Free Essay

Implementing Active Directory

In:

Submitted By MissDougie
Words 321
Pages 2
Implementing Active Directory
Shantelle Barnett July 5, 2016
Alicia Pearlman

When setting up an Active Directory, I will need to determine how many domains will be used. Domains will need to be set up to specific departments. The questions I would ask myself are: * Who will be assigned to what group? * Who needs to access what? * How many managers and administrators will be at each site? * What is going to be stored and where?
Server Names * New York City, NY. (Main) – NationalFinances.com * Detroit, MI. – Detroit-NationalFinances.com * Chicago, IL. - Chicago-NationalFinances.com * Phoenix, AZ. – Phoenix- NationalFinances.com * San Diego, Ca. – SanDiego- NationalFinances.com * Tampa, Fl. – Tampa- NationalFinances.com * Boston, MA. - Boston- NationalFinances.com * Nashville, TN. – Nashville- NationalFinances.com * Toledo, OH. – Toledo- NationalFinances.com * Indianapolis, IN. – Indianapolis- NationalFinances.com
Role of the Server This server will provide DNS, DHCP, NTP, WINS, and Firewall services. Roles will be added and I feel that since this is a financial organization all roles will be needed for smooth operation. Those roles are file and print services, email and database services, web, remote, and application services, and most importantly monitoring and threat management servers. National Finances is a financial organization, that alone makes it important to ensure that the servers can handle everything that is needed. The sites will definitely communicate with each other and will all need to be able to pull information from the main database in New York City, New York. With having so many sites, Monitoring is a must just as well as threat management. There will be servers at all sites serving the same purpose and all will link to the main office.
OUs, Computer Users, and Groups
OUs
* Each site listed * Financial Department * Sales Department * Call center * Information Technology * Project Management
Computer Users * Financial Team * Sales Team * Call center agents * Information technology team * Project management team
Groups
* Administrator * Financial * Sales * Call Center * Information Technology * Project Management

Active Directory Structure

Similar Documents

Premium Essay

Unit 8 Active Directory Benefits

...Active Directory Benefits The biggest difference between these two server operating systems and Windows NT is the addition of Active Directory. Although there is a bit of a learning curve associated with implementing an Active Directory environment, the benefits of doing so far outweigh the negatives. A better representation of the network Centralization sums up my primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big your client’s network has become. If you've worked with Windows NT before, you know that in Windows NT a domain is a completely independent entity. While it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains. Seeing through the forest The situation is different with Active Directory. Whereas the domain level was the highest level of abstraction in Windows NT, the highest level of abstraction in Windows 2000 and 2003 Server is the forest, which is basically a collection of domains. Microsoft chose to call this unit a forest because you can place domains into the forest, and you can place entire trees of domains into it. A domain tree consists of a parent, child, grandchildren, and great grandchildren domains. You can have as many layers of subdomains within a domain tree as is necessary...

Words: 1131 - Pages: 5

Premium Essay

Issc342

...LAB #1 – ASSESSMENT WORKSHEET Configure Active Directory and Implement Departmental and User Access Controls Course Name and Number: Student Name: Instructor Name: Lab Due Date: Overview In this lab, you configured Windows Active Directory to create Department and User accounts, and set unique read/write folder and fi le access privileges. You used the Windows Configuration Applet and Group Policy Management console to create and test configurations and read/write of several fi les with specific access controls. You also used group policy objects to restrict access to certain users and groups at the directory, folder, and fi le level. Lab Assessment Questions & Answers 1. Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data. 2. Is it a good practice to include the account or user name in the password? Why or why not? 3. To enhance the strength of user passwords, what are some of the best practices to implement for user password definitions to maximize confidentiality? 4. Can a user defined in Active Directory access a shared drive if that user is not part of the domain? 5. Does Windows Server 2008 R2 require a user’s logon/password credentials prior to accessing shared drives? 6. When looking at the Active Directory structure for Users and Computers, which group has the least amount of implied privileges? 7. When granting access to LAN systems for guests (i...

Words: 363 - Pages: 2

Free Essay

Dns Senario

...where to place the Active- Directory Integrated DNS Servers and what type to use. One of the branch offices is very small and (5 users) and has a very slow network connectivity. Do I need a DNS Server and, if so, which type of zone should it hosts? The second branch office is much larger (about 30 users) and has better network connectivity. Does this office need a DNS Server and, if so what type of zone would you recommend? Response: Dear IT Admin; I really appreciate the opportunity to assist you in regards to implementing Active Directory & DNS Servers in your “Windows” environment. Let me start by saying that without DNS your network will more than likely not function because clients will not be able to resolve names to (IP) addresses, also DNS enables network devices such as printers and computers to communicate on the internet or locate one another within the organizations local network. Based on the given scenario, you have made an excellent choice of configuring the “Active Directory Integrated Zones” because Active Directory has the following benefits: Fault Tolerance – Redundant copy of DNS zone information can be stored on multiple servers. Security – DACL can be modified by specified user groups. Zones are Multimaster – zones can be updated in more than one location. Efficient Replication – Zone transfers are replaced by more efficient Active Directory replication. Maintain use of secondary zones – if needed. Note: Since Active Directory-Integrated Zones follow...

Words: 320 - Pages: 2

Premium Essay

Microsoft Operating System Ii Knowledge Assignment

...--------------------------------------- Complete the following sentences by writing he correct word o words in the blank provided. 1. Active Directory will tolerate a maximum of a 5- minute clock skew between a client and the domain controller that authenticates it. 2. The PDC Emulator is responsible for managing time synchronization within a domain. 3. You can improve login times in a site that does not contain a global catalog server by implementing universal group membership caching. 4. To add or remove an application directory partition from Active Directory, the Domain Naming Master needs to be accessible. 5. If a domain controller that holds a FSMO role fails and will not be returned to the network, you can seize the FSMO role to another domain controller. 6. You can add additional attributes to the partial attribute set (PAS) by modifying the Active Directory schema. 7. The security identifier (SID) uniquely identifies an object within an Active Directory domain, but will change if an object is moved from one domain to another. 8. The Infrastructure Master FSMO role should not be housed on a domain controller that has been configured as a global catalog. 9. You can transfer the Domain Naming Master FSMO from one domain controller to another using the Active Directory Domains and Trusts MMC snap-in. 10. Membership information for a (an) universal group is stored on the global catalog. ...

Words: 394 - Pages: 2

Free Essay

Active Directory

...Implementing Windows Server 2003 Active Directory Judith Che Strayer University of Maryland Author Note Judith Che, Strayer University of Maryland. Any questions regarding this article should be address to Judith Che. Strayer University Maryland, White Marsh, MD 21085. Company’s today relay on good networking in order for their business to grow and succeed. A system engineer requires the ability, knowledge, and skill to plan and manage today’s networking which faces an ever-increasing variety of applications. We need to be skilled and informed to manage a network running Windows Server 2003 Active Directory. Present day networking administrators have difficulties ensuring that network resources are available to users when access is needed and securing the network in such a way that available resources are accessible to the proper user with the proper permission. We will have to solve networking problems including troubleshooting, configuration, installation, administration, and managing element. Starting from choosing the best Windows Server 2003 Edition that will meet the company’s needs in terms of price, performance and features; work group woes, name resolution nightmares and DNS name conflicts to server security. These problems can be solved with proper planning, managing, and designing a day-to-day administration of an Active Directory domain within their Windows Server 2003 network environment. We predict that implementing a Windows Server 2003 Active Directory...

Words: 5782 - Pages: 24

Free Essay

Windows

...| | Definition TRUE | | | Term When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit. | | Definition FALSE | | | Term Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service. | | Definition FALSE | | | Term When you want to grant a collection of users permission to access a network resource, such as a file system share or a printer, you can assign permissions to an organizational unit. | | Definition FALSE | | | Term Active Directory is one of the easiest technologies to test because an isolated lab environment usually can emulate many of the factors that can affect the performance of a directory service. | | Definition FALSE | | | Term Active Directory was first introduced in which operating system? | | Definition Windows 2000 Server | | | Term Where do users log in when joining an Active Directory domain? | | Definition domain | | | Term There are two basic classes of objects in an Active Directory domain. Which of the...

Words: 1908 - Pages: 8

Premium Essay

Unit Exercises

...Jason Wells NT 1230 Unit 8 Assignment 2 Active Directory Benefits Multimaster replication and sites One of the benefits of an Active Directory environment is the concept of sites and multimaster replication. In Windows NT, when you make a change to the SAM (Security Accounts Manager), the change is applied directly to the PDC (Primary Domain Controller) and is later replicated to each BDC (Backup Domain Controller). In an Active Directory multimaster replication environment, each domain controller contains a copy of Active Directory, not just the information for a single domain. Therefore, when a change is made to Active Directory, the change is applied to whatever domain controller is the closest, and is then replicated to the remaining domain controllers. This prevents a designated PDC (Primary Domain Controller) from being overburdened. A better representation of the network Centralization sums up a primary reason for implementing Active Directory. The Active Directory structure makes it possible for you to achieve truly centralized management of users, regardless of how big the client’s network has become. In Windows NT a domain is a completely independent entity, and while it's possible to create a trust relationship between domains that exist on a common network, the domains are never truly integrated with each other because there is no higher authority that manages the domains. With Active Directory, this is possible. Organizational Structure The domain level...

Words: 322 - Pages: 2

Free Essay

Directory Desing Scenerio

...NT1330 HOMEWORK Active Directory Design Scenario To effectively achieve this I need to know and understand everything about Active Directory Domain Services. When designing and implementing an Active Directory domain, you need to think about the placement of your global catalog servers. The global catalog is the master index of objects within an Active Directory forest. The global catalog serves as a quick search tool to locate objects within a forest. Every domain must have at least one global catalog server. The first domain controller (DC) installed into a domain automatically serves as that domain's global catalog server by default. As the size of your forest grows, there may become a need to configure additional global catalog servers throughout the forest. There are two main issues to consider when placing global catalog servers into a domain. The first is the traffic levels and the second is the location of infrastructure servers. As the forest gets larger, so does the global catalog. As the global catalog expands, the amount of replication traffic it generates increases. Global catalog servers replicate with each other. This is separate replication traffic from that used to support Active Directory itself. From an overall perspective of the forest, when fewer global catalog servers are deployed in a forest, there will be less replication traffic, but it will cause more query traffic. Conversely, deploying more global catalog servers in a forest will cause more replication...

Words: 378 - Pages: 2

Free Essay

Active Directory Benfits for Smaller Enterprises

...[pic] Active Directory Benefits for Smaller Enterprises Microsoft Corporation Published: September 2004 Abstract Microsoft® Active Directory® (AD) has been available since early 2000, and while most organizations have completed their AD deployment and are realizing the many business benefits of having deployed Active Directory, there are still organizations that have either not completed their deployment or have yet to take advantage of some of the important features of Active Directory that yield the greatest business benefits. This whitepaper is designed to help small and medium-sized organizations understand the business advantages that can be realized quickly and easily through the use of Windows Server 2003 and Active Directory. This paper was written based on feedback from hundreds of business executives on the reasons they chose to migrate to Active Directory, and the ongoing benefits they have realized. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This White Paper is for informational purposes only. MICROSOFT...

Words: 7075 - Pages: 29

Free Essay

Assessment Questions It

...Lab #3 – Assessment Worksheet Identify & Classify Data for Access Control Requirements Course Name & Number: IS3230 ______________________________________________________________ Student Name: Heather Young ______________________________________________________________________ Instructor Name: MR. Gibbs _____________________________________________________________________ Lab Due Date: Jan. 2014 _______________________________________________________________________ Overview This lab provides the student with the opportunity to develop a data classification standard with procedures and guidelines to classify data access based on the job responsibilities – not an organizational position. In this lab, students aligned a data classification standard with the job function and roles that are required to access specific data. This alignment allows access controls policy definition to be properly implemented throughout the IT infrastructure to mitigate risk from unauthorized access. Lab Assessment Questions & Answers 1. What is the Data Classification Standard used in the U.S. Department of Defense (DoD)/Military?Google “Data Classification Standard + DoD”. Summarize the different data classifications. Top Secret- highest level of information sensitivity Secret- information that would cause serious damage, most common classification level Confidential- Is the lowest of sensitivity. This information may only be handled by personnel with a clearance, may...

Words: 993 - Pages: 4

Premium Essay

Lab 24 Science

...Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing Packet Capture and Traffic Analysis 6 Implementing a Business Continuity Plan 7 Using Encryption to Enhance Confidentiality and Integrity 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities 9 Eliminating Threats with a Layered Security Approach 10 Impementing an Information Systems Security Policy# Lab Title 1 Performing Reconnaissance and Probing using Common Tools 2 Performing a Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing Packet Capture and Traffic Analysis 6 Implementing a Business Continuity Plan 7 Using Encryption to Enhance Confidentiality and Integrity 8 Performing a Web Site and Database Attack by Exploiting Identified Vulnerabilities 9 Eliminating Threats with a Layered Security Approach 10 Impementing an Information Systems Security Policy# Lab Title 1 Performing Reconnaissance and Probing using Common Tools 2 Performing a Vulnerability Assessment 3 Enabling Windows Active Directory and User Access Controls 4 Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control 5 Performing Packet Capture and Traffic Analysis 6 Implementing a Business Continuity Plan 7 Using Encryption...

Words: 426 - Pages: 2

Free Essay

Dns in Windows 2003 Server

...find Active Directory resources such as Global Catalog Servers and also Domain Controllers that authenticates Logon or Kerberos requests. • Secondly to locate pages on the internet, • Thirdly, mundane task for example, connecting to a printer share. DNS makes it possible for clients to access network resources using alphanumeric names rather than pure IP addresses. Unlike WINS, DNS is hierarchical, with advent of Windows 2000 DNS became dynamic DNS. In practical terms, it means that clients can update their own DNS Server records automatically, thus reducing the administrative load. The killer reason for implementing DNS is that Active Directory relies on DNS for finding Global Catalog, Kerberos and Logon Servers. Before you install DNS on a production network you need to answer a whole series of questions. For example Will your DNS name match our email domain? Who will be in charge of DNS, you or must you rely on a Unix department? One 'Litmus Test' for a difficult topic is the number of specialist terms a component uses. My rule is the more unusual words and acronyms, the more difficult the subject is to master. DNS passes this ' difficulty ' test with flying colours. For instance you need to understand, Namespace, Authoritative, Recursive, and Incremental to name just a few of the DNS keywords. As you learn about DNS Server watch out for ways to increase your computing vocabulary. DNS Summary DNS is the most difficult topic in the whole of Active Directory...

Words: 336 - Pages: 2

Premium Essay

Communication

...Get answers and help others Find Training - CBT, testing software, online training, etc. Links: Official Exam Site Windows 2012 Server Tutorials Money saving tips Intro to Microsoft Certifications Microsoft Certification Links About This Exam: This exam is part two of a series of three exams that test the skills and knowledge necessary to administer a Windows Server 2012 infrastructure in an enterprise environment. Passing this exam validates a candidate’s ability to administer the tasks required to maintain a Windows Server 2012 infrastructure, such as user and group management, network access, and data security. Passing this exam along with the other two exams confirms that a candidate has the skills and knowledge necessary for implementing, managing, maintaining, and provisioning services and infrastructure in a Windows Server 2012 environment. | Cost: $150 Format: Multiple Choice, Hot Area, Drag and Drop Passing Score: 700 Questions: Approx 50-60 Time Limit: 120 mins Published: 9/17/12 Credit Toward: MCSA, MCSE | ------------------------------------------------- Top of FormExam Difficulty: Rated: 5.12 Bottom of Form | Exam Vouchers: Discount Vouchers Exam Registration: Prometric | | Exam Objectives: Outlined below are the skills being measured on the 70-411 exam: Deploy, Manage, and Maintain Servers (15-20%) * Deploy and manage server images: Install the Windows Deployment Services (WDS) role; configure and manage boot, install, and...

Words: 888 - Pages: 4

Free Essay

Exchange 2010 Server Roles

...This research is being submitted on August 11th 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course. Exchange 2010 Server Roles When dealing with Exchange Server there are roles to be configured. Some roles are configured differently do if your implementing it in a small or large business setting. You have two different server roles one being the mailbox server role and the other being the client access server role. Each role is in charge of different task the mailbox server role is in charge of Clients access protocols, transport service, mailbox database, unified messaging and handles all activities for any active mailbox on the server (TechNet, 2013). With the client access role it handles authentication, redirection, proxy services (HTTP, POP, IMAP, and SMTP), and stores all diagnostic logs (TechNet, 2013). Each of these roles and services serves a unique purpose in setting up your exchange environment. The mailbox server role is the most common role used in Exchange Server and some could say that it is the core of an exchange organization when the mailbox server role is installed on to a server they become what is called a mailbox server. Mailbox servers interact directly with active directory, client access servers and Microsoft outlook clients. When setting up a mailbox server it is smart to consider a few things like requirements. First we have mailbox capacity the average mailbox receives 37mbs of mail per a five day work week with a message size of...

Words: 783 - Pages: 4

Premium Essay

Server Questions

...you set? 1.       automatic private IP address 2.       fixed IP address 3.       static IP address 4.       none of the above ques 6:- What is the minimum number of physical computers required to allow you to use a KMS key? 1.       20 Vista and ten Windows Server 2008 computers 2.       20 Vista and five Windows Server 2008 computers 3.       15 Vista and ten Windows Server 2008 computers 4.       25 Vista and five Windows Server 2008 computers Ques 7:- A striped volume uses which type of striping to interleave data across the disks? 1.       Raid 6 2.       Raid 4 3.       Raid 0 4.       Raid 5 Ques 8:- A computer running Server Core will allow you to launch which of the following consoles? 1.       Computer Management 2.       Active Directory Users and Computer 3.       Windows Registry Editor 4.       None of the above Ques 9:- BOOTP enables a TCP/IP workstation to retrieve settings for all of the...

Words: 4583 - Pages: 19