism for domain controllers, enabling computers on the network to obtain IP addresses of domain controllers. During the installation of Active Directory, the service (SRV) and address (A) resource records are dynamically registered in DNS, which are necessary for the successful functionality of the domain controller locator (Locator) mechanism. What are trust relationships and how are they used? In the Windows NT domain model, domains had to be bound together through trust relationships simply because the SAM databases used in those domains could not be joined. What this meant was that where a domain trusted another Windows NT domain, the members of the domain could access network resources located in the other domain. Defining trust relationships between domains eliminates the need for an Administrator to configure user accounts in multiple...

Words: 2607 - Pages: 11

Premium Essay

Lot2 Task2

...Hacking Countermeasures & Techniques Distributed Denial of Service (DDoS) Best Practices Guide to Counter DDoS attacks: This Guide will cover Best Practices to counter DDoS attacks like the attack on the Universities Registration System Server (RSS) by infected computers (Bots). The attack by rogue software installed on computers located in University Computer Labs resulted in the shutting down web access to the RSS system. Coordinated by a central controller these Bots established web connections (HTTP protocol) to the RSS using up all available bandwidth. This prevented students from accessing the Web site/server for legitimate traffic during the attack. (Schifreen, R. (2006)) This is considered a Consumption of Resources attack using up all the resources of RSS bandwidth. (Specht, S. M., & Lee, R. B. (2004)) These best practices would help prevent and/or reduce the effects of such attacks. Industry best practices to counter DDoS attacks start with documentation that addresses procedures to be followed before, during, and after an attack. (Schifreen, R. (2006)) The establishment of a Security Incident Response Team (SIPT) trained to react to incidents reduces damage and duration of outages. Best practices include; training, network configuration, patch management, access control lists, encryption, intrusion detection, intrusion prevention, and traffic shaping. (Cunningham, B, Dykstra, T, Fuller, E, Gatford, C, Gold, A, Hoagberg, M, Hubbard, A, Little, C, Manzuik, S,...

Words: 1240 - Pages: 5

Premium Essay

Re: Week 5 Discussion 1

... | |10/6/2009 | | | Company Overview The purpose of this proposal is to implement wireless communication at Westwood Resort, address the current network status and how to improve network capabilities throughout the resort. The goal of the company is to provide free Wi-Fi access to guests and at the same time ensure that the internal network remain secure. In addition, the resort wants to provide better cell phone access in the Fitness Center. Westwood Resort is located in Atlanta GA; it is a single building structure which is composed of ten stories, 500 guest rooms, two banquet halls, seven meeting rooms, hotel lobby, reception, coffee shop, fitness center, and poolside. The Business Center and half the guest rooms are wired for internet access with a dedicated T-1 connection. The hotel currently runs an Ethernet network at 10Mbps with Linux as their primary application, and is a dedicated hotel property management system. The Westwood Resort is operating on wired network and has decided to implement a complete Wi-Fi solution in order to remain competitive and provide...

Words: 2827 - Pages: 12

Premium Essay

It 255

...Hana Laplant 4/12/12 Unit 4 Assignment 1&2 Enhance an existing it security policy framework Security policy planners must consider and the tasks they must complete to deploy an effective security audit policy in a network that includes computers running Windows 7 or Windows Server 2008 R2. Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them. To be well defined and timely, an auditing strategy must provide useful tracking data on an organization's most important resources, critical behaviors, and potential risks. In a growing number of organizations, it must also provide absolute proof that IT operations comply with corporate and regulatory requirements. Unfortunately, no organization has unlimited resources to monitor every single resource and activity on a network. If you do not plan well enough, you will likely have gaps in your auditing strategy. However, if you try to audit every resource and activity, you may find yourself with far too much monitoring data, including thousands of benign audit...

Words: 1876 - Pages: 8

Premium Essay

Ms 70-640

...properties because scavenging removes the outdated DNS records from the DNS zone automatically. You should additionally note that patience would be required when enabling scavenging as there are some safety valves built into scavenging which takes long to pop. Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088a6bbce0a4304&ID=211 QUESTION NO: 2 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network has a server named ABC-SR15. You install the Active Directory Lightweight Directory Services (AD LDS) on ABC-SR15. Which of the following options can be used for the creation of new Organizational Units (OU’s) in the application directory partition of the AD LDS? A. You should run the net start command on ABC-SR15. B. You should open the ADSI Edit Microsoft Management Console on ABC-SR15....

Words: 34198 - Pages: 137