Here is the synopsis of our sample research paper on Organize Users Into Groups In Active Directory. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This 3 page paper considers the way in which a company may choose to organize users into groups when implementing Microsoft Active Directory. The paper discusses the different types of groups and how their scopes and characteristics. The bibliography cites 6 sources.
Page Count:
3 pages (~225 words per page)
File: TS14_TEADuser.rtf
Buy This Term Paper »
 
Unformatted sample text from the term paper:
the scopes available in Windows. Groups can be perceived as containers which hold members which may be users as well as computer objects. An important consideration will be that
of security. When a group is set up there will be a security permission level set in the Access Control List. All members of a particular group will receive the
same security setting, meaning that they will all have the same level of permission to access resources. Centralised administration is facilitated with the use of Domain groups. The domain controller
is used for the creation of all domain groups (Microsoft, 2002). Where there is a domain Microsoft Active Directory facilitates the creation of various groups as well as
different group scopes. The type of group will determine the kind of tasks that can be managed within the group (Microsoft, 2003, 2002). The scope of the group
will establish whether there can be members from multiple domains, or is members are limited to a single domain. In the case of Riordan with offices in several locations including
China there is likely to be some benefit to allow groups to include members from more than a single domain. Riordans implementing is suggested as taking place with the use
of four sub-domains for the different offices. Users need to be placed into different group types. There are two group types that need to be considered in terms of
the way users are assigned to groups, the two group types of security and distribution (Richards et al, 2006). Security groups will need to be determined by reference to seniority
and the need for access to resources and data, different users may need access to differing resources, therefore, members will need to allocated to groups depending on what information and
...