Preview

Active Directory Governance and Policies

Satisfactory Essays
Open Document
Open Document
2241 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Active Directory Governance and Policies
Active Directory Governance Model Oversight Policies
Committee Members: John Salguero, PMP IT Program Manager Jonathan Hardy Franklin College Senior Manager James Brannon Franklin College Systems Administrator Jim Metcalf Terry College IT Manager Chris Balthrop College of Environment & Design Systems Administrator Doug Lloyd EITS Systems Administrator Stephanie Ayers EITS Systems Administrator Wayne Crotts College of Public Health Systems Administrator Michael Jacobson Office of VP for Research Systems Administrator Seth Filkins Undergraduate Admissions Systems Administrator

This Committee recommends that, the person accountable for the acceptance or rejection of proposals and recommendations will be Dr. Tim Chester, CIO.

Overall Challenges or Drivers       Most of challenges are organizational rather than technical Difficulty enforcing campus policies and procedures Competing/Higher IT priorities Lack of ownership of identity management by a central group Lack of institutional senior management's support and enforcement Problems with our institution's technologies/infrastructure

ENTERPRISE INFORMATION TECHNOLOGY SERVICES 2/28/2012 Page 1 of 9

Active Directory Governance Model Oversight Policies
Governance Committee’s Charter       An honest and thorough job of formulating/writing the policies. Enforcement is Out-of-scope for this committee in this phase. Support and direction from upper management will be required for enforcement to be successful. Consider this a living document comprised of a sub-set of Active Directory Policies. The document will grow as Active Directory is refined at UGA, and more scenarios are discovered by the Colleges/Departments. Main focus of this committee is to engage a cross-section of UGA departments and colleges in refining the Active Directory

Membership  Committee composition will be dependent on the participation in the EITS managed Active Directory. o Chair,  Holds voting rights  This persons role

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Thank you for helping set up our new US office. There are some additional issues that we need help addressing.…

    • 208 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 2 Lab Report

    • 349 Words
    • 3 Pages

    The technical constraints are preventing the student network interacting with the faculty network, and the preparation of a future extension to the campus 15 miles away.…

    • 349 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I received your e-mail asking how to provide access to resources throughout your AD environment and you are not sure which strategies are best for the different situations you are encountering. I would recommend that since you have a domain for each department, such as Marketing, accessing one printer is very easy. To start, you will need to create a group that allows access to the one printer within each department. Once you have created each group you will then assign it to a domain local group, global group, and then to a universal group. Finally adding it to the Marketing domain group.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Active Directory Microsoft’s directory Microsoft’s directory service that automates network management, such as user data, resources, and security.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    COM 220 Entire Course

    • 483 Words
    • 4 Pages

    Week 8 research paper checkpoint.doc COM-220 WEEK 9 Capstone.doc COM-220 WEEK 9 PERSUASIVE RESEARCH.doc Computer Science - General Computer Science INF 220 Week 1 Discussion 1 Information Systems and Globalization INF 220 Week 1 Discussion 2 Organizational Performance INF 220 Week 2 Discussion 1 Role of BPR INF 220 Week 2 Discussion 2 Hardware and Software Selection INF 220 Week 3 Discussion 1 Database Development INF 220 Week 3 Discussion 2 RFID INF 220 Week 4 Discussion 1 Security in Business INF 220 Week 4 Discussion 2 Supply Chain Management INF 220 Week 5 Discussion 1 Impact of the Internet INF 220 Week 5 Discussion 2 Moral Dimensions of Information Systems INF 220 Week 1 Assignment UPS and the Utility of Information Systems INF 220 Week 2 Assignment Identifying Opportunities INF 220 Week 3 Assignment Network Design INF 220 Week 4 Assignment Evaluating Security Software INF 220 Week 5 Assignment Final Paper Know as much as you can before classes begin, including about y...…

    • 483 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    These individuals plan, coordinate, budget and manage every phase of a new IT system implementation (Wager, Lee, & Glaser, 2009, Chapter 6, System Acquisition). The configuration of the team are different levels of the organizations workforce, for example; CIO, Physician, Radiology Director, Nurse, Business, and Lab Managers. A system champion views the IT system as a way to provide better patient care, is well respected within the organization, assumes the leadership role, and will be an advocate for the information system (Wager, Lee, & Glaser, 2009, Chapter 6, System Acquisition).…

    • 657 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is411 Study Guide

    • 2595 Words
    • 11 Pages

    Policy change control board, minimally you should include people from information security, compliance, audit, HR, leadership from other business units, and Project Managers (PMs). Pg 172…

    • 2595 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    7. Terry stores all her files in the Documents folder on her C drive. She finds that the C drive is getting low on disk space, so she has a new disk installed. She wants to continue using her Documents folder as the location for organizing all her files, and most of her applications use this folder as the default location for opening and saving files. What is the best course of action for Terry to continue working as usual?…

    • 1020 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    VoIP at Butler University

    • 987 Words
    • 4 Pages

    Butler University identified weaknesses in the existing campus communication systems. Chief Information Office (CIO) Scott Kincaid’s identified the need to upgrade or replace the Centrex system as Butler student enrollment and administrative data communication needs had outgrown its usefulness. Arguments for the Centrex system were that users found the system reliability to be beneficial. Once employees have a system that meets their current needs, some are reluctant to go embrace the next step to enhancing job capabilities. The majority of students liked having campus provided email even though 92% had cell phones.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption.…

    • 268 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Throughout this journey called Information Technology. There have been many things that we have been able to take from these lessons. There has been the learning of systems of programming. The several ways in which an organization can choose to take in the succession of their company. We have read and learned in the readings concerning System development life cycle. This program has been designed so that the person or people put in place to maintain this system can take no short cuts. This process enforces quality and employees to go the extra mile. When making the decision whether to buy a program from retail or finding people who know the company soliciting them to form a system around the organization detailed needs. In the following you will read the summary of this week’s learning and or how we can apply these things to our work habitation.…

    • 513 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data.…

    • 263 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    America Is Still on Top

    • 1512 Words
    • 7 Pages

    that American universities are facing with it right now. Although American public and private universities…

    • 1512 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Most governing bodies would be built up of different committees to deal with different roles and issues. For example a different committee for finance, admissions, health and safety, staffing and curriculum.…

    • 949 Words
    • 4 Pages
    Better Essays
  • Good Essays

    “Joint Commission E-dition.” 2009 Accreditation Standards and Requirements From the Joint Commission (2009): March 12, 2009. .…

    • 1096 Words
    • 5 Pages
    Good Essays

Related Topics