MCSE Designing a Microsoft Windows 2000 Directory Services Infrastructure Readiness Review; Exam 70-219 (Pro-Certification)

Lab Objectives

After completing this lab, you will be able to

About This Lab

In this lab, you will analyze portions of the existing environment at a medium-sized company to define an OU structure and security groups.

Before You Begin

Before you begin this lab, you must be able to

Exercise 5.1: Defining an OU Structure

In this exercise, you will analyze the existing environment at a medium-sized company to define an OU structure and security groups. Review the scenario; then follow the instructions to define the OU structure and security groups.

Scenario

Your design team is planning the Active Directory infrastructure for Uncle Bob's Root Beer, a worldwide producer of a root beer soft drink. Uncle Bob's has four regional offices in Melbourne, Chicago, Berlin, and New Delhi. There are 107 bottling plants worldwide. The corporate headquarters is located in Melbourne. Each regional office has a human resources, finance, sales, production, and distribution department. In addition, Melbourne also has a new products department. Uncle Bob's infrastructure plan uses one domain.

While reading through the business and technical environment analysis documents, you note the following:

Exercise Questions

Based on your notes, follow the instructions below to define an OU structure.

  1. Create an OU structure diagram for Uncle Bob's Root Beer that supports the needs indicated in the scenario.

  2. Complete the table below to document each OU in your design, the reason for creating it, and the users and computers that it contains.

    OU created Reason created Users and computers contained in the OU
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________
    ____________________________________________________________

    Answers

Exercise 5.2: Defining Groups

In this exercise, you will design security groups to provide users with access to network resources.

Scenario

Your design team is planning the security groups needed in connection with the Production department at the Chicago regional office of Uncle Bob's Root Beer. Recall that the Production department has its own IT management organization to manage resources, including servers. Users from all departments and locations of the company must be able to access information on the servers in the Chicago Production department. The table below identifies the resources managed by the Production department, the users that require access to the resources, and the level of access they require.

Resource Users requiring access Access level
FormulasChicago Production Server AdministratorsFull control
FormulasChicago Production ManagersChange
FormulasChicago Production Specialists Read
FormulasAll Production Managers company-wideRead
Production LogsChicago Production Server AdministratorsFull control
Production LogsChicago Production Managers Change
Production LogsChicago Production Specialists Read
Production LogsChicago Distribution Managers Read
Production LogsAll Production Managers company-wideRead
Bottling LogsChicago Production Server AdministratorsFull control
Bottling LogsChicago Production Managers Change
Bottling LogsChicago Production Specialists Read
Bottling LogsChicago Distribution Managers Read
Bottling LogsAll Production Managers company-wideRead
Customer Service LogsChicago Production Server AdministratorsFull control
Customer Service LogsChicago Production Managers Change
Customer Service LogsChicago Production Specialists Read
Customer Service LogsChicago Distribution Managers Read
Customer Service LogsAll Production Managers company-wideRead
Customer Service LogsAll Distribution Managers company-wideRead

Exercise Questions

Complete the table below to document your security group design. Include the name of each security group, the group scope, and the members of the group. Also note whether the members are individuals or list group names if the members are groups.

Group Scope Members
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________

Answers

Категории