Preview

Work Group Scenarios

Satisfactory Essays
Open Document
Open Document
320 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Work Group Scenarios
Work Group Scenarios
Andre Cosens
IT 240
December 20, 2014
Derek Sorrells
Work Group Scenarios
As all three domains already exist on the network, I can start with setting up application permissions for the user accounts that will populate the domains. First I would have to set up user account access to the individual domains. I can use the Active Directory Users and Computers application to assign user accounts to the specific domains. After the user accounts are assigned to their respective domains, I will set up the domain access.
To set up the domain access I will utilize the Security Identifiers and Discretionary access control lists. While I could set users in the Alpha domain to have global access; everyone in the Alpha domain would have the ability to do so. This would be counterproductive to the requirements set forth. By utilizing the Discretionary Access Control List, we can set users to have specific access to resources and files across the network. After the user names and passwords are set and assigned to the respective domains, we can use the Active Directory Users and Computers application to grant specific members of the Alpha domain with access to the Omega domain. We can also ensure that specific members of the Alpha domain only have access to resources on the Alpha domain. I can also set the users in the Omega domain with access to strictly the Omega domain.
This set up will definitely accomplish the required result. By setting individual access per specific members of the Alpha domain, you can ensure that no one else has access to the Omega domain. A blanket group access for Alpha domain, would allow multiple users outside of the desired group within the Alpha Domain, to have access to the resources within the Omega domain. This also allows us to restrict the access of users in the Omega domain to just their local domain.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    Now that you have finished testing DNS and DHCP you will now configure the Windows Server 2008 machine as a replica Domain Controller. In this exercise you will install the Active Directory Domain Services Role on Server##A.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The next feature that I will suggest to Richman Investment would be Access control. Access control restricts access to network resources and would require the user to have privileges to the resources. This would go hand and hand with the first feature that I suggested. You will need this for the first feature that I picked to give the users proper permissions to resources and this will help keep users out that should not have access to the resource.…

    • 444 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Orange Creek, Inc., a Fortune 500 company, has moved into Lexington and is requesting bids for…

    • 2372 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Q1. Which Administrative user accounts can create a site? Only the domain admin and the schema admin can create sites.…

    • 230 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    dns scenairo

    • 624 Words
    • 2 Pages

    I recommend that all the information that is needed for each new site is correctly documented and added to the Root Active Directory through the Active Directory sites and services. This is done so that the Root AD will automatically build the intersite replication topology based on the information provided about the new site connections. Each new site AD will have an individual domain controller that is known as the intersite topology generator and they are assigned to build the topology at their sites.…

    • 624 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. What action should administrators take for the existing workgroup user accounts after converting to the Active Directory? Create new user accounts for all users. Then you need to manually join these computers to the AD domain.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    With R&D, you will need to take a slightly different approach. To allow access to only the server, you have to first create a domain local group that has some administrative rights. Then you will need to add them to a customized admins group that you have control of. You can then assign the permissions and rights as you create and assign them. Remember to limit access to their local machines only. Through the desktop local user account settings, you will be able to do all of this. This is just one of the approaches you can take. If you choose you can take a different approach. If you have any further questions or problems feel free to contact me again.…

    • 310 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    lab 5

    • 718 Words
    • 3 Pages

    Provide at least 3 examples of Network Architecture Controls that help enforce data access policies at LAN-to-WAN Domain level.…

    • 718 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Notes and Terms

    • 2288 Words
    • 10 Pages

    2. What tools do you use to create domain and ADS? You can use the Ntdsutil.exe tool to create installation media for additional domain controllers that you are creating in a domain. By using the Install from Media (IFM) option, you can minimize the replication of directory data over the network. This helps you install additional domain controllers in remote sites more efficiently.…

    • 2288 Words
    • 10 Pages
    Good Essays
  • Best Essays

    Taylor, Danielle D. "Understanding Work Group Behavior." Job Bank USA: Employment, Job Search, Careers, Computer Jobs. Taylor Training & Development, Dec.-Jan. 2003. Web. 08 Dec. 2010. http://www.jobbankusa.com/.…

    • 2334 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    Exercise 3 of Lab A, and all of Lab E will not be assessed in…

    • 391 Words
    • 2 Pages
    Satisfactory Essays