Nt1330 Unit 3 Lab 1

Great Essays
1. Goal
Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are
…show more content…
Due to the variable scope that each PSO has, an important part of any enterprise is planning out the password policies in detail and how they differ from one another as well as why. My most broad PSO, the domain-wide policy, was also my least restrictive policy. I purposefully set it this way because any user or security group containing users that need the extra security that comes from PSO’s should have its own separate PSO defined, meaning that the domain-wide policy would be beaten by the lower precedence of the more specific policy. Due to this, I was very liberal with my settings in this PSO by making a lower password length requirement of 6 characters and a quite high number of 42 days for the maximum password age. I also made it very easy for these users to change their passwords if desired with only a 1 day wait minimum after the previous password change. Settings get a bit tighter at the group level, as a security group is usually made up of users who have a very specific purpose and need a specific level of security attached to them. For the group PSO, I bumped up the minimum character limit to 8 characters and forced users to wait a minimum of 5 days before being allowed to change a password again. Another change at this level is the time that the account is locked out for, which is approximately one hour. Certain settings are carried over though that I felt did not really need to be changed, such as keeping a record of the last 24 passwords for when passwords need to be updated. This group-wide GPO was given the precedence of 2, which I picked because it allowed security group users to attach themselves to the group PSO if they do not have a user-specific PSO, but at the same time allowed certain users to have their own user PSO by setting a precedence of 1 and overriding the group PSO. This was the case for my user level PSO for my

Related Documents

  • Decent Essays

    Nt1310 Lab 6.1

    • 408 Words
    • 2 Pages

    In Procedure 6.1, two different gels were used. One gel was 2.0% agarose while the other gel was 0.8% agarose. The reason we poured two gels was because each gel had a different purpose. The 2.0% agarose (thicker gel) was used to determine amplicons while the 0.8% agarose (thinner gel) was used for restriction fragments. One gel was ‘thicker’ than the other gel to distinguish smaller segments than the thinner gel.…

    • 408 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Lab 3.07

    • 103 Words
    • 1 Pages

    1 Specialized mats and wrist straps help protect electronic components from __________. ESD or static electricity 2 What device is used to monitor temperature in the fuser assembly in a laser printer? Thermistor 3 __________ bundle wires to help keep them organized inside electronic devices.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Lab 2

    • 458 Words
    • 2 Pages

    On January 29th, we conducted lab 2 which involved learning the basic tools of Dartfish and how to publish Dartfish videos to our own mediabook. The first step in the lab involved going to dartfish.tv and looking at the “3302 Class Resources folder and downloading the video trim file. I then opened the Dartfish software and as a class we reviewed some of the various resources in the software like the different screen options such as split screen or mosaic mode and different tools such as analyzing angle and distance of the video. I learned how to transfer the downloaded video from the computer library to the tray. It’s important to note that you can delete videos from your tray and it will still be on the computer’s library.…

    • 458 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 8

    • 375 Words
    • 2 Pages

    To explain this, we should already know that in real life scenarios, stack increases to lower memory addresses, whenever program calls some function, the address of function call instruction is saved in stack as a return for the function. When the function executes, it allocates local variables, including buffers to stack and they are given a lower address than the return address. So, in this scenario the return address is a certain level above the base address for buffers and if the buffer is overflowing, then it is most likely that an attacker can change return address as well. If the return address is changed to some random value, then it will cause segmentation fault, but if the return address is changed to a certain address where some executable code is present, then that may complete attackers intended tasks with the application.…

    • 375 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The date for my sister’s engagement party was fast approaching. It was two years before her wedding, and she also has acne prone skin. She decided to look up a dermatologist and found one that she thought would suit her needs. After seeing the regimen done on my sister, and how her skin reacted. I had changed my dermatologists to the same one as my sister.…

    • 415 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    By selecting this option you acknowledge that the computer complies with your organization's security policy. -------------------------------------------------------------------------------- Use…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Management can add or remove tools as needed for his team’s employees. Supervisors are trained to regulate systems and must review access regularly. Within DHS networks, officers have access to high level security applications.…

    • 293 Words
    • 2 Pages
    Decent Essays