How do you plan to recover from these types of loss of


Read the Managing Access to an Active Directory Environment located on the student website and select one option to complete the assignment.

Option 1: Managing Access to an Active Directory Environment

Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules:

· The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president's administrative assistant.

· The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president's administrative assistant.

· The director of store operations can use any equipment in any location.

Design group objects to implement group policies to manage access to these resources. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data.

· How do you plan to recover from these types of loss of current AD DS and other critical information?

· What utilities might you investigate to help accomplish your plan?

Option 2: Managing Access to an Active Directory Environment (Graphical)

Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location.

Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table:

Name

Membership

Type

Scope

Permissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?

Option 3: Managing Access to an Active Directory Environment (Advanced)

Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufacturing has four locations. Recent visits by members of the executive team to these locations have generated a new set of access requirements. These are the rules you have been provided:

· President and CEO Dr. Michael Riordan is the only person authorized to have full access to all files and equipment at all locations.

· Senior Vice President Kenneth Collins and Chief Operating Officer Hugh McCauley are to have access to one PC and one printer/scanner/fax located in the management office of each location.

· Executive Assistant Jane McCall is to have access to the printer/scanner/fax machine located in the management offices of each location.

· The managers of each location are to have access to Executive Assistant Jane McCall's executive office printer/scanner/fax machine.

Design group objects to implement group policies to manage access to these resources. Use either a table as in Option 1 or graphical representation as in Option 2.

Working with the Hangzhou, China network, you notice that the single domain has recently been organized using four subnets.

Write a 1-page report that answers the following questions:

· What problems related to replication might this situation cause?

· What is your recommended solution?

Request for Solution File

Ask an Expert for Answer!!
Computer Networking: How do you plan to recover from these types of loss of
Reference No:- TGS01007357

Expected delivery within 24 Hours