Title
ABC/123 Version X
1
Managing Access to an Active Directory Environment
POS/421 Version 7
1
University of Phoenix MaterialManaging Access to an Active Directory Environment
Select and complete one of the following assignments:
Option 1: Managing Access to an Active Directory Environment
Option 2: Managing Access to an Active Directory Environment (Graphical)
Option 3: Managing Access to an Active Directory Environment (Advanced)Option 1: Managing Access to an Active Directory Environment
Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules:
· The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president’s administrative assistant.
· The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president’s administrative assistant.
· The director of store operations can use any equipment in any location.
Design group objects to implement group policies to manage access to these resources. Document the group design using the following table:
Name
Membership
Type
Scope
Permissions
During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data.
· How do you plan to recover from these types of loss of current AD DS and other critical information?
· What utilities might you investigate to help accomplish your plan?Option 2: Managing Access to an Active Directory Environment (Graphical)
Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location.
Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table:
Name
Membership
Type
Scope
Permissions
While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?Option 3: Managing Access to an Active Directory Environment (Advanced)
Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufactur ...
The byproduct of sericulture in different industries.pptx
TitleABC123 Version X1Managing Access to an Active Di.docx
1. Title
ABC/123 Version X
1
Managing Access to an Active Directory Environment
POS/421 Version 7
1
University of Phoenix MaterialManaging Access to an Active
Directory Environment
Select and complete one of the following assignments:
Option 1: Managing Access to an Active Directory Environment
Option 2: Managing Access to an Active Directory Environment
(Graphical)
Option 3: Managing Access to an Active Directory Environment
(Advanced)Option 1: Managing Access to an Active Directory
Environment
Assume for this assignment that Kudler Fine Foods is running
Windows Server® 2008 R2. The company has three locations,
each overseen by a store manager. Each store manager has
access to a desktop, a laptop, and a printer/scanner/fax machine.
This equipment is authorized for use according to the following
rules:
· The desktop and laptop are authorized for use by the store
manager, President Kathy Kudler ,and the president’s
administrative assistant.
· The printer/scanner/fax machine is authorized for use by the
store employees where it is located, as well as President Kathy
Kudler and the president’s administrative assistant.
· The director of store operations can use any equipment in any
location.
Design group objects to implement group policies to manage
2. access to these resources. Document the group design using the
following table:
Name
Membership
Type
Scope
Permissions
During your work on the network operating system, you become
concerned about threats such as disk failures, administrative
errors, natural disasters, and the impact of unauthorized changes
to data.
· How do you plan to recover from these types of loss of current
AD DS and other critical information?
· What utilities might you investigate to help accomplish your
plan?Option 2: Managing Access to an Active Directory
3. Environment (Graphical)
Assume for this assignment that Huffman Trucking is running
Windows Server® 2008 R2. The organization has four locations
that will be visited by an internal auditor next month. A review
of previous audit reports shows that the internal auditor does
not have access to examine all the files and use all the
computing devices at each location.
Produce a group object and group policies table to show how
you will grant the required access to the auditor. Document the
group design using the following table:
Name
Membership
Type
Scope
Permissions
4. While designing the access, you get multiple reports of slow
response times on the network. You suspect that one or more
domain controllers (DCs) do not have the required hardware
resources to operate properly. It is possible that the hardware
running a DC has been replaced with an older server that may
have been purchased to run Windows Server® 2003. What tool
will you use to test your suspicion?Option 3: Managing Access
to an Active Directory Environment (Advanced)
Assume for this assignment that Riordan Manufacturing is
running Windows Server® 2008 R2. Riordan Manufacturing has
four locations. Recent visits by members of the executive team
to these locations have generated a new set of access
requirements. These are the rules you have been provided:
· President and CEO Dr. Michael Riordan is the only person
authorized to have full access to all files and equipment at all
locations.
· Senior Vice President Kenneth Collins and Chief Operating
Officer Hugh McCauley are to have access to one PC and one
printer/scanner/fax located in the management office of each
location.
· Executive Assistant Jane McCall is to have access to the
printer/scanner/fax machine located in the management offices
of each location.
· The managers of each location are to have access to Executive
Assistant Jane McCall’s executive office printer/scanner/fax
machine.
Design group objects to implement group policies to manage
access to these resources. Use either a table as in Option 1 or
graphical representation as in Option 2.
Working with the Hangzhou, China network, you notice that the
single domain has recently been organized using four subnets.
Write a 1-page report that answers the following questions:
· What problems related to replication might this situation
6. called branding.
• A web site is essential in today's market, as it helps with
branding. Clients expect
consultants to have a web site. Web sites replace brochures in
many ways and are a
passive way of generating leads.
• Business Networking International (BNI) is a well established
organization similar to
Rotaries but the focus is on lead generation.
The effectiveness of each medium can be determined by
identifying the target market and
how effectively each medium can reach this target.
Sales and Pricing
Sales starts with prospecting for new customers. A sale is a
process, not a onetime event.
Sales is a numbers game; therefore, having an optimistic
outlook can assist a business
owner as she or he receives rejection from potential customers.
Prospecting: This is, as mentioned previously, a numbers game.
Hence, “if you make the
contacts, you will do the business” (Vogel, 2005, p. 47).
Prospecting may include making
7. cold calls, delivering pro-bono speeches, going on informational
interviews, working a
sphere of influence (see module 10 for more information),
and/or networking.
Setting the Fee: The consultant should benchmark to set charges
including per hour, per
day, or per ½ day charges. They must ask how much other
consultants charge in the area
and industry. There are different way to determine fees.
However, charging too little reflects
OL
635
Module
9
1
http://www.bni.com/
http://www.rotary.org/en/Pages/ridefault.aspx
badly upon the credibility of the consultant, but charging too
much may prevent contracts
from being made.
8. Inner and Outer SOI
There is a saying that goes like this: “It is not what you know; it
is who you know and
how you use them .” This module helps identify personal SOI
and utilize it to its fullest
potential.
There is another saying that goes like this: “The average person
knows about 150
people that will be with you when you are wed or dead!” This is
the sphere of influence
of a consultant! Unfortunately, only about ¼ will need his or
her services and about ¼ of
that quarter will hire them. That’s about 10 sales over the
lifetime of the business, but
definitely not enough to stay in business. How can a consultant
capitalize on their
sphere of influence in other ways?
A common activity to help a consultant determine who they are
trying to reach is for
them to draw a small circle in the middle of a piece of paper—
this is their SOI. Then
they draw a bigger circle around the smaller circle—this is their
SOI’s SOI. This outer
circle is who they are trying to reach. For example: imagine that
Sam used to be a sales
trainer for a real estate franchise. Sam's inner circle consists of
the franchisees that
recognize his name
when he calls. All of these people are in the real estate
business, but Sam cannot
9. survive by focusing on just one industry. However, each of
these real estate
professionals know mortgage officers, home inspectors,
cleaning crews, lawyers, title
searchers, insurance agents, and so on. By asking each real
estate professional to
provide him with the name of one other person in each area,
Sam will have credibility
when he calls the new person. Also, if Sam has done business
for one industry and that
industry is connected to another industry, he has a better
chance of being seen as
credible. It is the “who do you know?” game. Who does the
consultant know that might
have a need for his or her services? Who does the consultant
know that might be
interested in meeting him or her for a cup of coffee?
2
OL
635
Module
9
References:
Vogel, L. (2005). Prospecting for the sale of consulting
services. Consulting to Management, 16(4), 47-52.