123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Designing An Ou Infrastructure For Client Computers

Profile Picture
By Author: iris
Total Articles: 286
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

In this practice, you will design an 70-680 Exam infrastructure for client computers at a fictitious organization. Read the scenario and then answer the questions that follow to create your design. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Scenario
You are a security designer for Humongous Insurance. Your boss has asked you to adjust the current OU infrastructure to improve security for client computers. Top-level OUs already exist for each geographic area that Humongous Insurance serves. Client computer accounts are assigned to OUs based on their geographic location. OUs are New York, Paris, Sydney, San Diego, and Johannesburg. Each location has a data center and manages its own computers and users. Your boss wants to improve client computer security by applying security by computer role. The New York and Paris locations have 100 percent of their computers running Windows XP Professional. Sydney and San Diego have 100 ...
... percent of their computers running Windows 2000 Professional. Johannesburg has a mixture of Windows 2000 and MCSE study guides free download Professional-based computers. At each data center, administrative computers are on a separate subnet and are accessible only to administrators.
To use OUs as user role containers, determine user roles and create an OU for each role. For example, use an OU for administrators, one for users, one for managers, and one for the help desk. The deciding factor in whether or not to create another OU is whether the users need to be treated differently. Users who work the help desk, for example, might require more access to their computers than most other users. Administrators require the most control; clerical workers require the least control. Figure 11-6 shows an example of such an OU infrastructure.
CTO "Can't we do something about the people who connect with computers that are not kept up to date with patches? I've some proposals here by some companies who say they can provide a filter to keep those connections out."
IT Administrator "I want to ensure that any carrier equipment authenticates to our network."
Auditor "We just got a solid password policy implemented. I understand some mobile devices can't meet our policy. I would not advise
MCSE exams weakening our policy.

Total Views: 386Word Count: 399See All articles From Author

Add Comment

Computers Articles

1. Upgrade Your Skills With The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

2. Virtual Security Guard
Author: james

3. Virtual Guard Fencing
Author: james

4. Exploring The Growth Of Mobile App Development Companies In Calgary: A 2025 Insight
Author: Josh Mark

5. Enhance Decision-making With Opentable Reviews Data Scraping
Author: DataZivot

6. How To Choose The Right Computer Repair Shop In Denver
Author: Timothy

7. Why Your 3pl Business Needs A Smarter Wms: Discover Fulfillor’s Edge
Author: Visvendra Singh

8. Top Antivirus Coupon Codes & Promo Deals
Author: Dhruv

9. Virtual Guard Video Tour & Ai Analytics System
Author: james

10. Security Incident Management
Author: james

11. Small Business Accounting Software: A Game Changer For Entrepreneurs
Author: Cecilia Robert

12. Security Guard Human Resource
Author: james

13. Guard Time And Attendance
Author: james

14. Cheap Web Design Singapore
Author: cheap

15. Video Editing Course In Hyderabad
Author: venky

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: