You have been hired to develop a plan for implementing a Windows Active Directory network for a small office of 25 people.   In place is three servers- an Active Directory domain controller, a file server, and a print server.  There are five departments- Marketing, Accounting, Management, Sales and IT. Your task is to design a logical network for a small business, including file and print services, networking hardware requirements, security requirements, etc.  Include troubleshooting service interruptions and security breaches for contingency planning.  Use this information in your design- Each person has a Windows 10 desktop to use except for the 5 salespeople who have laptops.  There is a printer for each department and a network copier to which all staff can print. There are 2 people in IT. On the file server, there is a folder called OfficeWide that everyone has full access to and each department has its own folder to which only department members have access.  Members of the management office have full access to all folders.  Each user will have a personal folder to which only they have access. For security, develop a policy for network accounts- what is the convention for user names and what are the password requirements.  (Ex. one username convention might be firstInitiallastName- ie.  ALincoln) What groups should be part of the network? How will access to department folders and the officewide folder be managed?  What permissions are given to each folder and who gets them? How will printing be managed as outlined in the description above? How will patch management happen?  When will patches be applied? Is there remote access to the network resources?  If so, how will this be provided? What additional security will be in place to protect resources?  Outline steps to take in the event of a data breach.  This information should be in a report form that is presented to the managers of the company.  It should include an introduction outline of the task and a conclusion summarizing the next steps.  Heading and bullets may be used to improve the reliability of the report.  The length of the paper depends on how the information is present but generally about 5 double-spaced pages should work.  Be sure to include a reference page for any references used.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

You have been hired to develop a plan for implementing a Windows Active Directory network for a small office of 25 people.   In place is three servers- an Active Directory domain controller, a file server, and a print server.  There are five departments- Marketing, Accounting, Management, Sales and IT.

Your task is to design a logical network for a small business, including file and print services, networking hardware requirements, security requirements, etc.  Include troubleshooting service interruptions and security breaches for contingency planning.  Use this information in your design-

  • Each person has a Windows 10 desktop to use except for the 5 salespeople who have laptops.  There is a printer for each department and a network copier to which all staff can print. There are 2 people in IT.
  • On the file server, there is a folder called OfficeWide that everyone has full access to and each department has its own folder to which only department members have access.  Members of the management office have full access to all folders.  Each user will have a personal folder to which only they have access.
  • For security,
    • develop a policy for network accounts- what is the convention for user names and what are the password requirements.  (Ex. one username convention might be firstInitiallastName- ie.  ALincoln)
    • What groups should be part of the network?
    • How will access to department folders and the officewide folder be managed?  What permissions are given to each folder and who gets them?
  • How will printing be managed as outlined in the description above?
  • How will patch management happen?  When will patches be applied?
  • Is there remote access to the network resources?  If so, how will this be provided?
  • What additional security will be in place to protect resources?  Outline steps to take in the event of a data breach. 

This information should be in a report form that is presented to the managers of the company.  It should include an introduction outline of the task and a conclusion summarizing the next steps.  Heading and bullets may be used to improve the reliability of the report.  The length of the paper depends on how the information is present but generally about 5 double-spaced pages should work.  Be sure to include a reference page for any references used.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education