Nt1330 Unit 3 Lab 1

Great Essays
1. Goal
Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are
…show more content…
Due to the variable scope that each PSO has, an important part of any enterprise is planning out the password policies in detail and how they differ from one another as well as why. My most broad PSO, the domain-wide policy, was also my least restrictive policy. I purposefully set it this way because any user or security group containing users that need the extra security that comes from PSO’s should have its own separate PSO defined, meaning that the domain-wide policy would be beaten by the lower precedence of the more specific policy. Due to this, I was very liberal with my settings in this PSO by making a lower password length requirement of 6 characters and a quite high number of 42 days for the maximum password age. I also made it very easy for these users to change their passwords if desired with only a 1 day wait minimum after the previous password change. Settings get a bit tighter at the group level, as a security group is usually made up of users who have a very specific purpose and need a specific level of security attached to them. For the group PSO, I bumped up the minimum character limit to 8 characters and forced users to wait a minimum of 5 days before being allowed to change a password again. Another change at this level is the time that the account is locked out for, which is approximately one hour. Certain settings are carried over though that I felt did not really need to be changed, such as keeping a record of the last 24 passwords for when passwords need to be updated. This group-wide GPO was given the precedence of 2, which I picked because it allowed security group users to attach themselves to the group PSO if they do not have a user-specific PSO, but at the same time allowed certain users to have their own user PSO by setting a precedence of 1 and overriding the group PSO. This was the case for my user level PSO for my

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Lab 3.07

    • 103 Words
    • 1 Pages

    1 Specialized mats and wrist straps help protect electronic components from __________. ESD or static electricity 2 What device is used to monitor temperature in the fuser assembly in a laser printer? Thermistor 3 __________ bundle wires to help keep them organized inside electronic devices.…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Lab

    • 1594 Words
    • 7 Pages

    My group had been given a specific task to investigate according to the lab manual1. We were employed by the Environmental Protection Agency as chemists. Our task is to identify an unknown compound that was found in a nearby landfill. In this laboratory, the unknown compound was given to us by our TA. The main goal of this experiment was to correctly identify the unknown compound.…

    • 1594 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The date for my sister’s engagement party was fast approaching. It was two years before her wedding, and she also has acne prone skin. She decided to look up a dermatologist and found one that she thought would suit her needs. After seeing the regimen done on my sister, and how her skin reacted. I had changed my dermatologists to the same one as my sister.…

    • 415 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    1. Why is it a good idea to keep personal information confidential? I think it is important because when you keep it confidential you won’t get your identity stolen. 2. Summarize the components of a strong password?…

    • 74 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    By selecting this option you acknowledge that the computer complies with your organization's security policy. -------------------------------------------------------------------------------- Use…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Management can add or remove tools as needed for his team’s employees. Supervisors are trained to regulate systems and must review access regularly. Within DHS networks, officers have access to high level security applications.…

    • 293 Words
    • 2 Pages
    Decent Essays