Lab 5 CIS 287M

docx

School

Portland Community College *

*We aren’t endorsed by this school

Course

287M

Subject

Computer Science

Date

Nov 24, 2024

Type

docx

Pages

8

Uploaded by JudgeBoulder5277

Report
CIS 287M Module 5 Lab Deliverable 1: Screenshot the 3 new users in the Users folder in ADUC. Description: The Active Directory Users and Computers window, showcased in the screenshot within the Server Manager Dashboard, is divided into two panes. The left pane serves as a folder tree, while the right pane displays user details, including names, descriptions, and group memberships within the "Users" folder. A top toolbar offers management options, and the maximized window retains visibility of the taskbar at the bottom for easy access to other applications and system functions. Deliverable 2: Screenshot the AD Rights Management Services Console showing successfully connected.
Description: The screenshot presents the Active Directory Rights Management Services window for a Cluster Server in a Cluster common configuration and logging setup. The interface includes a menu bar with File, Action, View, and Help options, along with a toolbar containing icons for Add, Edit, Delete, Refresh, and Help. A tree view on the left side features "Cluster common configuration and logging" as the selected item, while the right side provides detailed information pertaining to the chosen item in the tree view. Deliverable 3: Screenshot the DC01 url in the box before clicking close.
Description: The Windows 10 desktop in the screenshot shows a blue background with the Recycle Bin icon. An open Control Panel window with the "Network and Internet" category selected displays the Internet Properties dialog box, with the "Security" tab highlighted. This dialog box prompts the user to add a website to the list of trusted sites, offering an input field for the website URL (e.g., "example.com") and server verification options. It illustrates a user's interaction with internet security settings. Deliverable #4- Screenshot the list drop down with Test being selected.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Description: The screenshot reveals the Info tab of a Microsoft Word document. This document, titled "Document1 - Word," was last modified on 11/23/2021 by the user "RMS1." It comprises a single page and has a file size of approximately 0.3 MB. Deliverable #5 Screenshot the My Permission box showing that RMS1 has full control.
Description: This screenshot displays a Microsoft Word document titled “Hello World”. The document contains a single line of text that reads “Hello World”. Additionally, there is a pop-up window titled “My Permission” which asks the user for permission to view the document. The pop-up lists various permissions, including “View”, “Edit”, “Print”, and “Copy”. Deliverable #6- Screenshot the My Permission box showing that you only now only have View (Read) access.
Description: The screenshot depicts a Windows virtual machine with microsoft word document named "Hello World." This showcases a pop-up window providing details about its name, version, size, and file type, with an "OK" button for user interaction. The taskbar at the screen's bottom confirms the virtual machine is operating on a Windows OS, featuring familiar icons like the Windows start button, a search bar, and a clock. Deliverable #7- Why did we type in the email address in the email box in the user properties?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Entering an email address in the user properties uniquely identifies the user within the system and facilitates email communication for notifications and user contact. It's also a common integration point for various system functions, streamlining user management and communication. Did you encounter any problems or challenges while going through this lab? What were they? How did you resolve those problems? I did not encounter any problems with this lab. What did you learn from going through this Module? If this was review for you, select a topic that interests you from this module and write about it. Responses to this question must be at least 100 words for full credit. Through this module, I have gained valuable insights into the deployment of Active Directory Rights Management Services (AD RMS) in a Windows environment. I've learned how to install and configure AD RMS, which is a fundamental step in securing and managing sensitive data within an organization. One of the key takeaways from this module is the significance of specifying email addresses in user properties, a critical aspect of user identification and authentication, especially when enforcing rights policies and controlling data access. Additionally, I've developed an understanding of the creation and application of rights policies, granting me the ability to finely control who can access and modify specific documents or data, which is pivotal for data security. The module has also underscored the importance of configuring shared folders and client permissions accurately, as this is essential for effective data management and security.
Ultimately, the knowledge I've gained from this module empowers me to enhance data security, ensure compliance with privacy and regulatory requirements, and protect sensitive information effectively using AD RMS in a Windows environment. This skill is valuable for safeguarding an organization's critical data assets.