logo

Configuring Active Directory Domain for Thinktank Company

   

Added on  2023-04-04

27 Pages2688 Words176 Views
System Management
Student Name
Course
Institution
Date
Configuring Active Directory Domain for Thinktank Company_1
Table of Contents
Introduction................................................................................................................................3
Requirement Analysis................................................................................................................3
Identification of Server Roles & Technologies..........................................................................5
Security Policy...........................................................................................................................5
Network Configuration Process, Screenshots, and Commands.................................................6
Active Directory Domain Structure.........................................................................................23
Summary..................................................................................................................................24
Conclusion................................................................................................................................24
References................................................................................................................................26
Configuring Active Directory Domain for Thinktank Company_2
Introduction
If the business is growing, it is important to understand the need to have a reliable and quality
IT infrastructure as it is crucial in ensuring business efficiency [1]. IT network infrastructure
is one of the most essential solutions that a business can implement. A computer network
basically refers an interconnection of computer components for the purpose of
communication and sharing of resources such as printers, data, files, and applications. There
are different computer network topologies and the choice that a company makes should be
able to reflect on the requirements [2]. One way of configuring a network is setting it up to go
through a server. However, when setting up a network it is crucial to have an experience
consultant to guide you through the process and recommending the most reliable and quality
network components such as servers, routers, switches, firewalls, among other components.
Additionally, it is important for any company to realize that technology is evolving at a fast
rate and should adopt a solution that is able to meet future changes and requirements because
of the dynamic nature of technology involve [3]. There are several advantages associated
with computer networks including helping the business to grow as it improves business
operations and overall efficiency. Also, it enhances cost-effectiveness because it facilitates
sharing of resources such as printers, applications, data, and files [4]. This is because the
company will not need to buy equipment for every employee rather, they will be able to share
what is available.
This report will focus on identifying and proposing the needed servers and their roles for
Thinktank company and also provide the configuration instructions. Configurations will be
done on windows server 2012RT that has been installed on the client computer to
demonstrate the configuration process. Every step and process that will be done will be
documented in this report.
Requirement Analysis
The requirements have been mentioned in the case scenario regarding Thinktank company
which is a small and medium sized company (SME) based in Sydney. The company has
grown overtime and the company now have 50 computers from previous 10 computers.
Additionally, the company is quickly growing and is planning to open up new pilot branches
in Melbourne that will be directly connected to the Sydney office which serves as the Head
Configuring Active Directory Domain for Thinktank Company_3
Quarters (HQ). The company will hire the same number of employees in Melbourne office.
Additionally, the company will need to acquire new computer equipment such as printers and
workstations. The company also anticipates to have centralized data collection, authorization,
and authentication for easy monitoring, troubleshooting, and management. One of the key
aspects that the company requires is to ensure that the finance department in the two offices
have separate folders on the network that can be specifically accessed by the individual
departments. Also, the sales departments will have their independent folders just like the
finance department. However, even with this limitation, the managers should be able to
access the whole data folder.
The current setup at Thinktank is that, data is stored centrally in two workstations which are
basically workgroup computers which is share amongst 28 employees from the various
departments within the company. IP addresses are manually assigned to users which has led
to numerous challenges in record maintenance and has led to the IT staff assigning similar IP
addresses to different users causing disruption in network functions because of duplications.
Additionally, the users at Thinktank are having a big challenge in remembering the IP
address for the central servers holding the data because they are required to memorize it. As a
result, the company has requested that they will have to have names instead of IP addresses
for the servers which will be accessible over the internet. Moreover, every user will be given
specific space within the network to store their files which can only be access by them. As
such, the company needs to have a new network infrastructure because the current one does
not support the new requirements. The company also seeks to improve availability within the
network by implementing fault tolerance strategies. Finally, the company also requires a
security policy solution for maintaining the security of the network resources based in best
practices within the industry.
In order to meet the requirements, XYZ company, which is the company that Thinktank has
hired to provide the solution will provide a prototype simulation that will address the
requirements identified above [5]. The domain name that has been used for the prototype is
thinktank.com and the network will be represented as an active directory domain tree which
contain root domain. The network will have two domain controllers for the purpose of
redundancy, print server for managing print jobs on the share printer, Dynamic Host Control
Protocol (DHCP) server for allocating IP addresses automatically, and web server for hosting
Configuring Active Directory Domain for Thinktank Company_4
the company website [6]. Additionally, the company requires to have a file server for storing
all the files which can only be accessed by authorized users.
Identification of Server Roles & Technologies
Servers play a very significant role when implementing an IT infrastructure solution. This is
because the provide the most crucial functions that are needed by the business enterprise.
Moreover, servers play several functions and roles that form part of the enterprise network.
There are several types of servers that can be used in a network or a data center [7]. However,
for the case of Thinktank company, the following servers are required in order to fulfill the
requirements identified in the previous section: Print servers, DHCP servers, File server, and
Web servers.
Print server: this server is responsible for managing shared printers on the network. Print
server is connected on the network with client computer that send print jobs to the shared
printer. The server is responsible for forwarding print jobs to the printer when the printer is
available and has the capability to prioritize urgent jobs [6]. The print server can also make
decisions for the client to use the printer that is closer.
DHCP server: Currently users are allocated IP addresses manually and this has posed serious
challenges to the IT staff because of constant interruption and disruption of network services.
As such, there is need to have a server that will assign IP addresses automatically [8]. DHCP
server will be used for this function because it provides fast, dynamic, and central
management of IP address distribution within the network.
File Server: file server will be responsible for assigning a pace for share disk access.
Thinktank requires a file server to manage access to one of the critical resources, data [6].
Also, the file server to regulate access to the files and shared databases to ensure that only
authorized users are allowed to access the files within the network.
Web server: this server is used to host the company website. Secondly, it will be sued to
secure and store website data, offer access to web database, process end user requests,
controlling traffic to the server, and allow the user create dynamic web pages.
Security Policy
Configuring Active Directory Domain for Thinktank Company_5
Security policy is a very crucial element for any network infrastructure for protecting the
network resources which are susceptible to compromise or subvert. Security threats can be
external or internal but, nevertheless, there is need to have the best security policy in place. In
order to have one of the best industry standard policy, it is important to first define and
describe the policies that will be implemented [9]. The security policies will govern how
Thinktank network infrastructure will be configured and implemented to rationalize
employee’s behavior and actions when using or accessing the network resources. For
Thinktank Company, the security policy will cover the following aspects: device security,
internet access policy, port communication policy, WLAN policy, remote connection policy,
firewall rules policy, intrusion policy, secure communication policy, and DMZ policy. All
these policies are necessary to enforce security on the various network resources and at
different levels.
Network security policies are aimed at ensuring the safety of all the network resources from
exploitation and threats. It is necessary for Thinktank to consider the equipment on the
network and how they should communicate and share resources securely including data and
media transmission over the network [10]. The security policy is designed to regulate and
ensure compliance to the company need to have a safe digital operating environment.
Additionally, security policy will server in preventing the network infrastructure from code
injections, executables, software bugs, and malware infections.
Network Configuration Process, Screenshots, and Commands
There are several preconditions that are required to be fulfilled before configuring the domain
network. First, the network will be configured on Windows server 2016 running on virtual
machine. Oracle VirtualBox will also come in handy when configuring the network.
Additionally, the virtual infrastructure should be able to meet the company requirements. The
server will be running on 30GB HDD, 4GB RAM, and 4 vCPUs [11].
First, we are going to create a new virtual machine on Oracle VirtualBox.
Configuring Active Directory Domain for Thinktank Company_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Infrastructure Design for Thinktank
|23
|2963
|87

Case Study of ThinkTank: System Management
|26
|3095
|97

Network System Management - ThinkTank Case Study
|23
|3203
|154

Design, Installation and Configure Enterprise Network Servers
|61
|3825
|50

Local Area Network (LAN) to support Windows Server and Client Environment
|12
|2470
|104

IT Infrastructure: Network Design, IP Addressing, and Cloud Computing
|14
|3692
|62