Preview

Managing Access to an Active Directory Environment

Satisfactory Essays
Open Document
Open Document
268 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Managing Access to an Active Directory Environment
Managing Access to an Active Directory Environment
Emile Descamp
POS/421
Rufus Roger
October 17, 2012

Managing Access to an Active Directory Environment

Note: See also attached PowerPoint.

Name | Membership | Type | Scope | Permissions | President | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | President Assistant | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | Director Of Operations | Pres.-Group | Group | Across Domain | Usage of Desktops, Laptops, Printers | La Jolla Employees | La-Group | Group | Local, La Jolla OU | Local usage of Desktops, Laptops, Printers | Del Mar Employees | Del-Group | Group | Local, Del Mar OU | Local usage of Desktops, Laptops, Printers | Encinitas Employees | Enc-Group | Group | Local, Encinitas OU | Local usage of Desktops, Laptops, Printers | * There are many was to secure a business either small or large. If synchronizing the servers between each other, this process will create a backup of all the data between the servers, as well for arranging an off-site backup location to protect any further loss or corruption. Another option is a BitLocker , which is a security feature that allows a user or network administrator to lock hard drives. If Kudler Fine Foods has sensitive corporate data on any hard drives, the user or admin can lock the hard drive with a password so that it cannot be accessed. This adds another layer of protection and ensures that the hard drive simply cannot be pulled out of the computer and attempted to be read as a secondary hard drive on another computer. This is a good feature for protecting data, especially for laptops that will be traveling and could potentially be

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1330 Unit 3 Lab Report

    • 567 Words
    • 3 Pages

    This will create a fault tolerant environment and a backup server in the event of a failure in Server##.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 5 assignment

    • 340 Words
    • 2 Pages

    BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.…

    • 340 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Laptops and workstations have their own set of security risks associated with them. They are vulnerable to being compromised by malware, spyware, or even hackers that take advantage of certain exploits. Laptops, workstations and mobile devices are susceptible to malicious software attacks, theft or loss. Viruses and malware can affect these devices and are usually acquired through contaminated email attachments and hyperlinks that redirect the user to exploited web sites or are transferred through USB storage devices. Viruses and malware can also be acquired by downloading infected files or programs that are designed by hackers. Because of the need to protect systems against threats, all workstations and laptops should be secured with antivirus and firewall software and updated and patched on a regular basis to fix vulnerabilities with the software that hackers may exploit. Since the laptops are mobile by nature they are at risk of being stolen along with all of the data saved on their hard drives. The best security method for this would be to encrypt the hard drives on the laptops and where feasible only store sensitive data on corporate servers…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    7. Terry stores all her files in the Documents folder on her C drive. She finds that the C drive is getting low on disk space, so she has a new disk installed. She wants to continue using her Documents folder as the location for organizing all her files, and most of her applications use this folder as the default location for opening and saving files. What is the best course of action for Terry to continue working as usual?…

    • 1020 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Task B 307

    • 338 Words
    • 1 Page

    To make sure all records are properly secured you should have passwords on all computers and locks on all filing cabinets, making sure after every use you put paper files away and you lock your computer if you need to leave it. If you were to have visitors in the office were you secure document you should make sure you have put all away and not leave anything on show. When you have locked the cupboards you should keep the key with authorised person.…

    • 338 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    These are basic steps towards securing the central database from attacks such as denial of service that is mainly caused by unauthorised access. The strategy is simple and less costly thus cannot cause strain on the budget.…

    • 349 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 1 2 NT2799 NSA Capstone Project Dr. Gordon Plorin, PMP ITT Technical Institute Unit 06: Oral Assessment Review 3 Oral Assessments Skills Assessment Interview • 15% of the course total The questionnaire consists of • 15 sets of questions • 3 questions in each set…

    • 4261 Words
    • 28 Pages
    Good Essays
  • Satisfactory Essays

    Btec Unit 26 P1,P2,P3,P4

    • 1593 Words
    • 7 Pages

    AdvantagesIt is important to know what your ‘’competitors’’ follow for coursers and what services they are capable of to deliver. In this profession it is important to keep learning more technics and make sure that you don’t ‘get behind on your competitors. It’s normal in this profession that you will help your colleagues and they help you: within getting clients and learning more about the profession.Disadvantages: You would say that you helping your competitors is a disadvantage but it is certainly not, because there is a high demand for treatments from physical therapists and there are not many physical therapists. Therapists help each other for example by swapping clients. Every physical therapists is different, so for example; if a client has high back problems it might be better to send him to another therapist who is better in dealing with these issues. Or if a client has problems with traveling, the therapist could sent him to another physical therapist which isn’t that far to travel.…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    ▪ The data must be stored in a locked drawer, room, or an area where access is controlled by a guard, cipher lock, or a card reader. The area must have sufficient physical access control measures to afford adequate protection and prevent unauthorized access by visitors or other persons without a need-to-know.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    About Tjx Assignment

    • 525 Words
    • 3 Pages

    Technological: At a minimum the data should have been encrypted and password protected. As a practical measure, the laptop should have been protected at the BIOS level if that sensitivity of data was contained.…

    • 525 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    IS3110 Lab 6

    • 734 Words
    • 3 Pages

    A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Synchronization might appear relatively straightforward, but it can quickly become complicated and problematic, driving the need…

    • 2191 Words
    • 9 Pages
    Powerful Essays