Emile Descamp
POS/421
Rufus Roger
October 17, 2012
Managing Access to an Active Directory Environment
Note: See also attached PowerPoint.
Name | Membership | Type | Scope | Permissions | President | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | President Assistant | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | Director Of Operations | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | La Jolla Employees | La-Group | Group | Local, La Jolla OU | Local usage of Desktops, Laptops, Printers | Del Mar Employees | Del-Group | Group | Local, Del Mar OU | Local usage of Desktops, Laptops, Printers | Encinitas Employees | Enc-Group | Group | Local, Encinitas OU | Local usage of Desktops, Laptops, Printers | * There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption. Another option is a BitLocker , which is a security feature that allows a user or network administrator to lock hard drives. If Kudler Fine Foods has sensitive corporate data on any hard drives, the user or admin can lock the hard drive with a password so that it cannot be accessed. This adds another layer of protection and ensures that the hard drive simply cannot be pulled out of the computer and attempted to be read as a secondary hard drive on another computer. This is a good feature for protecting data, especially for laptops that will be traveling and could potentially be