Active Directory Proposal Users and administrators of the current Windows Domain infrastructure have identified a few problems and concerns with the design. The administration team is proposing a new Active Directory (AD) design that will address some if not all of the identified concerns. This document will detail those concerns, the proposal, and how the proposal addresses those concerns. Concerns Several concerns have been brought to the administration team regarding problems with the current design. Additionally, the administration team has analyzed these concerns and identified three primary concerns that can be better addressed with AD. These concerns reflect issues with productivity loss and reduced security. The first concern is the ability for any user to log into any system on the network. This exposes sensitive corporate and financial documents and programs to unauthorized individuals. While it is possible to restrict domain logins to specific computers, this required more administrative overhead than the business was willing to pay. Secondly, users have complained about the amount of time required for access requests to be performed. This is due to the lack of sufficient administrative resources to rapidly perform these requests. This means that productivity is lost while new or recently transferred employees wait for their access requests to be filled. The third concern is that frequently privileged users have unintentionally made changes to systems
2. Which of the problems of the current design would your chosen design addresses? What problems (if any) would not address? Are there any new problems to which it might lead?
What problems or difficulties do you anticipate with implementation of this type of decision support solution?
USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.
When you have a single server, users will have to login to their local machines via a local account. Any data that they would need access to on the network will need to be authenticated via a set of credentials on the server itself. The user in this case will be using two different set of credentials to access all of their data. When you move into a directory-based network with multiple servers in different roles, things become very easy for both the users and the administrators. The administrators will need to connect each computer to the domain that way the computer will become trusted and the user accounts will be able to be authenticated by the domain controller. Both the local computer logins as well as access to all of the data on each and every server will be the same and configured from just one location. This makes it easier for the
Lab Three repeats much of Lab Two by setting up the same core services, DNS and DHCP, but adds Microsoft’s Active Directory role to the server. The lab introduces the student to administrating these services in a Graphical based, Windows environment.
This is an open exposure due to the uncertainties of the internet. Controlling access to information systems and associated networks is necessary for the preservation of their confidentiality, integrity, and availability. Confidentiality assures that the information is not disclosed to unauthorized persons or processes. Any automated attacks or personal attack or attack to exploit the company secrets/statistics/data is the biggest threat to that may occur without the firewall.
The purpose of this project is to conduct an analysis research into the implementation and management of this business enterprise system. This project deals with developing and upgrading the computer system to handle to daily work load of our business while being able to conduct communication between sites and data back-up. Furthermore, we will analyze other various architectures features such as: system requirements, architecture selection, resources and timeline, security and the
3. What major problems might you encounter with your new sales force structure as it relates to both external factors (customers) and internal factors (employee reactions)?
1. User Domain- The User Domain defines the people in the organization that make up the network. Employees are responsible for the use of their assets. That responsibility is extended to the information that is classified as “internal use only”. This domain is affected in a few different ways. First, it forces the user to become aware of what they are sending through emails out to external addresses. Information that is classified as “internal use only” cannot be divulged in emails, texts, or over the phone. This is information that may or may not be classified that must not be seen beyond the confines of the company infrastructure.
Briefly describe the current state of NDAS’s office automation, system integration, and networking. Begin by explaining how each department uses information technology, what hardware it uses, and what functions currently are automated. Also assess which department is most in need of a network.
1. In terms of hardware, software, databases, telecommunications, and the Internet, what specific recommendations are you prepared to make to Sewtown to improve the speed, accuracy, and reliability of their information system?
2 Since the security is weak it can cause problems if the sensitive data is leaked out of the company in any way.
the workload within the current services” – this points out that there is a shortage of internal resources to
b. What will the new system accomplish? What functions will it perform? Which organization goals will it support?
Thanks to several experiences as a department and administrative assistant, I believe I can help to solve these challenges. As an Administrative Assistant