NIT3122 Enterprise Network Management: Active Directory Design Project

Verified

Added on  2023/04/26

|32
|1363
|383
Project
AI Summary
This project details the design and implementation of a network using Windows Server 2012 R2 and Active Directory, based on the NIT3122 Enterprise Network Management assignment. The project covers computer preparation, Active Directory design and initial setup, Active Directory installation, and Active Directory management. The network consists of four servers (Root-DC, Com-A, Com-B, and Com-C) configured in VMware Workstation 14. The Active Directory setup includes a root domain (activedirectory16.com) and a child domain (Syd.ActiveDirectoryxx.com), with one server configured as a Read-Only Domain Controller. The management tasks include group management, user account management (creation of ADTest_User), application of policies (automatic deletion of temp folder content), and software restriction (blocking ADTest_User from accessing Internet Explorer). The project demonstrates the configuration steps, verification processes, and troubleshooting involved in setting up and managing an Active Directory network.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK DESIGN AND IMPLEMENTATION
Network Design and Implementation
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
NETWORK DESIGN AND IMPLEMENTATION
Table of Contents
Task 1: Computer Preparation...................................................................................................2
Task 2: Active Directory Design and Initial Setup....................................................................7
Task 3: Active Directory Installation.......................................................................................13
Task 4: Active Directory Management....................................................................................17
A- Group Management...................................................................................................17
B- User Account Management.......................................................................................19
C- Policies Applications.................................................................................................23
D- Software Restriction..................................................................................................26
Bibliography.............................................................................................................................30
Document Page
2
NETWORK DESIGN AND IMPLEMENTATION
Task 1: Computer Preparation
The above screenshot shows the proper installation of four servers in VMware Workstation
14.
The following screenshots shows the naming of servers as Root-DC, Com-A, Com-B and
Com-C from System Properties.
Document Page
3
NETWORK DESIGN AND IMPLEMENTATION
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
NETWORK DESIGN AND IMPLEMENTATION
IPCONFIG /ALL
Document Page
5
NETWORK DESIGN AND IMPLEMENTATION
The following screenshots are used for demonstrating the proper configuration of the
hostname running the ipconfig /all command in Windows PowerShell.
Root-DC
Com-A
Document Page
6
NETWORK DESIGN AND IMPLEMENTATION
Com-B
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK DESIGN AND IMPLEMENTATION
Com-C
Task 2: Active Directory Design and Initial Setup
Network topology created based on the requirement
IP address and DNS IP address setup following the above design
Document Page
8
NETWORK DESIGN AND IMPLEMENTATION
Document Page
9
NETWORK DESIGN AND IMPLEMENTATION
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
NETWORK DESIGN AND IMPLEMENTATION
Verification of configuration
Document Page
11
NETWORK DESIGN AND IMPLEMENTATION
Document Page
12
NETWORK DESIGN AND IMPLEMENTATION
Verification of connection
The hosts are pinged from each other for the demonstration and verification of the
connectivity between them.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
NETWORK DESIGN AND IMPLEMENTATION
Document Page
14
NETWORK DESIGN AND IMPLEMENTATION
Task 3: Active Directory Installation
For the installation of active directory on Windows Server 2012 R2 the Server Manager is
opened from the task bar. Then in the next step the ADD Roles and feature option is selected
and a wizard is launched that helps in modifying the instances. On the Installation type the
option “Role based or feature based” is selected and the next button is clicked. The following
server selection screen appears and the next option is clicked for proceeding to the next step.
The server role screen appears on the next step and the checkboxes are selected depending on
the features that are needed for configuring the network. For the Active directory and DNS
the options “Active Directory Domain Services” and “DNS Server” are selected and installed
in the server.
Document Page
15
NETWORK DESIGN AND IMPLEMENTATION
We need to select the active directory domain services, DNS server from the checklist
for the installation of server roles and services in the root server.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
NETWORK DESIGN AND IMPLEMENTATION
The active directory is configured by adding a new Forest to the domain name and selecting it
as the root domain.
Document Page
17
NETWORK DESIGN AND IMPLEMENTATION
The above screenshots the configuration of Com A as domain activedirectory16.com and
creating the other computers as its member.
Document Page
18
NETWORK DESIGN AND IMPLEMENTATION
Task 4: Active Directory Management
A- Group Management
The group policy management is used for management of service for the users connected in
different location of the network. The following screenshot shows the opening of Active
Directory Administrative Center for configuring the different groups of users.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the creation of new group under the activedirectotry16.com and
naming it as Melbourne_group.
Document Page
20
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the details that are used for creating the group and Group type
and Group Scope used for creating then new group.
B- User Account Management
For the demonstration of user account management, a new user named “ADTest_User” is
created under the Melbourne_Group for the management of access of the resources of the
domain activedirectory16.com.
Document Page
21
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the creation of user named “ADTest_User” with the option such
that the user needs to change the password at its first logon.
The above screenshot demonstrates the verification of the user settings for the new user
ADTest_User created in Root_Dc Server.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22
NETWORK DESIGN AND IMPLEMENTATION
When the user account is tried to logon it displays the above message because the server is
not configured to allow the new account to login locally.
Document Page
23
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the configuration steps that are used for allowing the server to
login the new user ADTest_User to logon.
The above screenshot shows the addition of new user under the Melbourne_group.
Document Page
24
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows updating the group policy to allow log on local properties for the
user ADTest_User.
The above screenshot shows the command used for updating the policy and enabling
the local user to login into the server.
C- Policies Applications
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the group policy and preference that is used for automatically
deleting the content of tem folder each time the user ADTest_User signs on to the computer.
Here a logon script is created and stores in a shared folder and the User is configured to run
the script each time the user logs on.
Document Page
26
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the content of logon.bat script that the user runs each time it logs
on.
Document Page
27
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the creation of a text file and a folder in the temp directory for
verification of working of the script.
The above screenshot shows the successful deletion of the files and folders after logging on
the server with the new user account.
D- Software Restriction
The following screenshot shows the steps followed for the application of software restriction
policy and blocking ADTest_User to open internet explorer.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
28
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the edits that have been made in the group policy for allowing
the Root user to access all the services and applications.
Document Page
29
NETWORK DESIGN AND IMPLEMENTATION
The above screenshots show the denial of access for the ADTest_user to make a desired
action.
The above screenshot shows browsing of the application that is restricted to be accessed by
the user ADTest_User.
The above screenshots show the creation of executable rules for blocking the user to access
internet explorer.
Document Page
30
NETWORK DESIGN AND IMPLEMENTATION
The above screenshot shows the next step of application of identity property automatically to
block the user to access the application service.
The above screenshot shows that the administrator account has access to internet explorer.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
31
NETWORK DESIGN AND IMPLEMENTATION
Bibliography
Block, H., Beckett, J., Lange, K. D., Arnold, J. A., & Kounev, S. (2015, January). Analysis of
the influences on server power consumption and energy efficiency for CPU-intensive
workloads. In Proceedings of the 6th ACM/SPEC International Conference on
Performance Engineering (pp. 223-234). ACM.
Darabont, Ö., Kiss, K. J., & Domokos, J. (2015). Performance analysis of remote desktop
virtualization based on Hyper-V versus remote desktop services. MACRo 2015, 1(1),
125-134.
Huh, J. H., & Seo, K. (2016). Design and test bed experiments of server operation system
using virtualization technology. Human-centric Computing and Information
Sciences, 6(1), 1.
Panek, W. (2015). MCSA Windows Server 2012 R2 Installation and Configuration Study
Guide: Exam 70-410. John Wiley & Sons.
Thomas, O. (2017). Windows Server 2016 Inside Out (includes Current Book Service).
Microsoft Press.
Tso, F. P., Jouet, S., & Pezaros, D. P. (2016). Network and server resource management
strategies for data centre infrastructures: A survey. Computer Networks, 106, 209-225.
chevron_up_icon
1 out of 32
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]