Preview

Work Group Scenarios

Satisfactory Essays
Open Document
Open Document
320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Work Group Scenarios
Work Group Scenarios
Andre Cosens
IT 240
December 20, 2014
Derek Sorrells
Work Group Scenarios
As all three domains already exist on the network, I can start with setting up application permissions for the user accounts that will populate the domains. First I would have to set up user account access to the individual domains. I can use the Active Directory Users and Computers application to assign user accounts to the specific domains. After the user accounts are assigned to their respective domains, I will set up the domain access.
To set up the domain access I will utilize the Security Identifiers and Discretionary access control lists. While I could set users in the Alpha domain to have global access; everyone in the Alpha domain would have the ability to do so. This would be counterproductive to the requirements set forth. By utilizing the Discretionary Access Control List, we can set users to have specific access to resources and files across the network. After the user names and passwords are set and assigned to the respective domains, we can use the Active Directory Users and Computers application to grant specific members of the Alpha domain with access to the Omega domain. We can also ensure that specific members of the Alpha domain only have access to resources on the Alpha domain. I can also set the users in the Omega domain with access to strictly the Omega domain.
This set up will definitely accomplish the required result. By setting individual access per specific members of the Alpha domain, you can ensure that no one else has access to the Omega domain. A blanket group access for Alpha domain, would allow multiple users outside of the desired group within the Alpha Domain, to have access to the resources within the Omega domain. This also allows us to restrict the access of users in the Omega domain to just their local domain.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    Now that you have finished testing DNS and DHCP you will now configure the Windows Server 2008 machine as a replica Domain Controller. In this exercise you will install the Active Directory Domain Services Role on Server##A.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    dns scenairo

    • 624 Words
    • 2 Pages

    I recommend that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done so that the Root AD will automatically build the intersite replication topology based on the information provided about the new site connections. Each new site AD will have an individual domain controller that is known as the intersite topology generator and they are assigned to build the topology at their sites.…

    • 624 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The next feature that I will suggest to Richman Investment would be Access control. Access control restricts access to network resources and would require the user to have privileges to the resources. This would go hand and hand with the first feature that I suggested. You will need this for the first feature that I picked to give the users proper permissions to resources and this will help keep users out that should not have access to the resource.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I received your e-mail asking how to provide access to resources throughout your AD environment and you are not sure which strategies are best for the different situations you are encountering. I would recommend that since you have a domain for each department, such as Marketing, accessing one printer is very easy. To start, you will need to create a group that allows access to the one printer within each department. Once you have created each group you will then assign it to a domain local group, global group, and then to a universal group. Finally adding it to the Marketing domain group.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Q1. Which Administrative user accounts can create a site? Only the domain admin and the schema admin can create sites.…

    • 230 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Orange Creek, Inc., a Fortune 500 company, has moved into Lexington and is requesting bids for…

    • 2372 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    The user domain contains the employees that will be accessing resources in the network. Users access systems, applications, and data within the rights and privileges defined by the acceptable use policy. The AUP must be followed at all time or the user may be terminated. There are threats ranging from lack of awareness to blackmail and extortion. All employees are responsible for their own actions when using the network. The users will all be expected to read and abide by the acceptable use policy. (Kim & Solomon, 2012)…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    The domain local group scope can contain users or groups from any domain in the forest, but can only be used to secure resources in the same domain as the group. The global group scope…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. A) Active Directory Federation Services provides a way for users to access multiple services within a network using a single sign-on process that authenticates for all the services. This eliminates the need for the user to sign-on to multiple services and/or maintain multiple user accounts…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Exercise 3 of Lab A, and all of Lab E will not be assessed in…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Taylor, Danielle D. "Understanding Work Group Behavior." Job Bank USA: Employment, Job Search, Careers, Computer Jobs. Taylor Training & Development, Dec.-Jan. 2003. Web. 08 Dec. 2010. http://www.jobbankusa.com/.…

    • 2334 Words
    • 10 Pages
    Best Essays