90 likes | 240 Vues
Windows Server 2003 with Active Directory and Group Policies . Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET. OUTLINE. Motivation Introduction Problem Statement Proposed Solution Results Conclusions Future Work. MOTIVATION. Learn now, Use later.
E N D
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET
OUTLINE • Motivation • Introduction • Problem Statement • Proposed Solution • Results • Conclusions • Future Work
MOTIVATION • Learn now, • Use later. • Will benefit me in the work place. • See how group policies worked. • Understand servers better. • Security problems. • Virus problems. • User access problems.
INTRODUCTION • Client machines need to be able to access some things from the network. To do this you need a secure server. • There are different types of servers that can be used. I am using DHCP, DNS, and Active directory. • To make my client-server setup more secure I am using group policy within Active Directory.
PROBLEM STATEMENT • Setting up server roles. • Setting up security. • Setting up users. • Limiting user accessibility.
PROPOSED SOLUTION • Started to use a Dell Power 4200 server, did not work. • So rethought project to use a PC for a server. • Obtained software and hardware from Professor Kilgore. • Added ghost images of both the server and client machine. • Added server roles. • Added group policies. • Tested server and client machine.
RESULTS • DHCP setup • DNS setup • Active Directory setup • Group Policy setup
CONCLUSIONS • Works, but not without time and research. • Most companies are using or planning on using active directory and group policies now in the future. • Server without security is like an unlocked house. Anyone can gain access • Learned a lot from this experience.
FUTURE WORK • Use experience in job. • Research and learn more about servers. • Could add different servers such as file servers, print servers, exchange servers, etc. • Could add in different security programs such as ISA, IIS, etc.