StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Windows 7 Workgroup Consultation for Sally Chu - Assignment Example

Cite this document
Summary
This paper will serve to define the specifics relating to setting up local users on a Windows 7 workgroup network, with a high level of security, as a part of a simulated network technology consultancy for a small business, owned by a Sally Chu. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
Windows 7 Workgroup Consultation for Sally Chu
Read Text Preview

Extract of sample "Windows 7 Workgroup Consultation for Sally Chu"

? Windows 7 Workgroup Consultation for Sally Chu (School) This paper will serve to define the specifics relating to setting up local users on a Windows 7 workgroup network, with a high level of security, as a part of a simulated network technology consultancy for a small business, owned by a Sally Chu. Keywords: UAC, user access controls, administrative users, users, Windows 7, workgroup, network Windows 7 Workgroup Consultation for Sally Chu In order for Sally to grant all six of her administrative staff members the same computer-access privileges, to allow them to run applications and use network printers, but not be able to make any accidental changes that can adversely affect their computers, the most effective and efficient way to create user accounts for these employees would be as follows. The first step would be to setup the profile for Sally’s administrators. In order to ensure that the administrators cannot make any changes that would adversely affect the computers themselves, the best bet is to setup the administrators on a standard user profile, instead of an administrator profile, as the administrator profile would have complete access to make any and all changes, while the standard use can use most software and change system settings that do not affect other users or the security of the computer itself. Once the standard user is setup, the next step is to setup the parental controls for that standard user, allowing for the use of games to be filtered out, and blocking any specific programs that she does not want the administrators to have access to, by setting the profile to only be able to use the programs from an allowed list, as specified by herself. Once the account is setup, and the parental controls are put in place, the settings in UAC, or User Account Controls, would need to be set, providing notification when programs try to make changes to the computer. This must be done for each profile that needs to be created, for a total of six (Microsoft, 2013). As Sally would like to provide a high level of authentication for her network’s users, she would like a dual authentication process. Two of the different methods that she could use in conjunction with requiring a password for network access are the option to use EAP (Extensible Authentication Protocol), and setting to allow certain protocols. Selecting “Use Extensible Authentication Protocol” allows the selection of using one of three protocols for authenticating the VPN connection: Protected EAP (PEAP), EAP-MSCHAPv2, or Smart Card or Other Certificate; all three options will ensure the security and data integrity of the EAP conversation through the use of encryption. The default setting is EAP-MSCHAPv2, which is also known as Secure Password. By selecting the properties for EAP-MSCHAPv2, the ability to configure the connection to use the Windows login credentials in order to authenticate the connection. Selecting “Allow These Protocols” instead as the other alternative for providing the second level of security to the network connection will allow for the choice between three different connection types, all of which can be set to configure the Windows login credentials to be used; the three different authentication protocols that can be used by the connection are PAP, CHAP, or MS-CHAPv2. “The choice of these three types of authentication methods will only apply to PPTP, L2TP/IPsec, or SSTP tunnels; IKEv2 tunnels can only use EAP-MSCHAPv2 or certificates as their authentication methods” (Sourcedaddy.com, 2008). While there is an advantage into having the user’s use their Windows login credentials, namely that they will not have to remember a third set of login credentials, the disadvantage is that if an unauthorized user obtains that information, that will give them that much more access to the network itself. The user access controls set for the profiles themselves will ensure that the web based applications will run in protected mode, and by allowing the particular programs on the intranet in the parental controls section of the profiles themselves, this will ensure those limitations are not placed on the applications that are run through the company’s intranet itself. In order to troubleshoot issues with this particular setup, should that be required, a flowchart is included below: Two internet threats that employees may come across are vulnerabilities in programs/applications, and malware and spyware that may be placed on the computers themselves. Through the process of ensuring that Internet Explorer 8 is kept fully up to date, issues with potential security holes may be resolved as soon as they are found and addressed by the programmers themselves, and through downloading and installing Malwarebytes, Adaware, or Spybot, or all three, any malware, badware, or spyware may be immediately caught and resolved. The most efficient and cost effective manner to ensure that all the client’s computers are kept fully up to date, without Active Directory, is to setup automatic updates on each of the computers on the network, set to run when the computers are shut down, in order to ensure that the computers remain up to date while not affecting the processing speeds of the computers or workflow of the employees themselves. This will make sure that updates are done daily, and at the same time ensure that the shutdown that needs to be done will occur after the employees are finished with their work for the day. This means that each computer will manually update on its own, but at the same time, makes sure that there is no additional cost to do so, and keeps the company running smoothly on all fronts. If users are reporting that their clients are running sluggishly, in order to monitor the performance of all the clients, Resource Monitor may be used to monitor and optimize the system’s network performance, see where the delays are coming from, what is using up the resources, and then optimization of the network can be done from that point on, depending on where the issue itself lies (Lowe, 2011). Works Referenced Lowe, S. (2011, July 29). Use resource monitor to monitor network performance. Retrieved from http://www.techrepublic.com/blog/datacenter/use-resource-monitor-to-monitor-network-performance/4709 Microsoft. (2013). What is user account control?. Retrieved from http://windows.microsoft.com/en-US/windows-vista/What-is-User-Account-Control Sourcedaddy.com. (2008). Configuring the authentication method used. Retrieved from http://sourcedaddy.com/windows-7/configuring-the-authentication-method-used.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Windows 7 Workgroup Consultation for Sally Chu Assignment”, n.d.)
Windows 7 Workgroup Consultation for Sally Chu Assignment. Retrieved from https://studentshare.org/information-technology/1468896-windows
(Windows 7 Workgroup Consultation for Sally Chu Assignment)
Windows 7 Workgroup Consultation for Sally Chu Assignment. https://studentshare.org/information-technology/1468896-windows.
“Windows 7 Workgroup Consultation for Sally Chu Assignment”, n.d. https://studentshare.org/information-technology/1468896-windows.
  • Cited: 0 times

CHECK THESE SAMPLES OF Windows 7 Workgroup Consultation for Sally Chu

Consultation and Collaboration

consultation and Collaboration in a School Setting Name: Institution: consultation AND COLLABORATION IN A SCHOOL SETTING consultation and collaboration refers to the school counselor, psychologist, or special education teacher acting as an expert who advises the general education teacher.... hellip; In addition, collaborative consultation also defines the use of a counselor or special educator with the ability to offer advice to and consult with general education teachers when they are requested (Coleman & Yeh, 2008)....
5 Pages (1250 words) Research Paper

Windows XP: A System Solution to Zsoft Limited

It is recommended to Zsoft to move on windows XP Professional (SP2) to This report will look on (present) various benefits of moving to a single operating system, specifically windows XP professional.... In the first section of the report, outline of windows XP will be discussed.... This will cover basic system requirement for windows XP Professional and the various differences between windows XP Professional and windows XP Home Editions....
24 Pages (6000 words) Essay

Network Design Consultation

0 4 windows 7 Ultimate Operating system licenses(each $270 ) 1,080.... The paper "Network Design consultation" discusses hardware and software requirements and cost analysis, network architecture, network architecture illustration router configuration, client configurations, internet configuration, and managing the network security.... As for the server windows server, the 2008 operating system would have to be installed, this is because the server would be used to manage the entire network....
5 Pages (1250 words) Case Study

Two main operating systems: Windows 7 and OS x 10.6

In the paper “Two main operating systems: windows 7 and OS x 10.... Apple upgrade from earlier versions is cheaper as compared to windows 7.... (2011) gives an example of windows 7 Ultimate upgrade that costs $220 on Amazon online stores, windows 7 Professional goes for $200, and windows 7 Home Premium is sold for $120.... Some of the Windows7 versions are; windows 7 Home Premium, windows 7 Ultimate, windows 7 Professional (Gralla, 2009)....
9 Pages (2250 words) Essay

Car Power Windows

The current research paper "Car Power windows" discusses the fact that the original car models from the 1800's did not look like the cars that we know today.... Since cars now had windows, a window regulator needed to be designed in order to allow for the opening and closing of the window by the car passenger.... These windows were manually opened at the time, using a window riser attached to a cable pulley system.... It was this need to deliver a new method of opening car windows that led to the invention of the car power window....
6 Pages (1500 words) Research Paper

The Evolution of Windows Operating System

According to research findings of the paper “The Evolution of windows Operating System”, the power of Computing on the windows Operating system is seen to gradually have been increasing with each operating system that is launched by Microsoft Corporation.... Although MS-DOS was quite effective, it is as a result of its proving to be too difficult for some people to use as a result of having numerous cryptic commands that the windows Operating System was developed....
16 Pages (4000 words) Article

FAT32 File System for Computers

Since then, the NTFS file system is used in most recent operating systems, including windows 7, 8, and Vista as a default format.... For purposes of convincing a user who has expressed a preference for the FAT32 file system to the NTFS file system for use in desktop computers in a workgroup, this document will compare the different features of the two file systems.... Therefore, being a new technology file system, NTFS has additional features that make it suitable for use for desktop computers in a workgroup....
5 Pages (1250 words) Case Study

What Is New in Windows 7

… The paper "What Is New in windows 7" is an outstanding example of an essay on information technology.... windows 7 is technically an evolution of Windows Vista and considered the best version of Windows because its faster, more powerful, non-intrusive, stable, secured, and retains just enough animation and attractiveness of Windows Vista.... The paper "What Is New in windows 7" is an outstanding example of an essay on information technology....
11 Pages (2750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us