logo

Desktop Environment Management and Security

   

Added on  2020-05-11

12 Pages2055 Words98 Views
 | 
 | 
 | 
Running head: Windows client cluster 1WINDOWS CLIENT CLUSTERAuthor’s name:Institution affiliation:Date:
Desktop Environment Management and Security_1

Window client cluster 2In this report, my made-up roll is that of a network administrator working for Dallas Technical Center.Introduction An operating system is essential software that enables a computer to run by managing the computer’s processes and memory[ CITATION Kor17 \l 1033 ]. It is an interface between the computer hardware and the computer user. It also supports the running of various software and hardware components of the machine. It is the work of the Operating System of a machine to ensure compatibility of any software being installed in the machine. Software running in a computer is housed by the operating system. Amongst other functions, the operating system performs memory management, device management, file management, processor management, security of the computer, taking control of the system performance, detecting errors and software-user coordination. Part OneWhen preparing to install any software, it is important to take into consideration safety precautions both for the computer and the important data. Therefore, before starting the installation process, I will first ensure that the operating system software that I want to install is legit. I will access the product key and the activation key codes to ascertain if they are genuine. As a network administrator, I will also refer keenly to Dallas Technical center’s work and safety policies. I will go ahead and ask the Center’s Information Technology office to serve me with legit driver packs, reliable anti-virus software and the general information on the specifications of the computers, which is basically the manual containing factory information regarding the computers.
Desktop Environment Management and Security_2

Window client cluster 3A file system is a scheme of organizing and storing computer files and information contained for simple and efficient retrieval[ CITATION Pud17 \l 1033 ]. I will ensure proper configuration of the files in order to allow security configuration. For instance I will configure the file system as NTFS and not as FAT, FAT makes the computer less secure. I will check whether the operating is to be installed from CD-ROM, boot disks or from the network. I will also examine the service that the operating system will be required to offer, for example, if the installation will be server installation, then I will take keen interest on the DNS, DHCP and the computers Active Directory.The operating system will have a license key in order for it to be acceptable. Actually all operating systems will require a license key for it to operate, it is also important to that I ensure that they product and activation key are not counterfeit. I will use data models for easy identification of which data should be migrated, for example the Data Flow Diagrams. I will test the migration technique more than once for purposes of proper functioning.I will ensure data security by seeking external back up mechanism with enough space and virus proof. Another option I will consider is partitioning the internal disk so that I can install the operating system one partition while the other houses the data. I will show my client how and where he/she can access the operating system upon authentication, the user will be required to enter password in order to access the site. I will also inform the client that the system may at times be sluggish, especially when running more than one software at a time, many programs executing at the same time will bring about system deadlock hence slow performance of the computer.
Desktop Environment Management and Security_3

Window client cluster 4Part TwoInstalling the desktop operating system should be carefully done to avoid unnecessary mistakes that can lead to poor performance of the computer[ CITATION Wan17 \l 1033 ]. When choosing an installation method, I will consider the most efficient, secure and one with fast installation speed.It is also important to note that over the internet download and installation method is a no option.As a network administrator for Dallas technical center, I will choose installation from the bootable CD-ROM. This method is easier and fastest compared to other installation options like over the network method. I will disconnect the computer from the network to the time of complete installation. Repairing the software is necessary since software breakdown cannot be ruled out in any system. I will run a vulnerability test on the software to fix any error in the operating system. I also will be conducting periodical recovery consoles to ensure reliability and security.After a successive installation, it is now time to restore data from the back up location to the previous stations. I will first install an antivirus in the computer to clean up any unnecessary applications that might be risky to data security, after which I will transfer the data to their workstations.Part ThreeDallas technical center has large data storage units and several files that need to be properly stored. Since in the center we are using windows, I will create files and directories using windows explorer
Desktop Environment Management and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents