Friday, October 18, 2019

LT-week4 Essay Example | Topics and Well Written Essays - 750 words

LT-week4 - Essay Example shiers to access all point-of-sale, all managers to access all management resources, and resources accessed by human resources, marketing and accounting and must be restricted to department members and Executive Management or owner), distribution of Domain Controllers (DCs) and Global Catalog Domain Controllers (GC/DCs), replication strategy to include possible use of Read-Only Domain Controllers (RODCs) (locations outside California to have one location with fast connection networked through slower connections. Other locations in California need fast connections). Minimum memory should be 512MB RAM but I recommend a 2GB RAM or greater. The maximum memory for 32-bit systems should be 4GB which is the standard or 64GB for Enterprise and Datacenter. Since the organization is an enterprise, a datacenter and has Itanium-Based systems, I recommend a 2TB. Disk Space: The minimum available disk space should be 10GB but 40GB or greater could serve better. Since the organization processes and transactions are enormous, more space is required to houseany paging, and dump files. The new Windows 2008 R2 offers new ways of improving data security tailored for remote offices for the organization especially when physical security is not efficient. Active Directory Domain Services has a new feature integrated called Read-Only Domain Controller (RODC). The RODC need to be configured because it does not store any users or account credentials. This makes Read-Only Domain Controllers effective in remote branch offices of the organization. DNS server role should be installed on each Read-Only Domain Controllers, allowing clients to perform DNS resolution in case they are lacking connectivity on the DC. There are two access control decision engine and need to be handled independently. The two access engines are local access and subject access. The local access control engine makes decisions depending on the Web service access rules while the subject access control engine

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.