Deliverable Length: Word document of 2–4 pages, APA format (excludes APA cover page and abstract; include reference page as applicable) Rough Country Miles of Alaska (RCM) is a teardrop snowshoe manufacturer (worn by lumberjacks) that has contacted you to install Windows Server 2012 R2 and Active Directory. It owns the RoughCountryMiles.com domain name. It has 300 users, equally dispersed in three locations: Anchorage, Juneau, and Fairbanks. Anchorage is the headquarters, while the Fairbanks office handles the Northern Alaskan region, and the Juneau office is in charge of the Southern Alaskan region. The security policies, such as password length and account lockout, are more laidback in Juneau than in Fairbanks. The company headquarters establishes financial goals and general operations policy, but it allows some regional operational autonomy. Within corporate headquarters are the following business units: Within the two regional offices are the following business units: The chief information officer (CIO) would like to delegate the ability to manage users and groups to the business unit level, without delegating control over security policies. The three locations are joined by communications lines that are 80% saturated from 8 a.m. to 5 p.m.

Introduction

Rough Country Miles of Alaska (RCM) is a teardrop snowshoe manufacturer that has approached us to install Windows Server 2012 R2 and Active Directory. The company, which owns the RoughCountryMiles.com domain name, has 300 users spread across three locations: Anchorage, Juneau, and Fairbanks. Anchorage serves as the headquarters, while Fairbanks and Juneau oversee the Northern and Southern Alaskan regions, respectively. As RCM operates in different locations, it is important to design a security policy that caters to the unique needs and requirements of each region.

Organizational Structure and Business Units

Within corporate headquarters, RCM consists of several business units with distinct responsibilities. These include manufacturing, research and development, sales and marketing, and finance. Each business unit is led by a manager who oversees the activities and operations within their respective units.

The two regional offices, Fairbanks and Juneau, also have their own business units. These units are responsible for managing the specific operations and functions within their respective regions. This decentralized structure allows for greater flexibility and autonomy in decision-making at the regional level, while the headquarters maintains control over overall strategies and policies.

Delegation of User and Group Management

The CIO of RCM has expressed the need to delegate user and group management to the business unit level while maintaining control over security policies. This delegation of authority provides the business units with the responsibility to manage the users and groups within their units, such as creating and deleting user accounts, assigning permissions, and managing group membership.

To achieve this, we will need to implement a role-based access control (RBAC) model within Active Directory. RBAC allows for the assignment of specific roles to users or groups, granting them the necessary permissions to perform their designated tasks. For example, the manager of the sales and marketing unit would be assigned the role of “Sales Manager,” which would grant them the authority to manage user accounts and groups within their unit.

Different Security Policies for Each Location

RCM operates in three different locations, each with its own set of requirements and security policies. While the headquarters establishes the general security policies, it allows some regional operational autonomy. Therefore, the security policies in Juneau are more laidback compared to those in Fairbanks.

It is essential to ensure that the security policies align with the needs and regulations specific to each location. For instance, password length and complexity requirements may be more relaxed in Juneau, while Fairbanks may require stricter controls due to the nature of their operations. This tailored approach to security policies will help ensure that RCM meets both regulatory and operational requirements while maintaining a consistent level of security across the organization.

Network Infrastructure and Communication Lines

RCM’s three locations are connected by communication lines that experience 80% saturation from 8 a.m. to 5 p.m. These communication lines play a crucial role in facilitating the exchange of information and data across the organization. As such, it is important to design a network infrastructure that can handle the increased traffic during peak hours and ensure smooth communication between the locations.

Conclusion

In conclusion, the installation of Windows Server 2012 R2 and Active Directory for RCM provides an opportunity to design a secure and efficient network infrastructure that caters to the needs of each location. By delegating user and group management to the business unit level and tailoring security policies to each location, RCM can achieve operational autonomy while maintaining overall control. Additionally, implementing a robust network infrastructure will ensure smooth communication and data exchange between the headquarters and regional offices.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer