After completing this lab, you will be able to
In this lab, you will analyze portions of the existing environment at a medium-sized company to define an OU structure and security groups.
Before you begin this lab, you must be able to
In this exercise, you will analyze the existing environment at a medium-sized company to define an OU structure and security groups. Review the scenario; then follow the instructions to define the OU structure and security groups.
Your design team is planning the Active Directory infrastructure for Uncle Bob's Root Beer, a worldwide producer of a root beer soft drink. Uncle Bob's has four regional offices in Melbourne, Chicago, Berlin, and New Delhi. There are 107 bottling plants worldwide. The corporate headquarters is located in Melbourne. Each regional office has a human resources, finance, sales, production, and distribution department. In addition, Melbourne also has a new products department. Uncle Bob's infrastructure plan uses one domain.
While reading through the business and technical environment analysis documents, you note the following:
Based on your notes, follow the instructions below to define an OU structure.
OU created | Reason created | Users and computers contained in the OU |
---|---|---|
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
Answers
In this exercise, you will design security groups to provide users with access to network resources.
Your design team is planning the security groups needed in connection with the Production department at the Chicago regional office of Uncle Bob's Root Beer. Recall that the Production department has its own IT management organization to manage resources, including servers. Users from all departments and locations of the company must be able to access information on the servers in the Chicago Production department. The table below identifies the resources managed by the Production department, the users that require access to the resources, and the level of access they require.
Resource | Users requiring access | Access level |
---|---|---|
Formulas | Chicago Production Server Administrators | Full control |
Formulas | Chicago Production Managers | Change |
Formulas | Chicago Production Specialists | Read |
Formulas | All Production Managers company-wide | Read |
Production Logs | Chicago Production Server Administrators | Full control |
Production Logs | Chicago Production Managers | Change |
Production Logs | Chicago Production Specialists | Read |
Production Logs | Chicago Distribution Managers | Read |
Production Logs | All Production Managers company-wide | Read |
Bottling Logs | Chicago Production Server Administrators | Full control |
Bottling Logs | Chicago Production Managers | Change |
Bottling Logs | Chicago Production Specialists | Read |
Bottling Logs | Chicago Distribution Managers | Read |
Bottling Logs | All Production Managers company-wide | Read |
Customer Service Logs | Chicago Production Server Administrators | Full control |
Customer Service Logs | Chicago Production Managers | Change |
Customer Service Logs | Chicago Production Specialists | Read |
Customer Service Logs | Chicago Distribution Managers | Read |
Customer Service Logs | All Production Managers company-wide | Read |
Customer Service Logs | All Distribution Managers company-wide | Read |
Complete the table below to document your security group design. Include the name of each security group, the group scope, and the members of the group. Also note whether the members are individuals or list group names if the members are groups.
Group | Scope | Members |
---|---|---|
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
____________________ | ____________________ | ____________________ |
Answers