Windows Network | Windows Network Services Proposal | Melbourne Institute of Technology

Introduction

Opening Windows has been associated with a proper Information Technology designing and development plan for their business operations. The designing and management of the applied placement of Windows Server 2016 have been stated through directional management and services. The detailed network design has been considered through the necessary approach and assessment for the operations. The designing and implication have been related through direct consideration of various Active Directory components and their application for the systematic development and management of the operations. The detailed consideration of the active directory implications has been stated and thoroughly provided here.

Designing of the Diagram

In this particular approach, the relevant designs have been provided for the operational system of the services. The necessary and relevant approaches have been taken to design the organizational structure of the network for both locations through separate assessments (Francis, 2019). The strategic application has been considered as a part of the structure relative to the systems of the network approach and analysis. This design presented below provides the proper base structure of the main office application for OW.

Figure 1: Huston Branch

Figure 2: Richmond Branch

Figure 3: Network Link

These designs provide a proper structure and relevance to the systems of the network requirement for Opening Windows. The direct assessment of the new structure has been successfully implemented on a logical level to the systems. The proper links through distribution system and secure firewall operations have also been associated. The detailed consideration of the connectivity can be done effectively through proper dynamic hosting with DHCP or DNS connectivity within the entire network structure ranged over two different cities.

Active Directory Infrastructure

Features of Windows Server 2016

The existing domain forest is however required to be linked with proper network structure through secure connectivity with the help of Windows Server 2016. The valid features of the server that would help associate the OW operations properly are the consideration of Hyper-V containers of lightweight nature. According to Stefanovic & Kranjac (2019), the previous network was reliant on heavyweight containers for their operations. Another major feature under assessment is the Replication of storage for the network data structure. In this type of consideration for the server storage replication, the data of the network would be doubly secure through direct specification. The existing forest would be effectively connected and integrated with the new systems through the structural systems of the network.

Implementing Forest Functional Levels

The forest functional levels are implemented through direct assessment and administration of the strategic implementation and analysis of the systems. The application of Windows Server 2016 through forest functional levels can be systematically staged and stated below. The direct approach has been specified below within the tabular structure presented.

Stages

Operations

Stage 1

Start Option -> Select Administrative Tools -> Select Active Directory Domains and Trusts

Stage 2

Select after right click -> Implement Forest Function Level

Stage 3

Select Function Level under requirement -> Implement Forest Functions

Stage 4

Start Option -> Select Administrative Tools -> Select Active Directory Domains and Trusts

Stage 5

Select after right click -> Raise Forest Function Level

Stage 6

Select Forest Function Level -> Click Raise Function

Table 1: Implementing and Raising Forest Functions

Implementing Cross-Forest Trust

The strategic development and implementation of cross-forest trust can be done through valid strategic steps of operation and development. The consideration of GUI applications has been stated below through the tabular presentation.

Steps

Description

Step 1

Open the active directory Domain and Trust -> Snap-in

Step 2

Right-Click Properties on Forest Root Domain

Step 3

Click Trusts -> The click on Trust

Step 4

Trust Wizard Opens -> Click Next -> Forest Trust -> Click Next

Step 5

Configure the entire structure as required, through the screens

Table 2: Cross Forest Consideration

Handling of Replication

The Replica of Storage is an innovative and effective feature of operation considering the structure of assessment and adjustment for the systems. The directional logic has been stated through appropriate assumption and consideration of the replication handling for the data within the network of Operating Windows and the business systems. This type of replication procedure that the following feature follows is the Synchronous Replication systems for data mirroring implication. The design and analysis have been done through direct assessment of the data security application. This type of replication handling and management is directly related to the consideration of data-driven services and their evaluation relating to the systems of regulation of data los aspect from within the network operations.

Active Directory Certificate Services

Modification requirement of AD Certificate Services

The certification of the active directory is required to be done through collaboration with Microsoft. As the Server prospect is the specific Windows Server 2016, this type of approach and assessment for the valid feature of implication has been considered for the network of OW. The CS server is required to be set up for the Active Directory for a proper application of modified presentation of AD certificates. The direction needs to e validated through a focus on both the specific domains under consideration and assessment. The relevant analysis has been directed through proper approach and determination for the systems and their analogical preferences for the network approach.

Active Directory Rights Management Services

Implementation of rights management

Active Directory and the respective rights management is one of the important considerations relating to the structure of operations and developmental approach for the systems. The directional logic has been stated through appropriate consideration and management of the valid bulletins for judgment and justification:

  • The network that is set to handle important financial information and credentials that are private, needs effective layered security prospect implemented through the firewall and access control for devices (Jones, Wimmer & Haddad, 2019)
  • The Rights Management within the network can be considered through the application of various other restrictions like the eradication of screenshot or print screen features for any application within the network
  • The administrators and managers need to have a proper understanding of the rights management systems and the regulatory policies that have been implemented within the network operation specifics

Active Directory Federation Services

AD Federation Services

            Federation Services are more inclined towards the consideration and application of restricted as well as transparent use of the network services for the users of Operating Windows. The approach needs to be guided through direct assessment and engagement of the relative applications and their operational logic under development. The designing has to be done through direct application of the Single Sign-On feature for each user only after they have been authenticated. Shin (2019) has stated that the application of authentication can be done for the dynamic hosts and their approaches through the use of user names and passwords. Use of SQL Server Management Studio can be done for proper windows authentication put under placement.

Active Directory Associability

Forest Domain Model Description

            The domain model structure that has to be determined through direct application of the network of Operating Windows and their services has been stated. The application has been stated through consideration of the organization's structure. The top level domain needs to be ‘.org’, depicting the organization. The braches need to be stated through presentation of ‘.huston.org’ and ‘.baltimore.org’ presentation. The designing has to be done in such a manner that the sub domain approaches would be independent to some extent for extensive application of transparency. The presentation of the World Wide Web application can be done through a website name like ‘www.operatingwindows.org’. The design has been done through suitable consideration for the 2016 Windows Server.

Placement of Domain Controllers and RODC

The directed domain controller approach and operation has been directed through appropriate management and implication of the definitive prospects of the networks. The domain controllers need to be placed one each within the two specific network branches and their evaluation. The specific office applications for the two network segments for Huston and Baltimore have to be done through independent approaches for the business operations.

The designs for the RODH approach need to be related to a direct read-only control mechanism for the systems. The directional logic has to be implemented through appropriate structure and management for the implications. Catrinescu & Seward (2019) have opined that these services would be directly aided with proper backing up of the database structure through direct assessment and consideration of the systematic structure for OW and their services provided over the network.

FSMO Roles Replacement

The consideration of the relevant steps has been done to provide a proper assessment of the structures of their implications. The Algorithmic presentation has been directed through systematic steps.

Steps

Procedure

Step 1

Initiate Command Prompt or CMD

Step 2

Place Commands -> ‘ntdsutil’ -> Roles -> Press Enter

Step 3

Place Commands -> FSMO Maintenance -> type connections -> Press Enter

Step 4

Place Commands -> Server Connections -> type connect to server -> Press Enter

Step 5

Place Commands -> Type Quit -> Press Enter

Step 6

Place Commands -> FSMO Maintenance -> type transfer schema master -> Press Enter

type transfer naming master -> Press Enter

type transfer rid master -> Press Enter

type transfer infrastructure master -> Press Enter

type transfer pcd -> Press Enter

Step 7

Place Commands -> Exit FSMO Maintenance -> type Quit -> Press Enter

Step 8

Place Commands ->  Exit ntdsutil -> type Quit -> Press Enter

Table 3: Roles replacement procedure (FSMO)

AD Backup and Recovery

The appropriate structure of restoration and management has to be done through direct analysis and application for the systematic preferences. The restoration process that has been stated above needs to be directly related with the replication of data procedure that also been stated above. This integrated measure would help OW associate proper system for data recovery through backup of the Active Directory services related with the operational systems of the network. The full backup structure and other 14 stages of incremented backup are followed through Windows server 2016 automatic services.

Group Policy

Requirement of Group Policy

Group Policy is highly necessary to be staged and processed on many levels for the various operations to be performed by Windows. The designing and structural assessment of the relative group policy and administration has to be related with direct in-depth determination for a regulatory structure by the systems of the organization. A group policy is highly necessary to be considered through necessary structure and analysis for the considerations of connectivity, security data processing, and other aspects like private application of data management and determination of enhanced security to data from departments like Finance. The group policy structure needs to be applied through directed monitoring of the new network structure after its implementation with the aid of the Windows Server 2016.

Settings to be considered via Group Policy

The major setting of the group policy needs to be directed through approach and assessment for the relative management and consideration for proper directed assessment and analysis of group structure for the operating system within the use of the implemented server systems. The separate assessments are required to be made for both the branches in Huston and Richmond. The number of employees working for the systems is also required to be assessed for the proper set up of office policy for Operating Windows. The main priority needs to be the assessment and analysis of the security provided to the office and customer data while maintaining the right amount of transparency necessary for smooth operations.

Windows Server Features

WAP utilization

            The specific utilization of Web Application Proxy can be determined through direct operation and access through the network with a secure structure for both wired and wireless services. The consideration of proper two-stage firewall application has already been presented within the structure of operations through the directed application of the distribution systems of the network link and secure operational connectivity through the necessary integrated systems (Vehniä, 2020). The secure structure has to be related through direct application and assessment of the directions. The designing of the network has been related through direct application and development of the security operations that are highly necessary for the network systems and their implications.

Conclusion

This document provides the detailed Windows Network Services Proposal for the operations of Opening Windows through direct assessment and analysis of the structural key to determining how the new system would be staged for the organization. The direct development is necessary to be administered through appropriate considerations of Active Directory updated that are necessary. The document contains a proper analysis of the designs that are necessary for each of the branch’s networks. The application is related to be directed through proper operation and capable structure of the network enhancement with the help of Active Directory. The consideration of the Windows Server 2016 has been directed efficiently.

References

Books

Francis, D. (2019). Mastering Active Directory: Deploy and Secure Infrastructures with Active Directory, Windows Server 2016, and PowerShell. Birmingham: Packt Publishing Ltd.

Stefanovic, V., & Kranjac, S. (2019). Identity with Windows Server 2016: Microsoft 70-742 MCSA Exam Guide: Deploy, configure, and troubleshoot identity services and Group Policy in Windows Server 2016. Birmingham: Packt Publishing Ltd.

Journals

Jones, J., Wimmer, H., & Haddad, R. J. (2019, April). PPTP VPN: An Analysis of the Effects of a DDoS Attack. In 2019 SoutheastCon (pp. 1-6). IEEE.

Shin, B. (2019). Security enhancement in defense information system by active directory (Doctoral dissertation, University of Delaware).

Catrinescu, V., & Seward, T. (2019). Configuring the User Profile Service. In Deploying SharePoint 2019 (pp. 187-211). Apress, Berkeley, CA.

Vehniä, V. J. (2020). Implementing Azure Active Directory Integration with an Existing Cloud Service.

No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free

New Special Offer

Get 25% Off

best-assignment-experts-review

Call Back