Wednesday, September 25, 2019
Planning Group Policy Software Deployments Term Paper
Planning Group Policy Software Deployments - Term Paper Example By having in place a recycle pin for active directory, the whole process of deleting an object is changed by eliminating the features or the attributes that are the process can do without. The objects that are deleted are kept in recycling pin for the rest of the server's lifetime so that any time that the user needs he or she can get it. This process is equivalent to the status of pre-AD recycle bin delete. The object remains in that location until the lifetime expires that is where it will be restored using garbage collection mechanism. To recover a container which has objects and sub-containers, the best method is authoritative restore though recycle bin is also able to perform it. For the s3econd case, the whole restoring procedure is initiated from the deleted hierarchy. There two options that can be used to recover an item that has been lost in the active directory. The first option is where the restoring process is done authoritatively from the backup that had been created. To carry out this process, you restart the domain controller that is in the restore state of directory service. Basically, the state of the system is brought back to the previous state at which it was before the disaster strikes. To make sure that the item that had been lost regains the previous state, you need to make use of ntd.exe command-line properties to label the item that was restored. This will enable the restored item to have a structure resembling all the other domain controllers in that particular domain.... This also has to be outlined. The security concern that is given emphasis is that concerning risk that can accrue and affect the business functionality of the system. An example is, is the economical risk that might accrue when an attacker cause denial of service by preventing the employees from using the system to carry out the business transaction. This can lead to lose of customers by the company The primary security tasks that can be incorporated in this level are ensuring that the confidentiality, integrity and availability of the companyââ¬â¢s data and information is maximized. This can be ensured by using Microsoft group policy object to come up with groups of information that are supposed to be accessed by a particular group of people. This will make it easy to single out the person who has had an access to information at a particular time and also delegate the individual responsible for transfer, keeping and creation of information. The second phase of system development life cycle is analysis which entails collecting the systemââ¬â¢s requirement. Examination of the business requirement is done so that the business activities are accomplished faster. This stage concentrates on the functional requirement of the in ensuring that all the system user requirements are attained The group policy that is implemented in this phase is provided after doing a detailed evaluation of the risk involved them assistance is provided to the previous policy measures. Examination of the requirement policy is done then a test of both functional and security features is conducted. This will give a basis for the creating a document that will be used to certify and accredit the system. However the to analyze a complex system requires that the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.