ALL >> Computers >> View Article
Designing An Ou Infrastructure For Client Computers
In this practice, you will design an 70-680 Exam infrastructure for client computers at a fictitious organization. Read the scenario and then answer the questions that follow to create your design. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of the chapter.
Scenario
You are a security designer for Humongous Insurance. Your boss has asked you to adjust the current OU infrastructure to improve security for client computers. Top-level OUs already exist for each geographic area that Humongous Insurance serves. Client computer accounts are assigned to OUs based on their geographic location. OUs are New York, Paris, Sydney, San Diego, and Johannesburg. Each location has a data center and manages its own computers and users. Your boss wants to improve client computer security by applying security by computer role. The New York and Paris locations have 100 percent of their computers running Windows XP Professional. Sydney and San Diego have 100 ...
... percent of their computers running Windows 2000 Professional. Johannesburg has a mixture of Windows 2000 and MCSE study guides free download Professional-based computers. At each data center, administrative computers are on a separate subnet and are accessible only to administrators.
To use OUs as user role containers, determine user roles and create an OU for each role. For example, use an OU for administrators, one for users, one for managers, and one for the help desk. The deciding factor in whether or not to create another OU is whether the users need to be treated differently. Users who work the help desk, for example, might require more access to their computers than most other users. Administrators require the most control; clerical workers require the least control. Figure 11-6 shows an example of such an OU infrastructure.
CTO "Can't we do something about the people who connect with computers that are not kept up to date with patches? I've some proposals here by some companies who say they can provide a filter to keep those connections out."
IT Administrator "I want to ensure that any carrier equipment authenticates to our network."
Auditor "We just got a solid password policy implemented. I understand some mobile devices can't meet our policy. I would not advise
MCSE exams weakening our policy.
Add Comment
Computers Articles
1. Rental Management Software: A Complete Solution For Car, Property, And Coworking SpaceAuthor: RentAAA
2. The Ai Revolution: What’s Coming In 2025
Author: Ben Gross
3. The Rising And Falling Trends Of Graphic Card Prices In 2024
Author: Alahdeen
4. What Is Test-driven Development And Which Three Rules Does It Follow?
Author: Byteahead
5. What Is Web Application Architecture?
Author: goodcoders
6. Understanding How Wifi Works: The Wireless Connection Process Explained
Author: Kr
7. What’s Coming In Cybersecurity For 2025?
Author: Ben Gross
8. Hire Magento Expert In India
Author: Yuvraj Raulji
9. Discovering Everything About C15 Power Cables
Author: Jennifer Truong
10. Want To Get Long-distance Power? Time To Grab Extension Power Cords
Author: Jennifer Truong
11. Best Android Development Tools To Use
Author: Best Android Development Tools To Use
12. Choosing The Right Kansas City Web Design Partner For Your Business Success
Author: naviworld1h
13. The Importance Of Choosing The Right Kansas City Ecommerce Developer And Logo Design Expert
Author: naviworld1h
14. Top Mobile App Companies And Developers In Kansas City
Author: naviworld1h
15. Boost Your Business With A Leading Web Design Company In Kansas City
Author: naviworld1h