Chat with us, powered by LiveChat Reworded Active Directory Design*****Already A++ Rated Tutorial*****Use As Guide Paper***** | Writedemy

Reworded Active Directory Design*****Already A++ Rated Tutorial*****Use As Guide Paper*****

Reworded Active Directory Design*****Already A++ Rated Tutorial*****Use As Guide Paper*****

Deployment of one Active Directory Forest will suffice for WWTC’s requirments. There are not requirements for data isolation within WWTC’s Active Directory configuration and any data separation can be performed using data isolation. A single-forest was chosen because it is very cost-effective and requires the least amount of administrative support. For example, with only one forest, the global catalog does not require synchronization across forests and management of a duplicate infrastructure is not required. An organizational forest model will be used with user accounts and resources contained in the forest and managed independently. The forest will be used to provide service and data isolation. This has been chosen insteady of other models where resources and users are isolated in separate forests.

 

Active Directory Domain :

WTC will use an Organizational Domain Forest to provide autonomous groups within the forest as required. The New York office will have a separate domain from the Hong Kong office since it will be largely autonomous. In addition, a separate domain can be created to restrict access to confidential data. Since WWTC will have few IT personnel to care for day-to-day IT support activities in New York, the following functions will be maintained by forest-level administration:

 

·         Creating and removing domain controllers

·         Monitoring the functioning of domain controllers

·         Managing services that are running on domain controllers

·         Backing up and restoring the directory

 

Two domains will require that Group Policy settings as well as access control /auditing settings( required forest-wide) are implemented separately to each domain in the forest. This setup is considered a regional domain configuration and will reduce traffic over wide area network (WAN) links. While service administration will be carefully controlled at the Hong Kong office, the following functions will be maintained within the New York office:

 

·         Creating organizational units (OUs) and delegating administration

·         Repairing problems in the OU structure that OU owners do not have sufficient access rights to fix

 

Instead of creating a separate forest root domain, the New York office function as the forest root domain. It will be a parent domain to the other offices. Service administrator accounts will reside on the New York root domain while user accounts for each region will reside on the appropriate domain. For administration purposes, the branch officeswill functions as child domains under the New York root domain. This configuration was chosen because it is much easier to manage than a configuration with a separate domain for administrative accounts.

 

Active Directory Naming Convention:

WWTC.org is the Active Directory namespace used by WWTC. It is a registered fully qualified domain name for WWTC. WWTC will use the same internal and external namespace. WWTC.org will be used from inside and outside the organization without a separate namespace for internal access to resources. This means that the tree name (WWTC.org) is consistent for the private and public (Internet) allowing users to logon with the same credentials internally and externally. This requires a separate zone outside the firewall to provide name resolution for public resources and does create security concerns to ensure that clients accessing resources from outside the organization do not have access to internal company resources. This also creates the requirement for maintaining the records on both the internal and external DNS servers simultaneously. The attached illustration shows this configuration.

 

 

 

Application Services:

Windows Server 2012 is installed on the network and the following Active Directory features will be implemented.

 

·         Windows Deployment Services (WDS) will be implemented to allows network-based installation of Windows Operating Systems (OS) to reduce the complexity and cost of manual installation. This will require a WDS Server as a member of the Active Directory Domain Services (AD DS) domain. This also requires a Dynamic Host Configuration Protocol (DHCP) server with an active scope sine PXE relies on DHCP for IP addressing.

·         Smart Card Authentication will require valid user principal names (UPNs) since they are required fo smart card login. Since a certificate authority (CA) will issue the domain controller certificates, the root certificate will be added to the Trusted Root Certification Authorities group policy in Active Directory.

·         IP Address Management (IPAM) will be implemented to provide highly customizable administrative and monitoring capabilities for the IP address infrastructure. IPAM will be used to discover, utilize, monitor, audit, and manage IP address space in the network. This requires an IPAM server that has connectivity to existing DHCP, DNS, DC, and NPS servers in the Active Directory forest.WDS services will be hosted on the same computer as DHCP. This requires that WDS is configured so that it doesn’t listen on Port 67 and DHCP option 60 will be used to notify a booting PXE client that there is a listening PXE server on the network. The server will also be configured to respond only to known client computers. This ensures that client computers are added to Active Directory before the image is deployed.

·         File Classification Infrastructure (FCI) will be implemented to ensure that automatic classification is performed. The different classifications will be identified. Currently they are listed as Public and Confidential. The proper classification will be applied to every file using FCI. This process will be used to ensure that Confidential data is properly stored on encrypted drives and that all confidential files are transmitted using encrypted methods. Reporting based on these classification tabs will allow administrators to detect and respond to violations of the WWTC’s data classification policy.

·         Failover cluster services will be implemented so that the entire network has hardware, software, and storage redundancy. This independent group of servers and storage devices will work together to increase the availability of applications and services. If one clustered device fails, another will provide the lost services (called failover). The cluster validation wizard will be used to ensure that all network components are compatible prior to implementation. It will also be used after implementation and as new devices are added to the network to maintain this capability. By implementing backup for all servers and storage, WWTC ensures that users experience a minimum of disruptions in service.

·         Cache encryption will be implemented to store encrypted data by default. This means that data in cache is stored encrypted by default providing data security without requiring entire drive encryption.

·         BranchCache will be implemented to increase performance, manageability, scalability, and availability. Duplicate files are eliminated while hashes and local storage at branch offices drastically reduce the amount of required WAN traffic.

·         Bitlocker encryption will be used to protect all user and server data. The benefit is that the entire drive is encrypted and only requires the user’s normal authentication to access the data. The bitlocker system on the wired network will be set up to automatically unlock the system volume during boot to reduce the internal help desk calls because of lost PINs. Group policy settings will be enforced that require either Used Disk Space Only or Full Encryption is used when BitLocker is enabled on a drive.

 

Groups:

 

Users and computer accounts will be grouped to simplify administration by controlling permissions and rights rather than assigning them individually. Groups in Active Directory are objects that reside in the domain. Groups have a scope that identifies the extent that they are applied in the domain or forest. The three group scopes for WWTC are outlined below:

·         Domain localscope is used to manage accounts within the domain. For example, a user group that requires access to a printer can be setup so that access to a new printer can be done for the entire group at once instead of doing a permission list for all five users. The five users will have global scope and will be added to a domain local scope group that can be assigned printer access.

·         Global scope is used for directory objects that require daily maintenance, such as user accounts, computer accounts, or groups that require management across domains (such as a department in multiple locations).

·         Universal scope is used to consolidate groups that span domains. Changes to global scope groups doesn’t affect the universal scope group, but changes to the universal scope group causes the entire membership of the group to be replicated to every global catalog in the forest.

 

The scope and Organizational Unit setup has been outlined in the below diagram.

 

 

The above structure was chosen so that Group Policy could be applied to a select group of users or resources without having to set policies for each individual user.

 

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order