Title
ABC/123 Version X
1
Managing Access to an Active Directory Environment
POS/421 Version 7
1
University of Phoenix MaterialManaging Access to an Active
Directory Environment
Select and complete one of the following assignments:
Option 1: Managing Access to an Active Directory Environment
Option 2: Managing Access to an Active Directory Environment
(Graphical)
Option 3: Managing Access to an Active Directory Environment
(Advanced)Option 1: Managing Access to an Active Directory
Environment
Assume for this assignment that Kudler Fine Foods is running
Windows Server® 2008 R2. The company has three locations,
each overseen by a store manager. Each store manager has
access to a desktop, a laptop, and a printer/scanner/fax machine.
This equipment is authorized for use according to the following
rules:
· The desktop and laptop are authorized for use by the store
manager, President Kathy Kudler ,and the president’s
administrative assistant.
· The printer/scanner/fax machine is authorized for use by the
store employees where it is located, as well as President Kathy
Kudler and the president’s administrative assistant.
· The director of store operations can use any equipment in any
location.
Design group objects to implement group policies to manage
access to these resources. Document the group design using the
following table:
Name
Membership
Type
Scope
Permissions
During your work on the network operating system, you become
concerned about threats such as disk failures, administrative
errors, natural disasters, and the impact of unauthorized changes
to data.
· How do you plan to recover from these types of loss of current
AD DS and other critical information?
· What utilities might you investigate to help accomplish your
plan?Option 2: Managing Access to an Active Directory
Environment (Graphical)
Assume for this assignment that Huffman Trucking is running
Windows Server® 2008 R2. The organization has four locations
that will be visited by an internal auditor next month. A review
of previous audit reports shows that the internal auditor does
not have access to examine all the files and use all the
computing devices at each location.
Produce a group object and group policies table to show how
you will grant the required access to the auditor. Document the
group design using the following table:
Name
Membership
Type
Scope
Permissions
While designing the access, you get multiple reports of slow
response times on the network. You suspect that one or more
domain controllers (DCs) do not have the required hardware
resources to operate properly. It is possible that the hardware
running a DC has been replaced with an older server that may
have been purchased to run Windows Server® 2003. What tool
will you use to test your suspicion?Option 3: Managing Access
to an Active Directory Environment (Advanced)
Assume for this assignment that Riordan Manufacturing is
running Windows Server® 2008 R2. Riordan Manufacturing has
four locations. Recent visits by members of the executive team
to these locations have generated a new set of access
requirements. These are the rules you have been provided:
· President and CEO Dr. Michael Riordan is the only person
authorized to have full access to all files and equipment at all
locations.
· Senior Vice President Kenneth Collins and Chief Operating
Officer Hugh McCauley are to have access to one PC and one
printer/scanner/fax located in the management office of each
location.
· Executive Assistant Jane McCall is to have access to the
printer/scanner/fax machine located in the management offices
of each location.
· The managers of each location are to have access to Executive
Assistant Jane McCall’s executive office printer/scanner/fax
machine.
Design group objects to implement group policies to manage
access to these resources. Use either a table as in Option 1 or
graphical representation as in Option 2.
Working with the Hangzhou, China network, you notice that the
single domain has recently been organized using four subnets.
Write a 1-page report that answers the following questions:
· What problems related to replication might this situation
cause?
· What is your recommended solution?
Copyright © XXXX by University of Phoenix. All rights
reserved.
Copyright © 2012 by University of Phoenix. All rights reserved.
Module 9 Lecture
Self-Promotion Mediums
Self-promotion for a consultant may require the ability to find
opportunities for pro-bono
speeches, and submitting press releases, writing advertisements,
designing a web site, and
deciding upon which networking opportunities to capitalize.
The following are some
advertising mediums and how to take advantage of them.
• Pro-bono speeches and press releases are great, low cost ways
to showcase skills.
• While advertisements don’t typically bring in sales, they do
help to create an image.
The more you can get your name in the paper, the better—this is
called branding.
• A web site is essential in today's market, as it helps with
branding. Clients expect
consultants to have a web site. Web sites replace brochures in
many ways and are a
passive way of generating leads.
• Business Networking International (BNI) is a well established
organization similar to
Rotaries but the focus is on lead generation.
The effectiveness of each medium can be determined by
identifying the target market and
how effectively each medium can reach this target.
Sales and Pricing
Sales starts with prospecting for new customers. A sale is a
process, not a onetime event.
Sales is a numbers game; therefore, having an optimistic
outlook can assist a business
owner as she or he receives rejection from potential customers.
Prospecting: This is, as mentioned previously, a numbers game.
Hence, “if you make the
contacts, you will do the business” (Vogel, 2005, p. 47).
Prospecting may include making
cold calls, delivering pro-bono speeches, going on informational
interviews, working a
sphere of influence (see module 10 for more information),
and/or networking.
Setting the Fee: The consultant should benchmark to set charges
including per hour, per
day, or per ½ day charges. They must ask how much other
consultants charge in the area
and industry. There are different way to determine fees.
However, charging too little reflects
OL
635
Module
9
1
http://www.bni.com/
http://www.rotary.org/en/Pages/ridefault.aspx
badly upon the credibility of the consultant, but charging too
much may prevent contracts
from being made.
Inner and Outer SOI
There is a saying that goes like this: “It is not what you know; it
is who you know and
how you use them .” This module helps identify personal SOI
and utilize it to its fullest
potential.
There is another saying that goes like this: “The average person
knows about 150
people that will be with you when you are wed or dead!” This is
the sphere of influence
of a consultant! Unfortunately, only about ¼ will need his or
her services and about ¼ of
that quarter will hire them. That’s about 10 sales over the
lifetime of the business, but
definitely not enough to stay in business. How can a consultant
capitalize on their
sphere of influence in other ways?
A common activity to help a consultant determine who they are
trying to reach is for
them to draw a small circle in the middle of a piece of paper—
this is their SOI. Then
they draw a bigger circle around the smaller circle—this is their
SOI’s SOI. This outer
circle is who they are trying to reach. For example: imagine that
Sam used to be a sales
trainer for a real estate franchise. Sam's inner circle consists of
the franchisees that
recognize his name
when he calls. All of these people are in the real estate
business, but Sam cannot
survive by focusing on just one industry. However, each of
these real estate
professionals know mortgage officers, home inspectors,
cleaning crews, lawyers, title
searchers, insurance agents, and so on. By asking each real
estate professional to
provide him with the name of one other person in each area,
Sam will have credibility
when he calls the new person. Also, if Sam has done business
for one industry and that
industry is connected to another industry, he has a better
chance of being seen as
credible. It is the “who do you know?” game. Who does the
consultant know that might
have a need for his or her services? Who does the consultant
know that might be
interested in meeting him or her for a cup of coffee?
2
OL
635
Module
9
References:
Vogel, L. (2005). Prospecting for the sale of consulting
services. Consulting to Management, 16(4), 47-52.
TitleABC123 Version X1Managing Access to an Active Di.docx
TitleABC123 Version X1Managing Access to an Active Di.docx
3
OL
635
Module
9

More Related Content

DOCX
1Running Head Business ProjectSection 1 Business Requirement.docx
PDF
Business analyst interview questions and answers
PDF
Synergist System Selection & Implementation Guide
PDF
Solution Manual for Modern Systems Analysis and Design, 7/E 7th Edition Jeffr...
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
GoSolo Workshop 2: Evaluating your Idea
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
1Running Head Business ProjectSection 1 Business Requirement.docx
Business analyst interview questions and answers
Synergist System Selection & Implementation Guide
Solution Manual for Modern Systems Analysis and Design, 7/E 7th Edition Jeffr...
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
GoSolo Workshop 2: Evaluating your Idea
Fundamentals of Information Systems 8th Edition Stair Solutions Manual

Similar to TitleABC123 Version X1Managing Access to an Active Di.docx (20)

PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
system-selection-guide_synergist-v106
PDF
NetkeyBuyOrBuildWhitePaper v2
PDF
Solution Manual for Concepts in Enterprise Resource Planning 4th Edition by Monk
PDF
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
Digital Transformation: How Global Organisations can use the Power of Crowdso...
PDF
Outsourcing web development ultimate guide (1)
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PPTX
MB-230T01A-ENU-AppliedWorkshop-InstructorDeck.pptx
PDF
Solution Manual for Concepts in Enterprise Resource Planning 4th Edition by Monk
PDF
Blank Paper To Write On
PDF
Target Persona Worksheet
DOCX
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
PDF
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
PDF
Requirement elicitation
PDF
Thinking like a global manufacturer
PDF
The Five Levels of Requirements Management Maturity
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
system-selection-guide_synergist-v106
NetkeyBuyOrBuildWhitePaper v2
Solution Manual for Concepts in Enterprise Resource Planning 4th Edition by Monk
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
Digital Transformation: How Global Organisations can use the Power of Crowdso...
Outsourcing web development ultimate guide (1)
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
MB-230T01A-ENU-AppliedWorkshop-InstructorDeck.pptx
Solution Manual for Concepts in Enterprise Resource Planning 4th Edition by Monk
Blank Paper To Write On
Target Persona Worksheet
The Disaster Recovery Plan Sumanth Lagadapati[email protecte.docx
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
Selecting a Software Solution: 13 Best Practices for Media and Entertainment ...
Fundamentals of Information Systems 8th Edition Stair Solutions Manual
Requirement elicitation
Thinking like a global manufacturer
The Five Levels of Requirements Management Maturity

More from edwardmarivel (20)

DOCX
deadline 6 hours 7.3 y 7.47.4.docx
DOCX
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
DOCX
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DOCX
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
DOCX
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DOCX
DDL 24 hours reading the article and writing a 1-page doubl.docx
DOCX
DCF valuation methodSuper-normal growth modelApplicatio.docx
DOCX
ddr-.docx
DOCX
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DOCX
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DOCX
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DOCX
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DOCX
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DOCX
DB1 What Ive observedHave you ever experienced a self-managed .docx
DOCX
DB Response 1I agree with the decision to search the house. Ther.docx
DOCX
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DOCX
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DOCX
DB Instructions Each reply must be 250–300 words with a minim.docx
DOCX
DB Defining White Collar CrimeHow would you define white co.docx
DOCX
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
deadline 6 hours 7.3 y 7.47.4.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDL 24 hours reading the article and writing a 1-page doubl.docx
DCF valuation methodSuper-normal growth modelApplicatio.docx
ddr-.docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Defining White Collar CrimeHow would you define white co.docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx

Recently uploaded (20)

PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
Journal of Dental Science - UDMY (2020).pdf
PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Education and Perspectives of Education.pptx
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Race Reva University – Shaping Future Leaders in Artificial Intelligence
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Climate and Adaptation MCQs class 7 from chatgpt
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
PDF
Complications of Minimal Access-Surgery.pdf
PDF
IP : I ; Unit I : Preformulation Studies
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
Journal of Dental Science - UDMY (2020).pdf
My India Quiz Book_20210205121199924.pdf
Education and Perspectives of Education.pptx
Share_Module_2_Power_conflict_and_negotiation.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Race Reva University – Shaping Future Leaders in Artificial Intelligence
Unit 4 Computer Architecture Multicore Processor.pptx
Climate and Adaptation MCQs class 7 from chatgpt
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
LEARNERS WITH ADDITIONAL NEEDS ProfEd Topic
Complications of Minimal Access-Surgery.pdf
IP : I ; Unit I : Preformulation Studies
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Literature_Review_methods_ BRACU_MKT426 course material
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf

TitleABC123 Version X1Managing Access to an Active Di.docx

  • 1. Title ABC/123 Version X 1 Managing Access to an Active Directory Environment POS/421 Version 7 1 University of Phoenix MaterialManaging Access to an Active Directory Environment Select and complete one of the following assignments: Option 1: Managing Access to an Active Directory Environment Option 2: Managing Access to an Active Directory Environment (Graphical) Option 3: Managing Access to an Active Directory Environment (Advanced)Option 1: Managing Access to an Active Directory Environment Assume for this assignment that Kudler Fine Foods is running Windows Server® 2008 R2. The company has three locations, each overseen by a store manager. Each store manager has access to a desktop, a laptop, and a printer/scanner/fax machine. This equipment is authorized for use according to the following rules: · The desktop and laptop are authorized for use by the store manager, President Kathy Kudler ,and the president’s administrative assistant. · The printer/scanner/fax machine is authorized for use by the store employees where it is located, as well as President Kathy Kudler and the president’s administrative assistant. · The director of store operations can use any equipment in any location. Design group objects to implement group policies to manage
  • 2. access to these resources. Document the group design using the following table: Name Membership Type Scope Permissions During your work on the network operating system, you become concerned about threats such as disk failures, administrative errors, natural disasters, and the impact of unauthorized changes to data. · How do you plan to recover from these types of loss of current AD DS and other critical information? · What utilities might you investigate to help accomplish your plan?Option 2: Managing Access to an Active Directory
  • 3. Environment (Graphical) Assume for this assignment that Huffman Trucking is running Windows Server® 2008 R2. The organization has four locations that will be visited by an internal auditor next month. A review of previous audit reports shows that the internal auditor does not have access to examine all the files and use all the computing devices at each location. Produce a group object and group policies table to show how you will grant the required access to the auditor. Document the group design using the following table: Name Membership Type Scope Permissions
  • 4. While designing the access, you get multiple reports of slow response times on the network. You suspect that one or more domain controllers (DCs) do not have the required hardware resources to operate properly. It is possible that the hardware running a DC has been replaced with an older server that may have been purchased to run Windows Server® 2003. What tool will you use to test your suspicion?Option 3: Managing Access to an Active Directory Environment (Advanced) Assume for this assignment that Riordan Manufacturing is running Windows Server® 2008 R2. Riordan Manufacturing has four locations. Recent visits by members of the executive team to these locations have generated a new set of access requirements. These are the rules you have been provided: · President and CEO Dr. Michael Riordan is the only person authorized to have full access to all files and equipment at all locations. · Senior Vice President Kenneth Collins and Chief Operating Officer Hugh McCauley are to have access to one PC and one printer/scanner/fax located in the management office of each location. · Executive Assistant Jane McCall is to have access to the printer/scanner/fax machine located in the management offices of each location. · The managers of each location are to have access to Executive Assistant Jane McCall’s executive office printer/scanner/fax machine. Design group objects to implement group policies to manage access to these resources. Use either a table as in Option 1 or graphical representation as in Option 2. Working with the Hangzhou, China network, you notice that the single domain has recently been organized using four subnets. Write a 1-page report that answers the following questions: · What problems related to replication might this situation
  • 5. cause? · What is your recommended solution? Copyright © XXXX by University of Phoenix. All rights reserved. Copyright © 2012 by University of Phoenix. All rights reserved. Module 9 Lecture Self-Promotion Mediums Self-promotion for a consultant may require the ability to find opportunities for pro-bono speeches, and submitting press releases, writing advertisements, designing a web site, and deciding upon which networking opportunities to capitalize. The following are some advertising mediums and how to take advantage of them. • Pro-bono speeches and press releases are great, low cost ways to showcase skills. • While advertisements don’t typically bring in sales, they do help to create an image. The more you can get your name in the paper, the better—this is
  • 6. called branding. • A web site is essential in today's market, as it helps with branding. Clients expect consultants to have a web site. Web sites replace brochures in many ways and are a passive way of generating leads. • Business Networking International (BNI) is a well established organization similar to Rotaries but the focus is on lead generation. The effectiveness of each medium can be determined by identifying the target market and how effectively each medium can reach this target. Sales and Pricing Sales starts with prospecting for new customers. A sale is a process, not a onetime event. Sales is a numbers game; therefore, having an optimistic outlook can assist a business owner as she or he receives rejection from potential customers. Prospecting: This is, as mentioned previously, a numbers game. Hence, “if you make the contacts, you will do the business” (Vogel, 2005, p. 47). Prospecting may include making
  • 7. cold calls, delivering pro-bono speeches, going on informational interviews, working a sphere of influence (see module 10 for more information), and/or networking. Setting the Fee: The consultant should benchmark to set charges including per hour, per day, or per ½ day charges. They must ask how much other consultants charge in the area and industry. There are different way to determine fees. However, charging too little reflects OL 635 Module 9 1 http://www.bni.com/ http://www.rotary.org/en/Pages/ridefault.aspx badly upon the credibility of the consultant, but charging too much may prevent contracts from being made.
  • 8. Inner and Outer SOI There is a saying that goes like this: “It is not what you know; it is who you know and how you use them .” This module helps identify personal SOI and utilize it to its fullest potential. There is another saying that goes like this: “The average person knows about 150 people that will be with you when you are wed or dead!” This is the sphere of influence of a consultant! Unfortunately, only about ¼ will need his or her services and about ¼ of that quarter will hire them. That’s about 10 sales over the lifetime of the business, but definitely not enough to stay in business. How can a consultant capitalize on their sphere of influence in other ways? A common activity to help a consultant determine who they are trying to reach is for them to draw a small circle in the middle of a piece of paper— this is their SOI. Then they draw a bigger circle around the smaller circle—this is their SOI’s SOI. This outer circle is who they are trying to reach. For example: imagine that Sam used to be a sales trainer for a real estate franchise. Sam's inner circle consists of the franchisees that recognize his name when he calls. All of these people are in the real estate business, but Sam cannot
  • 9. survive by focusing on just one industry. However, each of these real estate professionals know mortgage officers, home inspectors, cleaning crews, lawyers, title searchers, insurance agents, and so on. By asking each real estate professional to provide him with the name of one other person in each area, Sam will have credibility when he calls the new person. Also, if Sam has done business for one industry and that industry is connected to another industry, he has a better chance of being seen as credible. It is the “who do you know?” game. Who does the consultant know that might have a need for his or her services? Who does the consultant know that might be interested in meeting him or her for a cup of coffee? 2 OL 635 Module 9 References: Vogel, L. (2005). Prospecting for the sale of consulting services. Consulting to Management, 16(4), 47-52.