Access Control Via Active Directory Lab Pt. 2

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

525

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by MajorMandrillPerson974

Report
Access Control via Active Directory Lab Lee Chauworn Houston II Sean Atkinson CYB – 525 January 31, 2024
Introduction The primary objective of this lab was to configure and understand the workings of a hybrid network using Active Directory. The lab involved tasks such as IP configuration, DNS and DHCP setup, and domain joining for various operating systems. Summary of Issues Encountered, Lessons Learned, and Successes - Encountered a challenge in populating the static IP in the Active Directory, resolved by restarting the system. - Successfully managed to ping and access the internet after IP address changes. - Faced an error while building the scope and realized the necessity to turn off the firewall in pfSense completely. - Encountered an issue with joining the domain on Windows 10 due to the use of Windows 10 Home, which cannot join domains. This was resolved by reinstalling with a compatible version. - Difficulty in adding user policies in Active Directory, later realized the approach should be organization-wide. Description of Screenshots 1. IP Configuration and Internet Access Test: Shows the successful change of IP address and the ability to ping and access the internet. 2. Active Directory Setup: Displays the configuration of the DNS, DHCP, and Active Directory. 3. DHCP Configuration Confirmation: A screenshot showing successful DHCP configuration. 4. Windows 10 Domain Joining: Illustrates the process of creating a static IP, running ifconfig, and joining the domain.
5. Organizational Unit Creation: Shows the creation of an organizational unit named "Training Users" and the addition of users. Benefits of a Hybrid Network 1. Flexibility and Scalability: Hybrid networks combine the best of both on- premises and cloud-based solutions, allowing for easier scaling and adaptation to changing business needs (Bigelow & Karjian, 2024). 2. Enhanced Security: Provides the ability to keep sensitive data on-premises while leveraging the cloud for non-sensitive operations (Palo Alto Network, What is Hybrid Cloud Security? ). Role of Active Directory in Accessing Information Active Directory plays a crucial role in managing network resources and user access control. It allows for centralized management of user credentials and permissions, making it easier to control who has access to what information within the network. Importance of Reviewing Security Logs in a SOC Reviewing security logs is critical in a SOC for the following reasons: - Detecting Security Incidents: By monitoring logs, SOCs can quickly identify and respond to security incidents. - Compliance and Auditing: Logs provide a trail of activities for compliance purposes and help in auditing network security. Conclusion
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
This lab provided valuable hands-on experience in setting up and managing a hybrid network using Active Directory. The issues encountered and lessons learned have been instrumental in understanding the intricacies of network configuration and management.
References Bigelow, S. J., & Karjian, R. (2024, January 12). What is hybrid cloud? the ultimate guide: TechTarget . Cloud Computing. https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud What is Hybrid Cloud Security? . Palo Alto Networks. (n.d.). https://www.paloaltonetworks.com/cyberpedia/what-is-hybrid-cloud-security