Sunday, May 19, 2019

Kris Corporation Information Technology Proposal Essay

creese mickle Information engineering ProposalIntroductionInformation Technology Proposal crinkle Corporation is a prominent high society that deal with manufacturing parts utilized by the automotive industry. The governances dynamical-Domain infrastructure comprises of two main sphere of influences. The p bent humans is kris.local and the child scope is corp.kris.local. The AD infrastructure of the organization is running on legion 2008. The follow has five set completees located in five cities namely, Chicago (IL), Balti more(prenominal) (MD), battle of Atlanta (GA), Seattle (WA) and San Diego (CA). Its manufacturing plants are located in Seattle and Atlanta. Recently, the company has developed a matter of concerns relating to its information system. First, the crapper is concerned about adopting multiple subject fields in its information systems. Secondly, some automobile manufacturing companies switch approached the mess and requested it to handling a wholeness identity in the accomplish of procuring orders. Kris Corporation is likewise concerned with disaster recovery of its systems and physical space of innkeepers especially at the Atlanta branch since it is the potfuls headquarter. File sharing is also a big concern to the company since the locations are connected to the internet independently. This proposal foc physical exertions on identifying and analyzing variant changes in the information engineering department of the company and developing solution recommendations for information technology problems experienced by the company. The proposal will discuss various benefits the corporation will acquire from updating and changing the current information systems to the modern systems.Active Directory Kris Corporation should adopt the new windows server 2012 in its information systems due to the pursuance reasons. First, the server has the freedom to choose the interface. This means that by installing the Server Core it will prov e security and procedure advantage. In addition, it has a feature that allows champion to switch it on or off. Secondly, the server manager is a multi-server making it easy to deploy features and roles to physical and realistic server. It also makes easy to merge servers that bed be managed together hence, easing the administration of servers (Snover, 2012). Thirdly, Windows Server 2012 provides a Dynamic Access Control (DAC) which helps to create more centralized security models for entree to the interlocking. This is done by tagging the sensitive data both, manually and automatically on the basis of creator of the files and the content of the files. In addition, Windows Server 2012 induct a large storage spaces, a new feature that allow the usage of inexpensive hard drives to create a storage which fire be subdivided into spaces as those used on physical disk. Window Server 2012 also possesses Hyper V breeding administrator which replicates their Hyper- Virtual machine fr om Hyper v host at a primary site to some other Hyper-V host at the replica site. This feature has the advantage of lowering the cost of ownership in an organization by providing workload agonistic and storage- agonistic solution which replicates powerfully, efficiently and periodically over IP-based network within or across various storage subsystems and across all sites. The major benefit of Hyper-V Replica is that virtual machine can easily replicate in distinct locations for higher protection and to ensure availability. Window server 2012 also possesses Direct Access, which works with IPv4 that do non require conversion of technologies and switching off the server that are running. Direct rile version of 2012 server is easier to configure too. The window server 2012 has remote Desktop Service that provides the ability to view as and centralize the exertions and data that the employees need t work on from variety of machines or contrivances making it easy to work anywhe re as long as you access a device. It also set ups that control and compliance are met strictly. Lastly windows server 2012 has a simplified licensing. Microsoft have worked on the complexity involves in finding the right edition and cost. Window server 2012 has only quartette editions datacenter standard essential and the foundation. These editions are authorize as per crook of user for the instance foundation is licensed for 15 while essential 25. Adoption and acquiring of the server depends on the size of the company and hence moving ahead buying the right edition. For the case of the Kris Company, the ideal edition is Window Server 2012 R2 Essential which is the best for cloud-connected first server. The Domain model that a company uses determine its effectiveness and displaces its performance. In the selection of the appropriate kingdom model to use, the company should consider a occur of factors that may affect the selected Domain model. First, the company must conside r the amount of the capacity available on the network allocated to Active Directory Domain service. The company should choose a model with maximum efficiency in replicating information with batty effects on the network bandwidth. Secondly, the company must consider the number of users. A company should use more than one domain where the number of users is large. The corporation should migrate to a wholeness domain and scourge the multi-domain model. The wiz domain is the simplest domain design that a company can use effectively. Unlike in other domain designs, there is replication of all information to all domain controllers. Secondly, single domain design minimizes the number of deployed domains in the forest. Minimizing the number of domains burns the complexity of the application. Consequently, the total cost of ownership is reduced. Any domain controller in the single domain model can effectively authenticate a domain user in the forest. In the single domain model, all doma in controllers in a companys system can be developed to be global catalogs. This will enable the corporation to use the single identity in order procurement processes from automobile manufacturers. Lastly, the corporation should deploy the single domain model since all data can be replicated to all its geographical locations hosting domain controllers (Windows Server, 2015). undivided sign-on is a part of the modern technology where users use locally logged on credentials when connecting to hosted desktops and Remote Apps. The technology that provides the single sign-on is Windows Server 2012. Windows Server 2012 enables users to log in without employ multiple certificates and without any prompts in credentials. It is such(prenominal) easier to configure single sign-on (SSO) into the Windows Server 2012 than in other servers. The administrator needs to enter the qualified domain name with a prefix TERMSRV to the server data of the Credentials Delegation Group Policy setting. The champion Sign-On can also be configured by adding the Remote Desktop Gateway (RD Gateway). Thirdly, the Single Sign-On can be configured utilize the command line. Click Start, then click Run and fictional character cmd. Open the Enterprise Single Sign-On directory for installation and type ssomanage-enablesso to enable the SSO (Termserv, 2012).DNS A DNS server is any data processor that is allowed to join the DNS. The server is responsible for running a special purpose networking software. The DNS server should reside in Seattle. Although Atlanta is the corporations headquarter, the location has limited space and a large number of staffs. The corporation should ensure that the DNS server reside in Seattle where there is adequate space. Secondly, there are manufacturing plants in Seattle thus it is appropriate to set up the DNS server. The IT staff should be relocated to Seattle for effective management of DNS server and IT systems. DNS is one of the important components in any n etworking system. Therefore, it is important to secure the DNS from attackers and other risks. There are a number of risks that may attack the DNS. These include DNS cache poisoning, distributed denial of service (DDoS), denial of service, reflected attacks, fast flux and brooding amplification DoS. There are various DNS security techniques and procedure that are used to protect the DNS servers. First, a latest and updated DNS server and software versions should be used. For instance, Windows Server 2012 provides more DNS protection than other servers. The Windows Server 2012 prevents attacks using security loopholes. Secondly, a freeware such as ZoneCheck can be used to check the configuration and varan external networks. Deploying a DNS security (DNSSEC) protocol based is also a viable solution to DNS security. A DNSSEC reduces the risk of DNS cache poisoning and other DNS attacks.DHCP Dynamic Host configuration Protocol (DHCP) is a server or client protocol that automatically p rovides an internet protocol host with IP address. The purpose of using DHCP in window server 2012 is that it reduces the administrative tasks and the configuring the host network complexity such as, private intranet. DHCP automates the process of configuring the IP and TCP of the client. DHCP offer tide over on DNS registration enhancements. This means that one can use HDCP policies to configure conditions on qualified domain name of DHCP client and also register workgroup computer as a knob DNS suffix. DHCP also support PowerShell DHCP server which is the task oriented for DHCP server management. Window PowerShell uses quarry pipelining to ease the need for parsing and alteration of test output. This window PowerShell for DHCP has got 103 cmdlets which cover multiple aspects of DHCP server configuration and management. another(prenominal) role of DHCP is to introduce a new policy based on IP address assignment feature. This allows the administrator to group DHCP client by spec ific tasks on fields and boost the administrator control over configuration parameters brought forth to the network device. DHCP policy enables flexibility while dealing with multiple device types, multiple roles, and virtualization. Consequently, it is important to Kris Company to consider DHCP for management of various task and device for easier access and to avoid duplication of tasks hence, lower cost of administration. The tracking of DHCP is done using IPAM (IP Address Management) that enable IP tracking done correlation of DHCP lease happenings on managed DHCP servers with user and computer authentication happening or events on managed domain controller. The IP address tracking by use of IPAM occur using the following parameters tracking by IP address (IPV4), tracking by hostname, tracking by username, and tracking by client ID (TechNet, 2015).Hyper-V. Hyper- V is an interesting feature in Windows servers. Consultants and system integrators say that hyper-v is a promising an d effective virtualization platform. The features have both advantages and disadvantages. Hyper-V is an incorporative and important feature to clients using the Windows Server 2008 or 2012. Clients save on licensing costs while using hyper- v rather than other virtualization platforms. Secondly, Microsoft provides better support for the server application running on Hyper-V as opposed to other virtualization platforms. Hyper- V provides an option of consolidating multiple physical servers into comparatively fewer servers. Machines running the Hyper-V platforms are more effective and faster as compared to machines running other virtualization platforms. Therefore, Hyper- V is effective and fast. Hyper V improves utilization and access to key resources such as networking, disk, and video when running lymph node operation systems. It is easier to deploy and manage the Hyper-V application than other virtualization platforms. However, the application is only limited to only 64 bit syst ems using the Windows Servers. Therefore, users with other systems such as Linux cannot use it. Secondly, the platform may be congenial with some devices using Windows Servers 2008, and others may not be incompatible. Therefore, a test for compatibility is necessary to devices. Hyper- V does not require clustering because it is a cluster aware application, and Windows Server 2008 provides a host clustering support for Hyper V virtualized made machines. Kris Corporation can leverage various features of Hyper-V. First, Hyper-V has Access Control through authorization manager that will enable the corporation to create custom roles to allocate or substitute activities within Hyper- V. The corporation will also benefit from improved VM performance provided Hyper-V. The application also has guest OS support where it supports both 64-bit and 32-bit virtual machines operating on different operating systems. Large number of users in the corporation can utilize the application since it sup ports a large number of users. The application provides support for virtual networking for systems in different locations thus enabling users within the corporation to communicate easily.Security The Kris Corporation can improve its networking by practicing transparent caching on the client computer for shared tract and reducing the duration required for accessing files. This involves protocol enhancement that do away with multiple and redundant network operations when saving or opening folders. Secondly, the corporation should carry out background synchronization capabilities for offline file, reduce management overhead and supporting the end-user experience (Windows, 2015). In conclusion, the Kris Corporation should migrate to 2012 AD since the server provides better services to its activities than the Windows Server 2008. The 2012 AD is faster, safer and incorporates more systems than the 2008 AD. The corporation should also migrate to the single domain. The single domain enables users in different geographic locations to receive the same information and be connected with each other. Single domain will enable the corporation to have a single identity in procuring orders from automotive manufacturing companies. The single sign-on can be effectively provided by the Windows Server 2012. The DNS server of should reside in Seattle because it has adequate space and a manufacturing plant is located in Seattle. The IT staff located in Atlanta should be relocated to Seattle to effective manage the DNS server and manage the corporations IT systems. These staffs will also allow other staff to work effectively in Atlanta. The DHCP fault tolerance in the corporation will be implemented to improve tracking of IP address automatically. The DHCP addresses can be introduce by username, ID, and IP. Implanting Hyper-V will enable the Kris Corporation to have effective virtual connectivity among users in different locations. Lastly, the corporation can improve networking capa bilities of security and file sharing through transparent caching and reducing time.ReferencesSnover J. (2012). Windows Server 2012 Remote Desktop Services (RDS). Window Server Blog. Retrieved from http//blogs.technet.com/b/windowsserver/archive/2012/05/09/windows-server-2012-remote-desktop-services-rds.aspxWindows Server (2015). Reviewing the Domain Models. Retrieved from https//technet.microsoft.com/en-us/ program library/cc731718%28v=ws.10%29.aspxDeuby S. (2013). 7 More Reasons to Upgrade to Windows Server 2012 Active Directory. Windows IT Pro. Retrieved from http//windowsitpro.com/identity-management/7-more-reasons-upgrade-windows-server-2012-active-directoryTermserv (2012). Remote Desktop Web Access single sign-on now easier to enable in Windows Server 2012. Remote Desktop Services Blog. Retrieved from http//blogs.msdn.com/b/rds/archive/2012/06/25/remote-desktop-web-access-single-sign-on-now-easier-to-enable-in-windows-server-2012.aspxTechNet (2015). IP Address Tracking. Retrie ved from https//technet.microsoft.com/en-us/library/jj878332.aspxWindows (2015). File Sharing and Offline Files Enhancements. Retrieved from https//technet.microsoft.com/en-us/library/dd637828%28v=ws.10%29.aspxSource document

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.