You have been hired to develop a plan for implementing a Windows Active Directory network for a small office of 25 people.   In place is three servers- an Active Directory domain controller, a file server, and a print server.  There are five departments- Marketing, Accounting, Management, Sales and IT. Your task is to design a logical network for a small business, including file and print services, networking hardware requirements, security requirements, etc.  Include troubleshooting service interruptions and security breaches for contingency planning.  Use this information in your design- Each person has a Windows 10 desktop to use except for the 5 salespeople who have laptops.  There is a printer for each department and a network copier to which all staff can print. There are 2 people in IT. On the file server, there is a folder called OfficeWide that everyone has full access to and each department has its own folder to which only department members have access.  Members of the management office have full access to all folders.  Each user will have a personal folder to which only they have access. For security, develop a policy for network accounts- what is the convention for user names and what are the password requirements.  (Ex. one username convention might be firstInitiallastName- ie.  ALincoln) What groups should be part of the network? How will access to department folders and the officewide folder be managed?  What permissions are given to each folder and who gets them? How will printing be managed as outlined in the description above? How will patch management happen?  When will patches be applied? Is there remote access to the network resources?  If so, how will this be provided? What additional security will be in place to protect resources?  Outline steps to take in the event of a data breach.  This information should be in a report form that is presented to the managers of the company.  It should include an introduction outline of the task and a conclusion summarizing the next steps.  Heading and bullets may be used to improve the reliability of the report.  The length of the paper depends on how the information is present but generally about 5 double-spaced pages should work.  Be sure to include a reference page for any references used.

Fundamentals of Information Systems
8th Edition
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter8: Systems Development
Section: Chapter Questions
Problem 6SAT
icon
Related questions
Question

You have been hired to develop a plan for implementing a Windows Active Directory network for a small office of 25 people.   In place is three servers- an Active Directory domain controller, a file server, and a print server.  There are five departments- Marketing, Accounting, Management, Sales and IT.

Your task is to design a logical network for a small business, including file and print services, networking hardware requirements, security requirements, etc.  Include troubleshooting service interruptions and security breaches for contingency planning.  Use this information in your design-

  • Each person has a Windows 10 desktop to use except for the 5 salespeople who have laptops.  There is a printer for each department and a network copier to which all staff can print. There are 2 people in IT.
  • On the file server, there is a folder called OfficeWide that everyone has full access to and each department has its own folder to which only department members have access.  Members of the management office have full access to all folders.  Each user will have a personal folder to which only they have access.
  • For security,
    • develop a policy for network accounts- what is the convention for user names and what are the password requirements.  (Ex. one username convention might be firstInitiallastName- ie.  ALincoln)
    • What groups should be part of the network?
    • How will access to department folders and the officewide folder be managed?  What permissions are given to each folder and who gets them?
  • How will printing be managed as outlined in the description above?
  • How will patch management happen?  When will patches be applied?
  • Is there remote access to the network resources?  If so, how will this be provided?
  • What additional security will be in place to protect resources?  Outline steps to take in the event of a data breach. 

This information should be in a report form that is presented to the managers of the company.  It should include an introduction outline of the task and a conclusion summarizing the next steps.  Heading and bullets may be used to improve the reliability of the report.  The length of the paper depends on how the information is present but generally about 5 double-spaced pages should work.  Be sure to include a reference page for any references used.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Network Security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning