SlideShare a Scribd company logo
1 of 12
Upgrade of Small Elementary
    School’s Technology
At Start
•   Wired network consisting of several switches
•   No border protection
•   1 windows server 2000 non AD enabled
•   50-60 windows 98, Millennium, and XP clients
•   Workgroup network design
•   No backup solution
•   No antivirus solution
•   No filtering solution
•   Low budgetary allowance
Considerations
• Budgetary constraints allow best case
  scenarios as opposed to ideal scenarios
• Technology upgrade
• Ease of administration
• Regulatory Compliance
Goals
•   Implement wireless network
•   Border protection
•   Implement centralized server solution
•   Upgrade existing client technology
•   Implement cost effective backup solution
•   Implement antivirus solution
•   Implement filtering solution
Implement Wireless Network
• Devices should be able to roam seamlessly
  across campus
• Site survey
• Implementation and testing
• Result: Freedom of movement
Border Protection
• Port blocking implemented on border device
• Administrator trained in use and concepts
• Result: Attack surface reduced
Centralized Server Solution
• Select appropriate hardware and install
• Train administrator on active directory
  concepts, user management, policy use and
  proper OU structure
• Design an effective OU structure, user
  management polices and other aspects that fit
  the clients needs and help alleviate future
  difficulties when the time for change comes
Centralized Server Solution 2
•   Install active directory and related services
•   Implement file server role
•   Implement user management
•   Implement print server role
•   Centralize user file management
•   Implement access control policies concerning
    centralized user data
Centralized Server Solution 3
• Result: Almost all user created data stored in a
  centralized solution due to polices directing user
  storage
• Result: Users are now managed centrally
• Result: User access to data now under the control of
  the Administrator in a centralized location, access
  control allows protection plus oversight of data
• Result: Users now have ability to print from any
  location on campus to any location on campus
• Result: Administrator now has control over the vast
  array of policies active directory offers
Upgrade Existing Client Technology
• Replace all older hardware and software with
  newer replacements allowing implementation
  of active directory policies
• Result: New technology equals more
  productivity
Implement Antivirus Solution
• Deploy server, and arrange policies for
  Symantec Endpoint protection
• Train administrator in use of Symantec
  Endpoint protection
• Result: Vast improvement in potential for
  security across the board
Implement Filtering
• Implement free proxy server software
  DansGuardian
• Implement squid proxy software
• Implement via active directory policies
  enforced use of proxy
• Result: Administrative control over internet
  content accessed by users

More Related Content

What's hot

Final presentation
Final presentationFinal presentation
Final presentation
spcslides
 

What's hot (15)

Windows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte KachelnWindows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte Kacheln
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 
MAS-presentation-v22sep
MAS-presentation-v22sepMAS-presentation-v22sep
MAS-presentation-v22sep
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and Compliance
 
A Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 EA Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 E
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda Content
 
Virtualization infrastructure governance policies Gargee S Hiray
Virtualization infrastructure governance policies  Gargee S HirayVirtualization infrastructure governance policies  Gargee S Hiray
Virtualization infrastructure governance policies Gargee S Hiray
 
Open Daylight Forum India 2015
Open Daylight Forum India 2015Open Daylight Forum India 2015
Open Daylight Forum India 2015
 
Benefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional ITBenefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional IT
 
Elements of a Good Information System
Elements of a Good Information SystemElements of a Good Information System
Elements of a Good Information System
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companies
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems Management
 
AMS Net iq
AMS Net iqAMS Net iq
AMS Net iq
 

Similar to Upgrade of small elementary school’s technology

JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)
Jim Abshire
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 

Similar to Upgrade of small elementary school’s technology (20)

VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
How to get the most out of your existing DCS
How to get the most out of your existing DCSHow to get the most out of your existing DCS
How to get the most out of your existing DCS
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
 
JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)
 
IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security Considerations
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
GRANT DELP724
GRANT DELP724GRANT DELP724
GRANT DELP724
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG Technologies
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Upgrade of small elementary school’s technology

  • 1. Upgrade of Small Elementary School’s Technology
  • 2. At Start • Wired network consisting of several switches • No border protection • 1 windows server 2000 non AD enabled • 50-60 windows 98, Millennium, and XP clients • Workgroup network design • No backup solution • No antivirus solution • No filtering solution • Low budgetary allowance
  • 3. Considerations • Budgetary constraints allow best case scenarios as opposed to ideal scenarios • Technology upgrade • Ease of administration • Regulatory Compliance
  • 4. Goals • Implement wireless network • Border protection • Implement centralized server solution • Upgrade existing client technology • Implement cost effective backup solution • Implement antivirus solution • Implement filtering solution
  • 5. Implement Wireless Network • Devices should be able to roam seamlessly across campus • Site survey • Implementation and testing • Result: Freedom of movement
  • 6. Border Protection • Port blocking implemented on border device • Administrator trained in use and concepts • Result: Attack surface reduced
  • 7. Centralized Server Solution • Select appropriate hardware and install • Train administrator on active directory concepts, user management, policy use and proper OU structure • Design an effective OU structure, user management polices and other aspects that fit the clients needs and help alleviate future difficulties when the time for change comes
  • 8. Centralized Server Solution 2 • Install active directory and related services • Implement file server role • Implement user management • Implement print server role • Centralize user file management • Implement access control policies concerning centralized user data
  • 9. Centralized Server Solution 3 • Result: Almost all user created data stored in a centralized solution due to polices directing user storage • Result: Users are now managed centrally • Result: User access to data now under the control of the Administrator in a centralized location, access control allows protection plus oversight of data • Result: Users now have ability to print from any location on campus to any location on campus • Result: Administrator now has control over the vast array of policies active directory offers
  • 10. Upgrade Existing Client Technology • Replace all older hardware and software with newer replacements allowing implementation of active directory policies • Result: New technology equals more productivity
  • 11. Implement Antivirus Solution • Deploy server, and arrange policies for Symantec Endpoint protection • Train administrator in use of Symantec Endpoint protection • Result: Vast improvement in potential for security across the board
  • 12. Implement Filtering • Implement free proxy server software DansGuardian • Implement squid proxy software • Implement via active directory policies enforced use of proxy • Result: Administrative control over internet content accessed by users