Windows Network Proposal

Running Head: WINDOWS NETWORK PROPOSAL 1
Windows Network Proposal
Student’s Name
Professor’s Name
Institution of Affiliation
Date
WINDOWS NETWORK PROPOSAL 2
Introduction
The Crete LLC will in context access a lot of benefits through the process of using
Windows server 2012 within the management of the various operations and network. It is
typical that Windows server 2012 will foster greater presence of updates to the security and
processes over the previous based editions of the windows. This paper will explore various
critical aspects such as the Active Directory, the Domain Name Server, Remote services,
Group policy and lastly offer an in-depth examination of window server update services. The
aforementioned essential functionalities will foster rendering of services and operation of
Crete LLC to operate efficiently and without encountering any form of challenges.
The Active Directory
The primary function of the active directory for Crete LLC will have different sites
that operate on a large geographic area. As a result, it is imperative to state that a regional-
based domain model should be used. The domains that are employed in this case will be
based on the geographical location where the end user of the system is located. To put this
into perspective, Crete LLC has three primary locations: Los Angeles, Dallas, and Houston.
This means that the general number of domains that will be used in this case scenario is three,
acting as a representation of the mentioned three cities. The significance of this approach is
that it will ascertain that the network of the company can be scrutinized and maintained
through regional administrators, whose main role will be to keep track of the different users
in their designated regions (Xu, 2016). Through the presence of such a method of system
deployment, it can be difficult to make a decision on will be perceived as the root domain.
The main staff for the company will be located in Dallas and Houston offices. The
location of the staff will be problematic when it comes to the decision of which one of the
mentioned will serve as the forest root domain. To make an unbiased decision in relation to
the creation of the forest root domain, a particular and dedicated forest root domain can be
WINDOWS NETWORK PROPOSAL 3
settled upon (Touboul et al 2018). The domain that is created will only operate as the forest
root. It is to imply that it will not have any users using the same apart from the accounts
inclined to the service administrator for the forest root. Notably also is the fact that the forest
root created will not be based on any specific geographical location that is covered by the
network and any other domain related to the root domain will be perceived as the children of
the main domain. The designated root domain will not have a lot of impact on other sites due
to the fact that it is unbiased (Touboul et al 2018). This means that no region will be
perceived as a subordinate of another region.
Essentially, the RODC need to be part of the consideration due to its use on the
network. There are main characteristics of RODC that makes it be suited to be used in the
creation of the active directory in the entire network. It is visible that the RODC contains an
apparent outline of the roles of the different administrators. As such, the RODC can easily
designate the different end users, for instance, the server administrators without having to
give permission to any domain (Xu, 2016). The significance of RODC which makes it
significant to be considered in this case is that it contains the limited scale of credential
caching. Thus, it fails to keep the credentials of the user or the computer.
The FSMO duties placement should be carried out in a way that the different roles are
kept in the domain controllers which are given the authority to be accessed by the computers
that need to access a specific role, often on the network that is not entirely routed. To
demystify this further, to access a contemporary form of RID pool, or carry out a pass-
through scope of authentication, it is significant to comprehend that all the DCs need to
access the network so as to attain the PDC function in any allocated domain regions.
Crete LLC Company ought to concentrate on the process of developing a plan for the
Active Directory backup. The primary function of the Active Directory is to enhance security
through different approaches, for example, the invocation of the installation process for new
WINDOWS NETWORK PROPOSAL 4
gadgets or software (Xu, 2016). The type of back up that can be carried out by the company
to improve security is windows server that provides data protection through backup
approaches such as the incremental, copy, daily and differential backups.
Forest Root Domain
Domain Domain
Group Policy
The Group policy is instrumental in the daily operations of the Crete LLC Company.
The group policy allows the network administrator to have full capability to define the user,
policies of the company and security of the network in the firm. The main reason why it is
important to implement the same is to make the management process to be easy. When the
users of a network are linked together through the use of the group policy, the enforcement of
the policies of the company will be easy since the sites that the staff of the company can
access will be limited. Detroit marketing team, for instance, will need to access the offices in
DALLAS OFFICES
HOUSTON OFFICES
FILE SERVER
WINDOWS NETWORK PROPOSAL 5
Houston remotely and this will require top-level security (Bidaralli et al. 2017). The group
policy can be important in fostering security by defining the requirements for the different
users to create personal passwords. The different setting that may be put into consideration
and implemented through the use of group policies consist of the file system, registry, public
key policies and internet protocol security regulation that are present in the active directory.
DNS
The namespace that the Crete LLC company need to implement consist of fully
qualified domain names and also a DNA name. The qualified domain name is the name that
is used to clearly identify a given computer in the network. The FQDNs which will be
implemented by the firm ought to be clear and different. Often, the FQDN consists of the
Hostname, the primary DNS suffix and the period. On the contrary, DNS name consists of a
particular number of labels which are separated through the use of a dot. When the DNS
name offers a clear path, it is perceived as a fully qualified domain name. The kind of zones
which will be implemented consist of the primary zone, active directory-integrated region
and secondary zone (Salour, 2016). The primary zone is the location where editing or update
occurs due to the data that is present in the region. The types of updates that are mainly
placed for the main region are created by the DNS server that depends on a specific main
region. The secondary zone keeps a read-only document of a particular zone that was
retrieved from the main server during the process of slowly transferring the zone. It is notable
that the secondary zone in most cases cannot be edited in a direct method and it can be
subjected to transfer through a region. The active directory-integrated region stores the data
in an active directory. The data that is present in this given region is replicated during the
replication of the Active Directory.
File Service
WINDOWS NETWORK PROPOSAL 6
It is vital at this point to state that a share in a given network can be perceived as a
liability when the shared files in the network can be accessed by unauthorized individuals.
Many of the computer-oriented malicious software can easily be spread from one device to
the other through the shared files. As such, it requires a proper approach to be used in the
process of ensuring that the shared files in the network are secure. The safety of the files
being shared on the network can be improved through the installation of a firewall that will
hinder the devices that are present outside the local area network of the Crete LLC Company
from accessing files or penetrating the network. Through the use of the virtual private
network, the different shares that are available can be made easily accessible to only the
recommended users who are not inside the local area network.
The system administrators in the LLC Company can institute the utilization of quotas
to limit specific components of file system used on modern operating systems. Because of
this reason, an individual will easily note that in most companies across the globe, it is a
common practice to use quotas so as to safeguard the space that any particular user can use in
any given instance. The FSRM can then be gradually configured through the use of the File
Server Resource Manager, Microsoft Management Console or alternatively through the use
of the Windows PowerShell. The DFS is fundamental in the sense that it can be used in an
organization to replicate different file servers that are found in a local area network. In the
case of the Crete LLC company, it is critical and common practice to easily implement the
use of the DFS so as to improve the replication of the file servers as mentioned previously.
Remote Services
The type of technology that can be implemented to provide a secure remote access is
mainly through the utilization of the SSL VPN technology. This technology is used so as to
create the connection to the network of the firm to encrypt and authorize remote access. By
implementing the technology, the system administrator of the Crete LLC Company will be in
WINDOWS NETWORK PROPOSAL 7
a better position to reduce access to the public network (Cabrera, Vermeulen, & DeSantis,
2017). The technology can be used to investigate the remote system to ascertain that the
operation and performance of the system are effective. That is to mean that the client should
be able to easily operate the entire system easily. The installed firewalls to protect the system
against malware and penetration by intruders should also be working effectively without
suffering from constant failure.
Remote access can be accorded to the staff so that they can be in a better position to
gain entry into the database of the different clients while working from their homes. The
workforce in the company can also be permitted to send and receive a different email from
any computer that is in the local area network. Enabling the employees to use remote access
improves the performance of the company since the employees can still complete their work
even without being physically present in the company.
WSUS
The servers and the client computer will be updated through updating the WSUS. The
primary reason to update the WSUS is to meet the recommended standards of the computer
that uses that technology. It is to imply that it will be difficult to update the servers and the
client computer in the local area network if the computer that is used is not compatible with
the version level of the technology that is utilized. The update of the entire system is
significant in the sense that it will try and fix any resultant challenges that emerge from the
computers that are running on several versions of the WSUS (WSUS Overview. 2018). The
installation of new servers should always meet the standards of the Crete LLC Company
bplan.expertwriting at gmail dot com. It is to men that the system cannot be easily deployed if
it fails to meet the objectives of the company and also compatible with different computers
that are being used in the firm.
Conclusion
WINDOWS NETWORK PROPOSAL 8
Windows Server 2012 as seen contains numerous advantages to the company once it
is deployed and implemented. The server will guarantee the security of data to Crete LLC
Company and hence the sharing of files by the authorized users can be executed without the
fear that someone who is outside the network can intercept the files, penetrate the system to
steal data or bring down the system. Moreover, there are other underlying aspects of the
Windows Server 2012 that will improve the service performance of the firm through effective
operations that could not be offered by the previous editions of windows.
WINDOWS NETWORK PROPOSAL 9
References
Bidaralli, S. K., Bangera, L. K., Mugunda, C., & Kulkarni, Y. P. (2017). U.S. Patent
Application No. 15/686,041.
Cabrera, L. F., Vermeulen, A. H., & DeSantis, P. N. (2017). U.S. Patent Application No.
15/266,997.
Salour, M. (2016). U.S. Patent No. 9,294,433. Washington, DC: U.S. Patent and Trademark
Office.
Touboul, S., Levin, H., Roubach, S., Mischari, A., David, I. B., Avraham, I., ... & Gareh, L.
(2018). U.S. Patent Application No. 15/682,577.
WSUS Overview. (2018). Technet.microsoft.com. Retrieved 21 JUNE 2018, from
https://technet.microsoft.com/en-us/library/cc539281.aspx
Xu, Z. X. (2016). Practices to Administration of Windows Server 2012 and 2012 R2.
Memory, 4, 64.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.