2. At Start
• Wired network consisting of several switches
• No border protection
• 1 windows server 2000 non AD enabled
• 50-60 windows 98, Millennium, and XP clients
• Workgroup network design
• No backup solution
• No antivirus solution
• No filtering solution
• Low budgetary allowance
3. Considerations
• Budgetary constraints allow best case
scenarios as opposed to ideal scenarios
• Technology upgrade
• Ease of administration
• Regulatory Compliance
5. Implement Wireless Network
• Devices should be able to roam seamlessly
across campus
• Site survey
• Implementation and testing
• Result: Freedom of movement
6. Border Protection
• Port blocking implemented on border device
• Administrator trained in use and concepts
• Result: Attack surface reduced
7. Centralized Server Solution
• Select appropriate hardware and install
• Train administrator on active directory
concepts, user management, policy use and
proper OU structure
• Design an effective OU structure, user
management polices and other aspects that fit
the clients needs and help alleviate future
difficulties when the time for change comes
8. Centralized Server Solution 2
• Install active directory and related services
• Implement file server role
• Implement user management
• Implement print server role
• Centralize user file management
• Implement access control policies concerning
centralized user data
9. Centralized Server Solution 3
• Result: Almost all user created data stored in a
centralized solution due to polices directing user
storage
• Result: Users are now managed centrally
• Result: User access to data now under the control of
the Administrator in a centralized location, access
control allows protection plus oversight of data
• Result: Users now have ability to print from any
location on campus to any location on campus
• Result: Administrator now has control over the vast
array of policies active directory offers
10. Upgrade Existing Client Technology
• Replace all older hardware and software with
newer replacements allowing implementation
of active directory policies
• Result: New technology equals more
productivity
11. Implement Antivirus Solution
• Deploy server, and arrange policies for
Symantec Endpoint protection
• Train administrator in use of Symantec
Endpoint protection
• Result: Vast improvement in potential for
security across the board
12. Implement Filtering
• Implement free proxy server software
DansGuardian
• Implement squid proxy software
• Implement via active directory policies
enforced use of proxy
• Result: Administrative control over internet
content accessed by users