Lab 5.1: Defining an OU Structure and Security Groups

Lab Objectives

After completing this lab, you will be able to

  • Define an OU structure
  • Define security groups

About This Lab

In this lab, you will analyze portions of the existing environment at a medium-sized company to define an OU structure and security groups.

Before You Begin

Before you begin this lab, you must be able to

  • Analyze an organization's environment to define its OUs
  • Analyze an organization's environment to place user accounts
  • Analyze an organization's environment to define groups

Exercise 5.1: Defining an OU Structure

In this exercise, you will analyze the existing environment at a medium-sized company to define an OU structure and security groups. Review the scenario; then follow the instructions to define the OU structure and security groups.

Scenario

Your design team is planning the Active Directory infrastructure for Uncle Bob's Root Beer, a worldwide producer of a root beer soft drink. Uncle Bob's has four regional offices in Melbourne, Chicago, Berlin, and New Delhi. There are 107 bottling plants worldwide. The corporate headquarters is located in Melbourne. Each regional office has a human resources, finance, sales, production, and distribution department. In addition, Melbourne also has a new products department. Uncle Bob's infrastructure plan uses one domain.

While reading through the business and technical environment analysis documents, you note the following:

  • The IT management organization in each regional office administers user accounts and user desktop configurations, manages servers, and enforces network security.
  • At the corporate headquarters, some administrators have administrative authority over the entire network in order to complete performance and security audits.
  • In order to keep new products secure in the competitive soft drink industry, the New Products department has its own IT management organization that administers user accounts, manages users, and enforces network security.
  • Though the IT management organization in each regional office administers user accounts for the Production department, each Production department administers access to its servers.
  • All users in the company use the same e-mail and word processing applications.
  • The Distribution department at each regional office uses its own proprietary distribution tracking software.
  • The company requires that all human resources (HR) servers be hidden from non-HR personnel.
  • Each regional office staffs a help desk whose users are permitted to reset passwords.

Exercise Questions

Based on your notes, follow the instructions below to define an OU structure.

  1. Create an OU structure diagram for Uncle Bob's Root Beer that supports the needs indicated in the scenario.


  2. Complete the table below to document each OU in your design, the reason for creating it, and the users and computers that it contains.

    OU created Reason created Users and computers contained in the OU
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________

    Answers

Exercise 5.2: Defining Groups

In this exercise, you will design security groups to provide users with access to network resources.

Scenario

Your design team is planning the security groups needed in connection with the Production department at the Chicago regional office of Uncle Bob's Root Beer. Recall that the Production department has its own IT management organization to manage resources, including servers. Users from all departments and locations of the company must be able to access information on the servers in the Chicago Production department. The table below identifies the resources managed by the Production department, the users that require access to the resources, and the level of access they require.

Resource Users requiring access Access level
FormulasChicago Production Server AdministratorsFull control
FormulasChicago Production ManagersChange
FormulasChicago Production Specialists Read
FormulasAll Production Managers company-wideRead
Production LogsChicago Production Server AdministratorsFull control
Production LogsChicago Production Managers Change
Production LogsChicago Production Specialists Read
Production LogsChicago Distribution Managers Read
Production LogsAll Production Managers company-wideRead
Bottling LogsChicago Production Server AdministratorsFull control
Bottling LogsChicago Production Managers Change
Bottling LogsChicago Production Specialists Read
Bottling LogsChicago Distribution Managers Read
Bottling LogsAll Production Managers company-wideRead
Customer Service LogsChicago Production Server AdministratorsFull control
Customer Service LogsChicago Production Managers Change
Customer Service LogsChicago Production Specialists Read
Customer Service LogsChicago Distribution Managers Read
Customer Service LogsAll Production Managers company-wideRead
Customer Service LogsAll Distribution Managers company-wideRead

Exercise Questions

Complete the table below to document your security group design. Include the name of each security group, the group scope, and the members of the group. Also note whether the members are individuals or list group names if the members are groups.

Group Scope Members
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

Answers



MCSE Training Kit Exam 70-219(c) Designing a Microsoft Windows 2000 Directory Services Infrastructure
MCSE Designing a Microsoft Windows 2000 Directory Services Infrastructure Readiness Review; Exam 70-219 (Pro-Certification)
ISBN: 0735613648
EAN: 2147483647
Year: 2001
Pages: 76

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net