Preview

IS3340 Week 1 Assignment 1

Satisfactory Essays
Open Document
Open Document
257 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3340 Week 1 Assignment 1
IS3440 Windows Security
Shannon Miles
Week 1 Assignment 1
1. Active directory is controlled from an Active Directory server. The server is accessed by an administrator and then the changes that are made on the AD infrastructure is replicated to all workstations and users that login. AD exists in one location and replicated or issues out the permissions, rules, and roles out to the objects it is managing.
2. Permissions are generally going to be submitted by a request to the administrator and then after it is approved, the work is completed. Password changes can be done using utilities or requests. Depends on how the organization decides on that feature. Active directory has a central management system. Team of administrators or one administrator, depending on the size of the team or department.
3. Administrators need to take into account the roles and permissions of the existing infrastructure. Planning and mapping out of the groups, policies, rules, and permissions will need to be thought out. This will lessen the mistakes of having some overlap or leaving gaps of security loop holes. Wiping out existing structure after migrating users.
4. All permissions and policies will be uniform when Active Directory is employed into the infrastructure. Administrators can change permissions and privileges to meet requirements for that group or department.
5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330

    • 268 Words
    • 2 Pages

    3. Which departments will need what permissions as far as access to computers, printers, and scanners?…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    Now for creating users and groups there will be no special permissions in order to “create” them but when it comes to the specific users and groups there will be. The Web Administrators will have their own permissions and groups, the Linux administrators will have their own users and group, and the Security Analyst will have their own groups. I think that there should be a group set up so that all departments can talk with each only to help each other and inform each other of certain things. The Security group I feel should have access to the maintenance group so that they can get regular updates and patches, and to the Web Admin group so they can apply the updates/patches. Web and Linux groups will not have access to the Security so that way no one can go in and change anything with security. The Web admin and Linux admin will have permissions for each other so they can make changes that are needed but they will only have certain permissions for that, for example, Linux will not be able to go in to Web Admin and change how the website looks and Web Admin can’t go in to Linux and change how things run.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It222 Week 1

    • 466 Words
    • 2 Pages

    An ordinary Domain Controller can do nifty things, like add a new user/group, make mods to it's own system to accommodate updates, ect. A Read Only Domain Controller can only be changed by a main Domain Controller making updates to it.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. What is the mechanism on a Windows server where you can administer granular policies and permissions on a…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    d. Active Directory Rights Management Services (AD RMS) (AD RMS) is information protection technology that works with AD RMS -enabled applications to help safeguard digital information from unauthorized use. Content owners can define exactly how a recipient can use the information, such as who can open, modify, print, forward, and/or take other actions with the information. Organizations can create custom usage rights templates such as "Confidential - Read Only" that can be applied directly to information such as financial reports, product specifications,…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    users and assign rights to resources? Authentication and Authorization 2 | Lab #3: Enabling Windows Active Directory and User Access Controls…

    • 518 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Within the AD policy, the admin can adjust different polices that allows for users to have different access while on the same network, but also have different controls at different local machines. This is done by…

    • 431 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    An Active Directory (AD) structure is a hierarchical framework of objects. The objects fall into three broad categories such as resources which include printers, services which include email, and users which include user accounts and groups. The Active Directory provides information on the objects, organizes the objects, controls access and sets security. Active Directory is designed to play many different roles within an organization. The roles range from managing Windows networks to managing directory enabled applications. Active Directory empowers organizations to centralize their directory management in a more streamlined,…

    • 848 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Active Directory Proposal Active directory is a network technology that provides a variety of network services. The services include: Directory services: these services provide every user with a home directory. The user can store his/her files on it, can install software etc. Each user’s directory will be protected by a user name and password. Authentication services: Active directory comes with Kerberos based authentication services. These services can be used for checking of various user name and passwords for various applications. Domain naming: This particular service allows a page to be accessed via a domain name. DNS servers store the domain names and the pages address. Since active directory uses a same database, it allows administration to apply critical updates to an organization, assign policies, and deploy software. Active Directory stores information and settings in a central database.…

    • 696 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    * Dean; * Chairman of each Department; and * Faculty The administrator account is the most powerful among all the user account because in this account, the dean can access all the possible fields inside the system while the other user account like the Chairman of each Department and faculty, is being restricted or limited.…

    • 695 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    saad

    • 351 Words
    • 2 Pages

    Admin: He can read or write the information about any member and can update, delete or create a member.…

    • 351 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Flow Diagram

    • 436 Words
    • 2 Pages

    The Administrator entity shows the capability to access the system; manage account by modifying account’s profile; managing member’s account such as creating new user profile and updating user profile; importing student list; creation of grade criteria; generating students grade report and updating website contents.…

    • 436 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CareGroup lacked a standardized operational flow Little control and IT governance on common users to access or make changes to the network configuration…

    • 557 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT113 Unit 5

    • 393 Words
    • 2 Pages

    by the Active Directory design. The Windows Server 2003 forest functional level is the highest…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS333 Assignment 1 S1 2015

    • 2192 Words
    • 9 Pages

    Instructions Questions: There are two questions for this assignment. All teams must do question 1. Teams consisting of…

    • 2192 Words
    • 9 Pages
    Good Essays

Related Topics