This website uses cookies to ensure you have the best experience. Learn more

Microsoft Active Directory Security Essay

3603 words - 15 pages

Dear Mrs. Simmons:
I am sending you the following paper. “Microsoft Active Directory: How to effectively manage corporate network environments with cost savings” while adhering to the requirements for the final research paper for English 235: Technical Writing.
Throughout my report I will show examples of per computer cost savings that can be achieved by using Microsoft Active Directory. These savings can be leveraged on any size corporate network to help make IT services more effective and enhance productivity. I will also explain how Active Directory makes IT management easier in regards to implementing large scale changes while securing the corporate network.
The report will show ...view middle of the document...

By connecting these disparate computer systems together to form networks using a common set of protocols, Microsoft Corporation has developed a secure and centralized management structure to help maintain these networks. When Microsoft released Windows Server 2000, the company introduced a new centralized way to manage network resources: Active Directory was born. When Microsoft was developing Active Directory its design engineers realized the benefits and security aspects that a centralized methodology would bring. New tools were developed to work with this new hierarchy to further enhance the network administrator’s leverage for managing rapidly, ever-growing corporate networks.
In this paper, I will discuss how Microsoft Active Directory helps secure the corporate network and its valuable information, reduce labor and IT costs and how it makes network management easier through utilizing centralized tools.

What is Microsoft Active Directory?
Microsoft Active Directory is a special-purpose database used to handle a large amount of network objects and centrally manage these objects. The Active Directory defines a domain structure at the highest level and other network objects in a hierarchical system below that domain. These network objects are broken down into separate items:
* Users
* Groups
* Contacts
* Computers
* Organizational Units
Users are defined as the account created by Accounts Management teams and used by a single individual to log into networked computers. Accounts Management teams are also responsible for modifying their access by adding or removing them from groups. A group is a collection of different user and computer accounts, contacts and other groups or any combination of these items that can be managed as a single unit. Users and computers that belong to a particular group are referred to as group members. (Microsoft TechNet) When a user account is created by the Accounts management team and that user needs access to the company’s email system, the team creates a contact record for that user with software that is bundled with Active Directory. This software is called Active Directory Users and Computers (ADUC). The contact record then shows up in the global address list so that anyone who needs to message someone in the company’s directory can then email that individual.

Image 1

(Source: http://technet.microsoft.com/en-us/library/aa995841(v=exchg.65).aspx Image 1 above shows the creation of a contact for the user. This contact will now show up in the company’s email directory so that people can email this individual)
A computer account is a network object that is defined within ADUC. The computer account uniquely identifies the computer on the domain. The Windows computer account matches the name of the computer joining the domain. A person that would be joining the computer to the domain must already have the proper credentials in order to perform this task. Only...

Other Papers Like Microsoft Active Directory Security

Research Proposal Essay

657 words - 3 pages ABSTRACT In this research, we propose an architectural solution to implement Windows Server Active Directory over the “Virtual Application Networks(VANs) to Power Drive Cloud Computing” by the Hewlett-Packard(HP) Development Company, L.P. of Bank Simpanan Nasional(BSN) environment between Headquarters and Branches in Sabah. The objective of this evaluation is to upgrading the network management and security of BSN headquarters and Branches

Test Essay

379 words - 2 pages rights reserved. Student Lab Manual 3 | Lab #3: Enabling Windows Active Directory and User Access Controls 8. Can a user who is defined in Active Directory access a shared drive on a computer if the server with the shared drive is not part of the domain? 9. When granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.), what security controls do you recommend be implemented to maximize confidentiality, integrity, and availability of production systems and data?

Xxxxxxxxxxxxx

1158 words - 5 pages another host’s name based on its IP address | Reverse Lookup Zone | A Windows Server 2008 computer that has been configured with the Active Directory DS role is referred to as a | Domain Controller | The process of keeping each domain controller in synch with changes that have been made elsewhere on the network is called | Replication | The __________ Domain Controller contains a copy of the ntds.dit file that cannot be modified and does not

Active Directory Benfits For Smaller Enterprises

7075 words - 29 pages IP Security 10 Improved Management Tools 11 Configure Secure Servers 11 Leveraging the Capabilities of Active Directory-Enabled Applications 12 Benefits of Exchange 2003 12 Improved Systems Management with SMS 2003 12 Integrated Capabilities with Third Party Applications 12 Conclusion 13 Related Links 14 Introduction Microsoft® Active Directory® (AD) has been available since early

Pos421 Week 2 Paper

1281 words - 6 pages their job. Looking back at past operations, RM has run into many problems that limited their ability to communicate effectively between individual plants. By implementing a Microsoft Windows Server Active Directory, many of the problems that have been evident will no longer exist. Many of the mundane and cumbersome operations that often cause issues can be eliminated by changing these functions into less complex tasks as noted in an article

Unit 1 Assignment 1

415 words - 2 pages . 4. Change The Account Name Change The Password (or Create A Password if the account does not currently have one) Remove The Password (if one is currently configured) Change The Account Type 5. Administrators can use access control to manage user access to shared resources for security purposes. In Active Directory, access control is administered at the object level by setting different levels of access, or permissions, to objects, such as

Server 2 End Of Lesson Answers

6605 words - 27 pages Exchange (CSVDE) Command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file. Comma-Separated Values (CSV) Format that contains a comma between each value. The CSV format can be used to import and export information from other third-party applications. distribution group Non-security-related groups created for the distribution of information to one or more persons

Nt 1330 Unit 10 Exercise

617 words - 3 pages | Windows Server 2003 Administrative Tools Pack | Monitor events recorded in event logs. | Ldp.exe | Windows Server 2003 Support Tools | Perform Lightweight Directory Access Protocol (LDAP) operations against Active Directory. | Linkd.exe | Windows Server 2003 Server Resource Kit | Create, delete, update, and view the links that are stored in junction points. | Microsoft Management Console (MMC) | Windows Server 2003 | Create, save, and open

Assignment 1

531 words - 3 pages needs. How will the procedures for making changes to the user accounts, such as password changes, be different in the Active Directory? Through Active Directory (AD), the sys admin would be able to have the passwords changed by each user by Active Directory managing the “roll-out” of asking that passwords being changed & needed security strength of the password by the internal automation of Active Directory. This is randomly handled by AD in a

Installing Windows Server Networking

737 words - 3 pages to ensure they choose the right operating system. Below is a list of several server roles available in installing Windows Server 2008 R2. Active Directory Certificate Services (AD CS) provides customizable services for creating and managing public key certificates used in software security systems employing public key technologies (Microsoft, 2014). Active Directory Domain Services (AD DS) provide secure, structured, hierarchical data storage for

What Are Functional Levels Designed to Do?

2627 words - 11 pages 2003 and on later domain controllers. The operations masters and their scope are shown in the following table. FSMO Role | Scope | Function and availability requirements | Schema Master | Enterprise | * Used to introduce manual and programmatic schema updates, and this includes those updates that are added by Windows ADPREP /FORESTPREP, by Microsoft Exchange, and by other applications that use Active Directory Domain Services (AD DS

Related Essays

Module 1 Written Assignment

938 words - 4 pages this, set a control access right Allowed to authenticate on an object for that particular user or group from the external domain. What should be installed and configured for the offices with limited IT staff and security? How will this be accomplished and deployed? I would install security roles “Active Directory Provisioning and Administration” The Active Directory security is increased due to the role-based security administration, approval

Domain Structure Essay

636 words - 3 pages access control lists (DACLs). The resources on a network are secured via security groups. This group determines to give authentications and user permissions to reach the data on the Active Directory, and such groups give authentications to access the resources and are to be found on Discretionary Access Control Lists. The group can have a control that encompasses everything, can be limited to a certain extent or can be further narrowed down as

Active Directory Essay

5797 words - 24 pages directory provides all these services and features which is very important in today’s network environment as directory-enabled applications are developed everyday. Active directory is the native directory service included in Windows server 2003 and Microsoft Windows 2000 server operating system. Microsoft’s active directory is a directory service that allows users and computers to communicate or look up information’s in the network such as users, phone

Research Assignment

598 words - 3 pages Microsoft TechNet with RODC organizations can easily deploy domain controllers in locations. Which security can be guaranteed. It differs by having better security, faster login time, and more efficient access to resource on the network. Background loading is a new feature on Windows Server 2008. When this service starts, it creates one or more threads of execution to load the zones that are stored in Active Directory. After the Global Names zone is