Free Essay

Active Directory at Campus

In:

Submitted By lokero
Words 384
Pages 2
Active Directory Configuration for This Campus

Three types of user accounts can be created and configured in Windows Server 2008 installation. The ITT Technical has to use a Domain Controller because the built-in Administrator account created in Active Directory has a full control of the domain in which it created. Groups have been used to make network permission easier to administer. For ITT Tech I will make three distinct groups of users: students, instructors, and administrators.
When I determine in which group type I can allocate the students, instructors, and administrators. I have to nesting some groups. To add security and distribution using the group types that are available in the Active Directory domain are as follow: domain local groups, global groups, and universal groups.
I will place in the domain local group: Director, Dean, Associate Dean, Registrar, and the Dept. Chair. Because they can contain user accounts, computer accounts, global groups, and universal groups from any domain, in addition to other domain local groups from the same domain. So, the domain local group can has access to all groups in the hierarchy three or forest and UOs.
In the global group I will allocate the Instructors and Administrators. This global group can contain user accounts, computer accounts, and/or other global groups only from within the same domain as the global group. Global groups can be used to grant or deny permissions to any resource located in any domain in the forest.
I believe the students will be belong to universal group because can assign the necessary permission to access and use the enterprise database.
The ITT Technical System Administrator has to run local Domain Name System (DNS) server(s) under Windows on their domain controllers to handle the SRV records. This Active Directory DNS server should be configured as the authoritative server for the domain and the Windows Domain Controllers will use this for dynamic updates of the SRV records.
The ITT-Tech DNS servers will still be the primary server for the domain and will delegate the SRV record zones to the Windows DNS server. Therefore, all students, instructors and administrators should use ITT's DNS server for their name resolutions. ITT will not delegate out the whole Active Directory domain since all hosts need to be registered in DNSDB.

Similar Documents

Free Essay

Sccm

...Methods The supported installation methods at Illinois State University include the following: * Client Push - The client can deployed from the SCCM server to computers automatically discovered in Active Directory. This is the recommended installation method. * Manual - The client can be manually installed onto computers. ------------------------------------------------- Client Requirements SCCM 2012 at Illinois State supports the following: * Windows XP with SP3 * Windows Vista with SP2 * Windows 7 A list of all supported operating systems can be found in the Computer Client Requirements Microsoft TechNet documentation. ------------------------------------------------- Client Push Installation (Recommended) The SCCM 2012 server can be configured to discover computer accounts in Active Directory and allows SCCM administrations to push client installations from the SCCM console. The client can be pushed to a single computer or to an entire collection of computers from the SCCM 2012 console. ------------------------------------------------- Client Push Prerequisites The following prerequisites must be met before attempting to use the client push installation method. * The computer must be bound to Active Directory  * The computer must be on the campus network (through a wired, wireless, or VPN connection) * The computer's firewall must have the following ports open: * TCP: 445, 135, 80, 443 * UDP: 135 * Contact the SCCM infrastructure...

Words: 797 - Pages: 4

Free Essay

Computers

...ACTIVE DIRECTORY WORKING WITH SITES CLASS NOTES NT1330 MR. GRAHAM 10/14/13 Sites overview Sites in Active Directory® represent the physical structure, or topology, of your network. Active Directory uses topology information, stored as site and site link objects in the directory, to build the most efficient replication topology. You use Active Directory Sites and Services to define sites and site links. A site is a set of well-connected subnets. Sites differ from domains; sites represent the physical structure of your network, while domains represent the logical structure of your organization. Using sites Sites help facilitate several activities within Active Directory, including: * Replication. Active Directory balances the need for up-to-date directory information with the need for bandwidth optimization by replicating information within a site more frequently than between sites. You can also configure the relative cost of connectivity between sites to further optimize replication. * Authentication. Site information helps make authentication faster and more efficient. When a client logs on to a domain, it first searches its local site for a domain controller to authenticate against. By establishing multiple sites, you can ensure that clients authenticate against domain controllers nearest to them, reducing authentication latency and keeping traffic off WAN connections. * Active Directory-enabled services. Active Directory-enabled services can leverage site...

Words: 1735 - Pages: 7

Free Essay

This Is Me

...and Coordinate the purchasing of parts needed for repair • Maintain audio/visual equipment, support video teleconference room operation and equipment • Distribute, install, maintain, manage and provide guidance on all networked and standalone PC software on campus Karl G. Fronda Help Desk/PRC Analyst Volt Management Corp 9/2007 – 2/2009 • Serve as primary point of contact to reporting problems with network resources and access administration to any of the company’s Primary Active Directory Domains, but not limited to the administration of desktop software/hardware, server shares, Microsoft Exchange administration • Responsible for ensuring that all incidents escalated are responded, resolved and followed-up upon within the performance parameters established by Pfizer management. The PRC analyst uses a variety of both industry standard and company specific business software applications/utilities to respond and resolve client problems. PRC analyst is also responsible for certain software pushes and application support • Technical proficiency with Windows Active Directory, NT 4.0, Exchange 5.5 and Exchange 2000/2003. MS 2000/XP Operating Systems, MS Office, Internet Explorer, remote access, Active Directory, and a clear understanding of domain resource rights including File and print share security Help Desk/PRC Analyst Volt...

Words: 689 - Pages: 3

Free Essay

Capstone

...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Premium Essay

No Paper

...RRAS, IPSEC, Computer Troubleshooting, Cabling | Cisco 2811 router, Cisco 2960 and 3550 switches, basics in Cisco IOS 12.4, RIPv2, EIGRP, OSPF, network tools including Wireshark, and network cabling. TECHNICAL TRAINING Centriq Training Center, Leawood, KS Nov 2014 – July 2015 IT Administrator Program * Technical Competencies: * Installing, configuring, managing, and maintaining hardware. * Windows Sever 2008/2012 R2 and Windows 7 configuration. * TCP/IP suite with an emphasis in subnetting and DHCP. * Name Resolution in a domain and standalone environment; Emphasis DNS (FQDN) and WINS (NetBIOS). * Active Directory structure and services; Objects and creation; Domain controllers; Trusts. * Active Directory Group Policy; GPOs – settings, linking, and testing. * Remote Tools; RRAS;...

Words: 1235 - Pages: 5

Premium Essay

Scenario Analysis Report

...CS25110 Mid Wales University Scenario Analysis Report – Recommendations for University ICT Strategy Written by Findlay Cruden Contents 1. Introduction 3 2. Custom Designed Server Room 3 3. Project Management 4 4. Computer Hardware 5 5. Computer Software 6 6. Security 7 7. Naming and Directory Services 8 8. Business Continuity 9 9. On-going Management 10 10. Overall Summary 11 11. Bibliography 12 1. Introduction The main focus of this report is to detail the necessary resources and preparations that would be necessary in order to create and manage the ICT systems for this University. By using information from outside sources, I will make observations as to the various aspects that will be necessary to create and manage our network in an efficient and efficient manner and in a way that allows the ease of use to the various users who will be using the network and its resources. These resources would include both the hardware that would be running and managing the network such as the mail and web servers in addition to the hardware that the users will be interacting with such as the desktop computers, printers amongst others. 2. Custom Designed Server Room As this room would function as the nerve centre for the entirety of our network, stringent security measures should be implemented to protect the room itself as well as the equipment stored within it. As detailed both in a further section of this report a high priority should...

Words: 5666 - Pages: 23

Free Essay

U4:A1 Itt Paper

...Kent O’Brien NT2580 U4:A1 Remote Access refers to the ability to access UMW network resources while off campus. Security measures for remote access should be implemented based on sensitivity and risk to University systems and data. A VPN connection is off-site remote access of sensitive IT systems to ensure exchanges of information are encrypted. With that being said I’m going to talk about a networked VPN infrastructure and what I would have in it. If I was doing a school I would have the VPN accessible to all Faculty and Staff members by default and is authenticated against the ALL_Faculty_Staff Security group in Active Directory. Students do not have VPN privileges. A Contractor, Temporary, or Volunteer worker requiring VPN access, must fill out a compulsory form in Human Resources prior to be granted access.  They will require a UMW sponsor who must submit the request to the ISO for final approval. Once approved, they will be entered into Banner whereby an account will then be created in Banner and AD. They can get instructions on how to install the required Cisco software client. Users using non-university owned equipment must follow IT Malicious Code Protection Standard. Records logging remote connections must be maintained and reviewed according to the University Monitoring and Logging Procedure. VPN authentication is required in addition to network authentication to remotely access backend servers and is limited to local accounts provisioned by the Server Administrator...

Words: 284 - Pages: 2

Premium Essay

Resume

...Darius Murdock ------------------------------------------------- 2322 Saint Clair Drive, Temple Hills, MD 20748 ------------------------------------------------- 240-392-2369(home) 240-308-9360(cell) dariusm_murdock@hotmail.com, dmurdock114@email.itt-tech.edu SKILLS & ABILITIES Networking * TCP/IP /LAN/WAN / Cisco Router / OSI * Network Technology * GUI ApplicationsOperating Systems * Windows 2000/7/XP/8 * Windows Server 2008/2010 / Active Directory * Linux * VMwareHardware * Assemble/disassemble PC’s * Install, configure, troubleshoot and repair * Installation, testing and troubleshooting of cabling (Patch, Fiber, Twisted & Crossover)Software * Microsoft Word, Excel, PowerPoint, Outlook, Publisher, Visio * Exchange and Sendmail for E-mail servers * Install, and troubleshoot | Development * Intro Programming * Client Server General * Strong written and oral communication skills * Team building * Customer Service * Problem Solving * Reliable * Flexibility | EDUCATION  ITT Technical Institute – Springfield, Virginia- Present Associate of Applied Science Degree in Information Technology – Network Systems Administration Anticipated Graduation Date: Spring 2015 Suitland High School- Forestville, Maryland- 2009-2013 High School Diploma RELEVANT EXPERIENCE Save A Lot Grocery Store- Store Clerk July 2014-Present * Stock store product in the all the aisles. * Greet...

Words: 300 - Pages: 2

Premium Essay

Secured Infrastructure Development for Educational University Using Servers, Firewalls and Biometric Devices

...------------------------------------------------- Department of Electrical, Computer & Communications Engineering ------------------------------------------------- MSc Project Final Project Report ------------------------------------------------- Title: Secured infrastructure development for educational university using servers, firewalls and biometric devices ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Author: Azhar ur Rehman ------------------------------------------------- ------------------------------------------------- Academic Session: 2008-2009 ------------------------------------------------- Supervisor: Mr.Manoj Pongubhati Course Title: Msc computer systems and networking Mode of Study: Full Time ACKNOWLEDGEMENT First and foremost I would like to dedicate my thesis to my parents and want to thank Prof. Mr. Manoj pongubhati, my research dissertation supervisor, for giving me an opportunity to work on the dissertation of my interest and encouraging me throughout my work. His support and patience helped me overcome many difficult times during my dissertation research. I am also deeply grateful to Mr Ali Ahmed, a good friend and guardian who is working as an Assistant Manager with Dynamic Associates Info Pvt Ltd was actively involved with my research. The day I started working under the professional guidance of Dynamic...

Words: 7221 - Pages: 29

Free Essay

Network & Security

...2800. CISCO High End Routers 3600, 3800, 7200. CISCO Switches 1900, 2950, 2950, 2960G. CISCO Campus Switches 3550XL, 4948 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507, Motorola Vanguard Router 342 & 6435, 3Com Core 4007/Access Switch 3300, D-Link Layer 2/3 switches 3326SR, Nortel Baystack Switches, CISCO - CSS 11500 Switch. Voice & Video : CISCO IP Phone 7900, Polycom Video Conferencing Device, Smart Call Voice Recorder. Wireless & Wi-Fi : Canopy Wireless Device (p-p/pMp), DLink Wireless (point to point), DLink Access Point, CISCO 500, 1242 AGK9 series Access Point, and CISCO Linksys Wireless/Wi-Fi Router. WAN Optimizer : Steelhead - Riverbed WAN Optimizer Security & VPN : Cisco PIX 535 & ASA Firewall, FWSM, Fortigate Firewall, Gajshield Securegate Firewall, Sonicwall Firewall NSA2400, Cisco NAC, Watchguard Firewall, ACL-Access Control List, Portwise VPN Software, NAT, PAT, VPN Client, Bluecoat Proxy SG, Bluecoat Reporter, Bluecoat AV, Juniper SSG-550M, McAfee IPS M2950, Forefront Threat Management Gateway (TMG) 2010. Ticketing System : E- Helpline, HP Open View, and Optive Live - Call Logging, Helpdesk. Monitoring Tools : Op Manager, What's UP Gold, Ethereal, PRTG Packet Sniffer, Cisco Network Assistant, Fluke OptiView XG, Network Time Machine. . Operating Systems : Windows 2008/2003/2000 (Desktop/Server), Windows 7, Vista, XP, LINUX, Active Directory. Antivirus :...

Words: 274 - Pages: 2

Premium Essay

Unit 36

...membership to Harvard students, but later expanded it to colleges in the Boston area, the Ivy League, and Stanford University. It gradually added support for students at various other universities and later to high-school students. Since 2006, anyone who is at least 13 years old was allowed to become a registered user of the website, though the age requirement may be higher depending on applicable local laws.[11] Its name comes from the face book directories often given to American university students.[12] After registering to use the site, users can create a user profile, add other users as "friends", exchange messages, post status updates and photos, share videos, use various apps and receive notifications when others update their profiles. Additionally, users may join common-interest user groups, organized by workplace, school or college, or other characteristics, and categorize their friends into lists such as "People From Work" or "Close Friends". Also users can complain or block unpleasant people. Facebook had over 1.18 billion monthly active users as of August 2015.[7]Because of the large volume of data users submit to the service, Facebook has come under scrutiny for their privacy policies. Facebook, Inc. held its initial public offering in February 2012 and began selling stock to the public three months later, reaching an original peak market capitalization of $104 billion. On July 13, 2015, Facebook became the fastest company in the Standard & Poor's 500 Index to reach...

Words: 1004 - Pages: 5

Premium Essay

Computer Science

...Instruction Plan for CSE240 Lab on Data Structure and N/Ws Term: 4th Course No: CSE240 Course Title: Lab on Data Structures and Networks L: 0 T: 0 P: 4 Textbook: 1. Data Structures – Seymour Lipschutz :India Adapted Edition 2006 2. Data communication and networks- Forouzan-4TH Edition Reference Books: 3.Data Structures & Algorithms Using C- R.S Salaria-2nd Edition 4.Data Structures,Algorithms and applications in C++ --Sartaj Sahni—2nd Edition 5.PC Hardware in a Nutshell-Robert Bruce Thomsan and Barbara Fritchman Thomsan—July2003 :Second Edition Other readings: |Sr.No. |Journal articles as compulsory readings (Complete reference) | |6. |Cisco system advanced exam guide-CISCO press | |7. |Cisco system CCNA Exam dump guide –CISCO press | Relevant websites: |S.No. |Web address |Salient Features | |8. |http://www.java2s.com/Tutorial/C/0260__Data-Structure |A web page on Data Structure| | | ...

Words: 1499 - Pages: 6

Premium Essay

My Cv

...Rana Maher AbdAllah Fikry 6th of October City, Giza, Egypt Mob.: (+20) 01272317644 Date of birth: 6/8/1984 Email: rana84maher@gmail.com Nationality: Egyptian Religion: Muslim Marital Status: Single EDUCATION AND QUALIFICATIONS 2015- Current Studying EMBA- Nile University 2001– 2005 Faculty of Arts- Mansoura University Bachelor of Arts- English Department Degree: Good 1999 - 2001 Zahraa Islamic Language Schools CERTIFICATES June 2015 Service Management in Microsoft Dynamics CRM 2013 June 2015 Customer Service in Microsoft Dynamics CRM 2013 Feb 2014 Business System Analysts Reqmaster- IIBA Cairo Chapter May 2015 ITIL Foundation Feb 2014 Project Management Preparation (PMP) Aug 2013 Mini MBA- Management Principles Native Egyptians November 2005 CompTIA A+ Certification (Hardware & Operating System Maintenance) Started in September 2005 to November 2005 which is cooperation venture between MCIT (Ministry of Communication and Information) and the IBM (International Business Machines). WORK EXPERIENCE 2010- Current Telecom Egypt  Mar. 2013- Current Head of Technical and Systems Support Division Business Analyst in Business Process Automation and Invoicing Applications Dept. (Smart Village, Egypt), where my tasks are: 1                   Define and document business processes and software requirements. Eliciting requirements by discovering the underlying...

Words: 843 - Pages: 4

Premium Essay

Unit

...ITT TECHNICAL INSTITUTE NT1310 Physical Networking GRADED ASSIGNMENTS ------------------------------------------------- Student Professional Experience Project NSA SPE Project 1 (to be completed by the end of NT1310): Install, Configure, Test, Maintain and/or Document the Worksite Local Area Network and Its Components Purpose The purpose of the Student Professional Experience (SPE) project is to provide you an opportunity for work experience in your field or in a related field to add to your résumé. You may have an opportunity to serve your community or work for a local employer for a project that will take between 20 and 30 hours. Project Logistics Career Services will identify an employer with needs in the following areas: Network related tasks (mostly confined to the LAN and Microsoft Windows Server 2008 environments) Students are expected to practice various skills discussed in all the technical courses in Quarters 1 through 3 of the NSA program at an employer’s site on network related tasks (more confined to the LAN and Microsoft Windows Networking with Server 2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could...

Words: 6762 - Pages: 28

Premium Essay

Human Resource Management

...Thank you for purchasing a customized research paper from The Paper Experts Inc. We strive to deliver to our customers the most accurate and up-to-date research each and every time we prepare a custom work. [pic] Your Writer ID: # 50 Order ID: 5011 Topic: thesis Disclaimer: This document was written by one of our independently contracted writers. The writer who researched and composed this document is under contract with The Paper Experts Inc. to produce 100% custom written work each and every time he or she writes for us. This document should be used in precisely the same way you would use any article you might find in your local research library. Remember, you must cite it properly just like you would any other source listed in your bibliography. If you have any questions regarding citing this work, please follow this link: http://www.thepaperexperts.com/citing.html. We encourage you to continue to perform in-depth research on your topic to ensure that you will have a broad base of information to serve as a foundation for your own paper. Notice: Your credit card has been charged by The Paper Experts Inc. Our system retains a log of all the works that are delivered via e-mail through your mailbox on our system. Our system is completely confidential and our company maintains the highest of ethics standards. We do not reveal the identity of any of our clients. It is your responsibility to access your mailbox on the system and download your document. You...

Words: 1807 - Pages: 8