Preview

Unit 5 Exercise 1 Security

Good Essays
Open Document
Open Document
308 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 5 Exercise 1 Security
C
D
B
A
B
E
D
A & D
A & C
A & D
C
C & D
B
A & C
A
A & B
D
C
B
C
From: System Admin
To: Manager
I have read the issues and I would recommend these steps to better manage our business workstations.
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.
Team leads need to have access to their files from any workstation. Team leads will be assigned standard roaming users.. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every other year.
Since to Marketing Staff have dedicated work stations, they will be added to whatever type of user permissions needed per staff.
If you would like these actions to be notified to all your employees regarding this system update through email. We will give it 2 Days regarding the system update to notify all groups.
From: System Admin
To: Manager
I have read the issues and I would recommend these steps to better manage our business workstations.
This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.
Team leads need to have access to their files from any workstation. Team leads will be assigned standard roaming users.. Due to the level of access and availability of said access, Team Lead passwords will be set to be changed every other year.
Since to Marketing Staff have dedicated work stations, they will be added to whatever type of user permissions needed per staff.
If you would like these actions to be notified to all your employees regarding this system update through email. We will give it 2 Days regarding the system update to notify all groups.

You May Also Find These Documents Helpful

  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Most of the salespeople for Old Reliable Life Insurance are visiting customers in their homes or offices. Today, the salespeople carry a laptop computer to show value projections and cash flow summaries for various policies. Many of them also carry a PDA for appointments and a mobile phone. Julie would like to ensure that salespeople have access to the home office server computers while they are making their sales presentations to customers. In order to do this I have prepared three of the best options, to be reviewed, that I believe would benefit the customer as well as the salesperson.…

    • 596 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Adequate training has to be established for all staff members on how to use the system. Training could be done through the internet or done through IT support. To be able to have the adequate training for all staff members would need access to a PC, the new IT system and the internet. Training should take about two weeks. The…

    • 6284 Words
    • 26 Pages
    Powerful Essays
  • Better Essays

    I don’t really see to many issues with the site. I would suggest upgrading all 45 dell laptops to include client computers to Dell XPS laptops. The XPS is better quality than the Dells they have now but will last longer and perform better and I would switch from Microsoft office to 2010. As for the rest of the network goes, I would use Cat-6 cables instead of the Cat-5. Cat-6 is a thicker wire and will carry data longer distances than Cat-5 and…

    • 1877 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Home Computer FASB

    • 1138 Words
    • 5 Pages

    In January 2002, Home Computer announced a plan to restructure its operations (the “Plan”). The Plan was approved by the Board of Directors at a special meeting on February 3, 2002. The details of the Plan are as follows:…

    • 1138 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With R&D, you will need to take a slightly different approach. To allow access to only the server, you have to first create a domain local group that has some administrative rights. Then you will need to add them to a customized admins group that you have control of. You can then assign the permissions and rights as you create and assign them. Remember to limit access to their local machines only. Through the desktop local user account settings, you will be able to do all of this. This is just one of the approaches you can take. If you choose you can take a different approach. If you have any further questions or problems feel free to contact me again.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    Read permission, this permission is necessary to allow the user of a group to get information of another department in the business.…

    • 504 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    What exactly does this mean? It means that all your local and network resources need to be made accessible all the time, but to only the right people. It is the second part of this statement that causes difficulty. Most administrators have no problem making the resources available, but the issue of "to only the right people" is where the confusion begins. Who are the "right people"? Who decides who the "right people" are? Is it possible for someone to be considered in the "right people" group only during certain hours of the day?…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Unit 9 - Email

    • 701 Words
    • 3 Pages

    The following is the email I have created that I feel will not only explain the urgency to the managers but also properly prepare them for this technological advancement.…

    • 701 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It’s important that all members of staff are made aware of any new policies or changes to existing policies. Staff are made aware by staff meetings. It will then need to be agreed by the governing body before it takes effect.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Linux Security Lab 2

    • 304 Words
    • 2 Pages

    Break down admin responsabilities and only give them the access for what duties they need to perform. PAM command is a great idea in this scenereo.…

    • 304 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computing devices, such as a desktop computer, has become productivity tools for enterprises and their users. A user’s inability to access the computer due to a computer glitch or understand a certain function prevents the user from completing tasks. Glitches diminish productivity in the enterprise and handicap the goal and mission of the business. Supporting computing devices have become a high demand and many enterprises implement the Information Technology department with Help Desk technicians at the front line. The common bottleneck issue within the Help Desk, in relation to a business, stems from the business practice. The Help Desk is commonly blamed for all issues regarding technology. Because the Help Desk’s practices are not business oriented, it is usually plagued with an overwhelming number of work orders. However, the Help Desk lacks training and have poor processing and tracking procedures to meet business standards. Sig-Sigma’s methodology, DMAIC: analyze, improve, and control, will clarify how the Help Desk can improve in this area.…

    • 841 Words
    • 4 Pages
    Good Essays