Preview

IS3340 Week 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3340 Week 1 Assignment 1
IS3440 Windows Security
Shannon Miles
Week 1 Assignment 1
1. Active directory is controlled from an Active Directory server. The server is accessed by an administrator and then the changes that are made on the AD infrastructure is replicated to all workstations and users that login. AD exists in one location and replicated or issues out the permissions, rules, and roles out to the objects it is managing.
2. Permissions are generally going to be submitted by a request to the administrator and then after it is approved, the work is completed. Password changes can be done using utilities or requests. Depends on how the organization decides on that feature. Active directory has a central management system. Team of administrators or one administrator, depending on the size of the team or department.
3. Administrators need to take into account the roles and permissions of the existing infrastructure. Planning and mapping out of the groups, policies, rules, and permissions will need to be thought out. This will lessen the mistakes of having some overlap or leaving gaps of security loop holes. Wiping out existing structure after migrating users.
4. All permissions and policies will be uniform when Active Directory is employed into the infrastructure. Administrators can change permissions and privileges to meet requirements for that group or department.
5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    in terms of bandwidth and storage. Your company has never traded with the U.S. Government at this…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT113 Unit 5

    • 393 Words
    • 2 Pages

    by the Active Directory design. The Windows Server 2003 forest functional level is the highest…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It222 Week 1

    • 466 Words
    • 2 Pages

    An ordinary Domain Controller can do nifty things, like add a new user/group, make mods to it's own system to accommodate updates, ect. A Read Only Domain Controller can only be changed by a main Domain Controller making updates to it.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Q4. Can you perform administrative tasks, such as creating a user account, shutting down the server, or setting the time, on the domain controllers? Explain the group membership chain that provides this user account with its current permissions. Yes the localadmin account can do administrative tasks.…

    • 230 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An admin officer will have full responsibility of the tasks they are set with. This would…

    • 790 Words
    • 2 Pages
    Good Essays
  • Good Essays

    An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into three broad categories such as resources which include printers, services which include email, and users which include user accounts and groups. The Active Directory provides information on the objects, organizes the objects, controls access and sets security. Active Directory is designed to play many different roles within an organization. The roles range from managing Windows networks to managing directory enabled applications. Active Directory empowers organizations to centralize their directory management in a more streamlined,…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Little control and IT governance on common users to access or make changes to the network configuration…

    • 557 Words
    • 3 Pages
    Good Essays
  • Good Essays

    d. Active Directory Rights Management Services (AD RMS) (AD RMS) is information protection technology that works with AD RMS -enabled applications to help safeguard digital information from unauthorized use. Content owners can define exactly how a recipient can use the information, such as who can open, modify, print, forward, and/or take other actions with the information. Organizations can create custom usage rights templates such as "Confidential - Read Only" that can be applied directly to information such as financial reports, product specifications,…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    fdsdf

    • 455 Words
    • 2 Pages

    A file access control scheme will be the design of UNIX operating system. Therefore, user ids and passwords are needed in order to gain access to the system. All users of the UNIX operating system will each be given a user id and a user password. These user ids and passwords will be kept by the assigned users only. The protection of these ids and passwords depend on how well the user protects them. Encryptions and decryptions can also be used when the users are attempting to login. The administrator can put each user into different groups that allow access or deny access to certain files within the operating system. By doing this, there can be control on who can access what file due to the permission given to them by the administrator. The administrator is referred to as the super user because he or she has access to all files throughout the operating system.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Blast

    • 649 Words
    • 3 Pages

    * Technical support for over 35,000 US KPMG employees in such areas as remote access and Microsoft Outlook connections, laptop/PC performance issues, virus security, Microsoft Office suite and hundreds of in-house applications as well.…

    • 649 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A structured approach to Active Directory design makes enterprise-scale directory service deployment straightforward and easy to understand. This guide combines business and technical guidance to minimize the time and effort required to implement the Active Directory directory service.…

    • 9617 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    6. What utility is used to transform a standalone Windows Server 2008 R2 system into an Active Directory…

    • 305 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Active directory is a network technology that provides a variety of network services. The services include: Directory services: these services provide every user with a home directory. The user can store his/her files on it, can install software etc. Each user’s directory will be protected by a user name and password. Authentication services: Active directory comes with Kerberos based authentication services. These services can be used for checking of various user name and passwords for various applications. Domain naming: This particular service allows a page to be accessed via a domain name. DNS servers store the domain names and the pages address. Since active directory uses a same database, it allows administration to apply critical updates to an organization, assign policies, and deploy software. Active Directory stores information and settings in a central database.…

    • 696 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Data Flow Diagram

    • 436 Words
    • 2 Pages

    The Administrator entity shows the capability to access the system; manage account by modifying account’s profile; managing member’s account such as creating new user profile and updating user profile; importing student list; creation of grade criteria; generating students grade report and updating website contents.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays

Related Topics