Professional Documents
Culture Documents
PROJECT PLAN
Date: 04/22/2020
Samantha Hernandez
samhern1@uat.edu
1|Page
Executive Summary
Project Report
All assignments plus a logical network diagram, timeline and a labor cost table
2|Page
Introduction
The following report was designed for use in the University of Advancing Technology
NTW216 Foundations of System Administration class within the network engineering degree
path. The objectives of this project are understanding the steps for installing and configuring
demand, building effective proposals, learning how businesses submit requirements, discuss the
thought processes and hurdles for the project. The complete proposal will successfully cover all
the enterprise work orders that have been submitted for detailed work on the network.
Windows Server 2016 was chosen as the primary operating system for the Lab Rats
infrastructure due to its ability and reliability in the market. After observing all the quality
features of the rest of the OSs’ like Windows Server 2008, 2012 RS and 2019, 2016 came on top
due to the requirements needed for the company. Choosing Windows Server 2016 over Windows
Server 2019 was due partially to my knowledge of the amount of issues that newer OSs always
encounter after their release to the public that end up needing vast amount of software updates to
fix them. On the other hand, the semi newer option of Windows Server 2016 would not have
those problems due to it being in the market for quite some years, allowing it to in a sense mature
and be stable due to it having all of its required software updates to avoid any issues to arise only
needing newer feature updates. Lab Rats Inc requirements for the OS can be easily met with the
3|Page
many sophisticated features of 2016. Its fully and partially supported features are listed below:
4|Page
Visual Studio Code Yes
.NET Core Yes
adequate option for your business client. The budget of your client is very well an important key
factor when building a plan for them. A quick comparison of prices between the Windows Server
Standard 2012 R2 and the Windows Server Standard 2016, 2016 does come in slightly costing
about 4 more dollars than 2012. The biggest differences come down to the quantity of licenses
that comes with that price which is eight for 2016 and only one for 2012. Below is a quick
Table 2. Windows Server Standard 2016 & Windows Server Standard 2012 R2 Price
Comparison
Screenshots
5|Page
Figure 3.WS 2016 Installation Process. Figure 4. Windows Server 2016 Running.
Web Services
6|Page
Figure 8. Server Roles. Figure 9. Roles Services.
Deployment of the Web Services for the Lab Rats Inc company is a necessary in
order to meet the customers’ needs within the business network. The process to set up the Web
Services happens within the Server Manager through the Windows Server 2016 Standard
operating system. The first step would be to open the Server Manager, if it doesn’t automatically
open at initial boot-up and click on Add Roles and Features in the top-middle of the screen. The
next step would be to select the Role-based or Feature-based Installation option and click next to
proceed. Then, selecting the correct server which should be the local server that is chosen by
default and clicking next to continue. Within the server roles, enable Web Server (IIS) and
clicking next as well. In the additional features, continue by clicking next since no other features
are needed to install the Web Adaptor and click next. Within the Web Server Role (IIS) dialog
7|Page
box continue through by clicking next as well. Getting to the Select Role Services dialog box,
enable these components: Default Document, Static Content, Request Filtering, Basic
ASP.NET 4.6, ASP.NET, ISAPI Extensions, ISAPI Filters, WebSocket Protocol, IIS
Management Console, IIS 6 Management Compatibility, IIS Management Scripts and Tools, and
Management Service. After selecting those listed components, verify the selections are correct
and click Install. Finally, once the installation is completed, click close.
Domain Services
The benefits of utilizing Active Dictionary in a Windows Server are centralized resources
and security administration, single logon for access to global company resources, and a
8|Page
simplified resource location (Intelecis, 2018). An Active Directory allows an administrator to go
to one spot to manage and secure network components for their organization. As well as ensuring
the implemented company policies of security, network and resources are properly enforced
The process to deploy the Active Directory also happens within the Server Manager
found within the Windows Server 2016. As predicted the first step would be to open the Server
Manager, if not already opened, and click on Add Roles and Features. The next step would be to
select the Role-based or Feature-based Installation option and click next. Then would follow to
select the server which typical would be your local server that is first in the list and click next.
9|Page
Within the Select Server Roles, enable the Active Directory Domain Services option and click
next. In the Add Roles and Features Wizards dialog box, click Add Features. Within the Features
section, proceed to click next as no additional features are necessary. In the Active Directory
Domain Services, click next to continue. At the Confirmation Window, review the selected
features and click Install. Once the installation is complete, click on the Promote This Server to a
Domain Controller hyperlink in the results box. Within the Deployment Configuration dialog
box, select the Add a New Forest option then type in a domain name of your choice and click
next. Proceed to type in a unique password of your choice as well that follows the set guideline
and click next. In the DNS Options, Additional Options, Paths Sections and Review Options,
click next to proceed. Once the Prerequisites Check is completed, click Install. After the
installation is completed the server will automatically reboot. After reboot, login with your
created credentials and within the Server Manager, click on Tools, then Active Directory Users
and Computers. Finally, within the Active Directory Users and Computers dialog box, expand
the domain root and click on Domain Controllers, which should display your new server.
Ensuring the Administrator account is active and has a password set is critical when it
comes to the server configuration. Within the Server Manager, click on Tools and then Active
Directory Users and Computers. The next step would be to look for your Domain Name, you
10 | P a g e
created and expand the domain root selection. Within the domain root selection, click on Users,
then click on the Administrator account. Type in your name and when prompted, create a unique
password of your choice then click Apply. Finally click close to exit the window. Returning back
to the Sever Manager home page, click on Local Server. Within the window, ensure the RAM is
2GB and the Hard Disk Space is at least 30GB. Finally, exit out as you have completed the
3. In the NIC Teaming window, Locate the Adapters and Interfaces section.
4. Click on the Network Adapters tab, right click on the selected adapter, and click Add
to New Team.
11 | P a g e
Figure 20. Add to New Team
5. In the NIC Teaming dialog box, type in a unique Team Name and click on
Additional properties.
6. For Teaming mode, select Switch Independent; Load balancing mode, select
12 | P a g e
2. Click on Settings.
13 | P a g e
Figure 24. Adding NICs.
5. Select the Custom: Specific virtual network and select your unique network name.
6. Click Ok.
3. Click Add to <Team Name>, the unique name you created for your team.
1. Locate and click on your Windows/Microsoft logo at the bottom of your screen.
2. Click on Settings.
3. Click on Network.
5. The result should be your NIC Team Name displayed within your network diagram.
14 | P a g e
Figure 26.NIC Check & Test. Figure 27. Team Created.
File System
The new file system configuration will meet the needs of the organization by being
selective of who can manage which files depending on their department. Only certain folders and
files should be available to the specific departments group for security purposes. Allowing the
managers of each department to have full control over the files is essential due to given them the
rights to control their department virtually as well. On the other hand, allowing limited
customization to the users within that department enhances the security within the department of
protecting its documents to ensure they are not formatted differently. Setting up permissions
within a server to adequately separate or distribute documents adds a security protection to the
15 | P a g e
Figure 29. New Hard Disk.
Creating a new disk happens within the Hyper Vision VM settings. First right click on the
selected VM of your choice and select “Settings”. Then, click on “Hard Disk (SCSI)” and click
“Add Device”. Click on the icon labeled “New Hard Disk” and within the configuration set the
disk space at 60 GB. After click on the “Advanced options” and uncheck the “Split into multiple
files” box. Finally, click “Apply” as the disk has been created successfully.
16 | P a g e
Figure 31. Initializing Disk. Figure 32. New Simple Volume Wizard.
Setting up the disk happens within the Server Manager application. First click on “Tools”
located on the top right hand of your screen and select “Computer Management”. Then, click on
“Disk Management” and right click on the new disk and select the “Online” option. Right-click
on the new disk and select “Initialize Disk”, click “Ok”. Once again, right click on the storage
space of the new disk and select “New Simple Volume”, click “Next”. In the Specify Volume
Size, Assign Drive Letter & Format Partition section, click “Next”. Finally, in the Complete the
17 | P a g e
Creating Users & Groups
Creating groups happens within the server manager application. First, click on “Tools”,
select “Active Directory Users and Computers”. Click on “Users” on you left side of the dialog
box. Right click on the empty space and hover over “New” and click on “Group”. Next, type in
the desired group name, in group scope select “Domain Local” and in group type select
Creating users happens within the server manager application. First, right click on the
empty space within the “User” tab. Hover over “New” and select “User” and type in the desired
18 | P a g e
username. Next, click “Next” and type in a unique password, click “Finish”. Repeat this process
Adding users to groups happens in the Active Directory Users and Groups section within
the server manager application. First, right click on the desired group needed and click on
“Properties”. Click on the “Member” tab and click “Add”. Next, click on “Advanced” and select
the “Find Now” option. Finally, select a user and its corresponding manager previously created
and click “Ok”. Repeat this process when adding users to different groups.
Creating Files
19 | P a g e
Creating files happens in the File Explorer located in the main menu. First. Click on the
File Explorer icon at the bottom of the screen. Click on “This PC” located in the left side of your
screen and select the (E:) Drive which was the one you created previously. Next, right click in
the empty space and hover over “New” and select on “Folder”. Finally, type in a desired name
for the folder according to your needs. Repeat this process when creating folders in the
drive/disk.
File Permissions
20 | P a g e
Modifying file permissions happens in the File Explorer located in the main menu. First,
right click on desired file and select “Properties”. Select the “Security” tab, click “Advanced”
and click on “Add”. Next, click on “Select a principal”, select “Advanced” and “Find Now”.
Select the corresponding group/users and click “Ok”. Finally, select the desired permissions for
the manager and individual user. Repeat this process for every file and its users/managers.
Quotas
Configuring the disk happens in the File Explorer located in the main menu. First, click
on the “Files Explorer” icon located at the bottom of your screen and select “This PC”. Right
click on the (E:) Drive and select “Properties”. Next, select the “Quota” tab and check the
“Enable quota management” box. Select the “Limit disk space to” option and type in “1GB” and
“100MB”. Finally, click on “Apply” and “Ok” as the process has been completed.
High Availability
High availability will meet the needs of the organization by installing Network Load
Balancing (NLB) Nodes. This will allow to minimize server problems dealing with connectivity
21 | P a g e
between the network. This will potentially increase the productivity within since it will allow the
adapters more capacity to property function. Responsiveness is always a key factor within a
network that is critical in a company with time limits on projects. Allowing less interruptions
throughout the network to create a steady flow. Administrators are able to monitor its health and
reliability throughout time since it is installed through the Server Manager application.
Installing the NLB Feature happens in the Server Manager application. First, click on
“Add Roles and Features” and continue selecting “Next” to get to the Features section. In the
Features section, select “Network Load Balancing”, click “Add Features” and select “Next”.
Once at the confirmation section, click “Install”. Finally, click “Close” once the installation is
completed.
22 | P a g e
Figure 49. NLB Manager. Figure 50. Adding New Cluster.
23 | P a g e
Figure 55. Created Cluster.
Creating an NBL cluster happens in the Network Load Balancing Manager application.
First, click on the “Network Load Balancing Manager” that is located in the main settings at the
bottom left of the screen. Right-click on “Network Load Balancing Clusters” and select “New
Cluster”. Within the “New Cluster: Connect” wizard, type in the name of your host and click
“Connect”. Once the connection is set, click “Next”. When prompted with the DHCP dialog box,
click “Ok”. In the prompt box of “Additional IPs”, click “Next” and when prompted with the
“No Dedicated IP Addresses”, click “Yes”. Next, in the “Add IP Addresses” section, type in an
IP Address of your choice and click “Ok” and “Next”. In the “Cluster Parameters” select your
preferred mode of Unicast, Multicast, or IGMP Multicast and click “Next”. Finally, in the “Port
Rules” section, add any ports that may be necessary and click “Finish”.
GPOs
The imposed GPO changes will meet the needs of the organization by implementing
changes for each computer/user located within the network of the Lab Rats Inc company. By
doing these changes with the Group Policy Management tool you ensure each user/computer
found in your network has implied these necessary changes, which ultimately saves time and
energy by allowing one change to be done to all other users within company structure. GPOs
24 | P a g e
allow the administrators to easily customize policies for a group of users to limit or expand their
one trusted web browser to be used throughout the company to minimize troubleshooting and
security occurrences.
Creating a new organizational unit (OU) happens within the Server Manager application.
First, click on “Tools” located on the top right hand of your screen and select “Group Policy
Management”. Then, expand your “Forest” and “Domains” and right click on the chosen domain
name. Next, click on “Create a GPO in this domain and Link it here…”. Finally, type in the
25 | P a g e
Going back to the Server Manager screen, click on “Tools” and select “Active Directory
Users and Computers”. Then, right-click on the domain name, hover over “New” and select
“Organizational Unit”. Finally, type in the desired name and click “Ok”.
Back to the Group Policy Management, right click on the previous created OU and select
“Link an Excising GPO”. Next, click on the created domain and click “Ok” as you are finished
creating an OU.
26 | P a g e
Figure 64. Windows Defender Setup. Figure 65. Computer Kiosk.
Figure 66. AD Users & Computers. Figure 67. User’s Member Of.
Before configuring the policies within the group policy management, giving your user
account the permission of two different important admins will allow you to configure the policies
needed with no problem. First within the Server Manager application, click on “Tools” and select
“Active Directory Users and Computers”. Next, click on “Users” and double click your named
user account. Select the “Member Of” tab and click “Add”. Type “Domain Admin” and
“Enterprise Admin”. Finally, click “Ok”, “Apply”, and “Ok” as you have given yourself god
access.
27 | P a g e
Configuring the policies happens within the Group Policy Management Editor, which
was opened from the Server Manager previously. In order to configure the password policy, right
click on the created policy and select “Edit”. Next, expand the “Computer Configuration”,
“Policies”, and “Windows Settings”. Click on “Security Settings”, “Account Policies”, and
“Password Policy”. Then, change each policy within listed to the adequate setting needed and
In order to configure the accounting departments wallpaper settings, expand the “User
“Desktop” and double click on “Desktop Wallpaper”. Then, select the option “Enable” and type
in the wallpaper path. Finally, change the “Wallpaper Style” to “Fill” and click “Apply” and
“Ok”
In order to configure the Google Chrome as the only web browser, open the “Internet
Explorer Web Browser” and the settings dialog box. Next, click on the “Security” tab and select
“Custom level...”. Select the “Enable” option and click “Ok”. Exit out the settings dialog box. In
the web browser engine, type “Google Support page” and click “Enter”. Then, download the
“policy template zip file” and click “Save” and “Show in Folder”. Right click on the
“policy_templates” folder and select “Extract All”. In the pop-up window, select the folder and
click “Extract”. Once extraction is finished, open up the “Windows” folder and the “admx”
folder. Right click on the “chrome.admx” file and select “Copy”. Open the “Run” window and
type “%systemroot%\PolicyDefinitions” and click “Ok”. Right click on the empty space and
select” Paste”. In the pop-up window, click “Continue”. Minimize the current window and in the
previous window, right click the “chrome.adml” file and select “Copy”. Open the “Run” window
28 | P a g e
space and select “Paste”. In the pop-up window, click “Continue”. Open the “Run” window and
type “gpedit.msc” and click “Ok”. Under the “Computer Configuration”, expand the
“Administrative Templates” and scroll down to look for the Google Chrome software as it has
In order to configure the anti-virus software within the organizations within the “Group
Policy Management Window”, expand “Group Policy Object” and right click on the GPO
previously created. Select “Edit” and within the “Computer Configuration” section, expand the
Then, click on “Windows Defender Antivirus” and select the “Custom User Interface”. Finally,
In order to configure the kiosk method, open the selected GPO to apply the settings to.
Under the “User Configuration” section, click on “Administrative Templates” and select
“System”. Next, double click on “Custom User Interface” and select the “Enable” option. Then,
in the interface file name box type in “c:\program files\internet explorer\iexplore.exe”. Finally,
click “Ok” and close the window as the kiosk has been set.
To configure the kiosk settings, within the “Computer Configuration” section, click on
“Administrative Templates”. Next, click on “Internet Explorer” and configure the settings
needed. Repeat this process for the User Configuration section as well.
29 | P a g e
Routing & Remote Access (RRAS)
Figure 68. Add Roles and Features. Figure 69. Remote Access Server.
Figure 72. Configure Remote Access. Figure 73. Enable Remote Access.
30 | P a g e
Figure 74. Configuration. Figure 75. Remote Access Service Setup.
Installing the Routing and Remote Access Server happens within the Server Manager
application. First, click on the “Add roles and features” and continue clicking “Next” until you
get to the “Server Roles” section. In the “Server Roles” section, select the “Remote Access”
option and click “Next”. Continue clicking “Next” until you get to the “Role Services” section.
Then, select the “DirectAccess and VPN (RAS)” option and click “Next”. Once at the
“Installation” section, click “Install”. In the “Configure Remote Access” window pop-up, select
the option that best suites the company or purpose. Once in the configuration window, right click
on your server and select “Configure and Enable Routing and Remote Access”. Next, select
“Custom Configuration” and “VPN Access”. Click “Next” and “Finish”. Continue by clicking
“Ok” on the pop-up window. Finally, click “Start Service” as the Remote Access feature is ready
to be put to use.
Kiosk
The implementation on the kiosk policy to allow the marketing department to go mobile
meaning they can access anything they are authorized to view on the go. Many businesses
worldwide have implemented this feature based on a mobile app where it has certain restrictions
31 | P a g e
and can be used worldwide when traveling outside the country. The cost to produce a mobile app
that would serve as a kiosk would be about a total of $3,440. This mean price budget includes all
the necessaries like management software, 24/7/365 technical support, installation, and an initial
project management fee of $300. Products that would comply with a full kiosk definition would
most likely be tablets and iPads since they are portable enough to take on the go when traveling,
especially in an airport setting. Keep in mind the more security implementation desired for the
In order for the Domain Controllers to not have a downtime, a redundant power source will
be required to be implemented. The Uninterruptible Power Supply (UPS) and generator system
would be a great option. Servers like the Domain Controller, which is one of the critical ones,
would have to be connected onto a UPS with separated power circuits to maximize the power
supply. Since UPS’s are usually used to provide temporary power for only certain minutes, that’s
when a generator would come into play to supply infinite power without a limit. To avoid any
possible downtime, the first defense would be most likely be two UPS to create a backup to the
backup. The next step towards defense would be the generator where these UPS would
potentially be connected to, to ensure power quality. Having many layers of defense towards
power supplies, decrease the possibility of downtime failure affecting the Domain Controllers in
a negative way. This will keep the company prepared of unplanned situations dealing with the
32 | P a g e
2. Employees must have complete and uninterrupted access to all corporate
documentation.
3. The Legal department has requested to have separate redundant storage capability
In order for employees to have complete and uninterrupted access, a backup system would be
needed to put in place. Although there are many types of backups like full, incremental,
differential, and mirror selecting the adequate system required intensive research to meet the
needs of the company. Incremental and cloud backups options would best fit the company needs
of storage and security. Incremental backups technically copy data from the files that had a
recent change done to them. This allows the company to run as many backups as needed. Backup
applications are great at keeping track of the last modification made on files. These types of
backups are completed at a fast speed and require a small amount of data. Cloud backups would
be used as a secondary backup to the incremental backup, a backup to the backup. Cloud
backups usually use a third-party service provider with a selection of different amounts of data
store capabilities. These backups would decrease the workload on IT staff which would equal out
the data charges for cloud storage. Backups and security go hand in hand since they have
protection features implemented within them to protect any data stored within them.
4. Customers and employees must not experience queuing issues when printing.
In order to avoid queuing issues when printing, use multiple printers connected to different
connectivity status and avoids overloading servers with multiple printing requests. Configuration
of printer locations is a great practice to avoid collisions between each printer within a server.
33 | P a g e
The Windows Active Directory is a great option to help manage the printers within a network as
well as maintaining them. Maintaining printers with their current software updates is a minor
In order for Dynamic addressing to be used for all client computers, Domain Name System
(DNS) and Dynamic Host Configuration Protocol (DHCP) services must be installed within your
network. The DNS and DHCP servers can be implemented and configured for all client
computers using the Windows Server 2016. IP addressing schemes can also be configured within
these servers to be applied to any client computers desired within your network base. IP
addressing schemes can facilitate having multiple connections to avoid overloading a single
connection to create a steady and unison flow of data along the company with no interruptions to
the network.
Drive
Acc.
Drive Drive
Updated Printer HR
Server Drive Drive
Drive Drive
NIC Teaming RRAS Main.
Drive Drive
34 | P a g e
Implementation Timeline
Ap ril 5 Ap ril 19
20 20 20 20
35 | P a g e
References
Microsoft. (2020, January 1). Compare features in Windows Server versions. Retrieved from
https://archive.is/DjnCI
https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=2ahUKEwiSjZri4L3oAhUNnq0KH
fmeAkgQFjALegQIBhAB&url=http%3A%2F%2Fdownload.microsoft.com
%2Fdownload%2Fe%2F6%2F4%2Fe64f72bf-55e9-4d85-9efe-
39605d7ce272%2Fwindowsserver2016-licensing-
guide.pdf&usg=AOvVaw18AKSA5OcZFRAO-s-96tMO
ArcGIS Enterprise. (2019, December 27). Enabling IIS and required IIS components on
adaptor/latest/install/iis/enable-iis-2016-components-server.htm
Intelecis. (2018, August 17). Benefits of active directory domain services. Retrieved from
https://www.intelecis.com/benefits-of-active-directory-domain-services/
PC Addicts. (2016, January 18). Setup active directory on Windows Server 2016. Retrieved
from https://pc-addicts.com/setup-active-directory-server-2016/
Intel. (2020, January 28). Setting up NIC teaming for Windows Server 2012*/2012
https://www.intel.com/content/www/us/en/support/articles/000022706/network-and-i-
o/ethernet-products.html
Rich, D. (2020, January 22). Understand and learn how to build a NIC team in Windows Server.
https://synchronic.uat.edu/courses/3100/files/folder/HOWTO%20Videos?
Panek, W. (2018). MCSA Windows Server 2016 complete study guide: Exam 70-740, exam 70-
Brinkmann, M. (2015, April 1). How to install chrome policy templates on Windows machines.
templates-on-windows-machines/
Computerwurld. (2018, June 6). How to Install Chrome Group Policy Templates. Retrieved
from https://www.youtube.com/watch?v=t-c8-j0myMo
Graber, J. (2018, March 20). Internet explorer on Windows Server: Enable file downloads.
server-enable-file-downloads/
Letsielo. (2009, August 18). Enforcing kiosk mode via GPO or other methods. Retrieved from
https://social.technet.microsoft.com/Forums/lync/en-US/207ef293-2a5c-461a-aafb-
630caacd3d56/enforcing-kiosk-mode-via-gpo-or-other-methods?forum=winserverGP
Microsoft. (2018, September 3). Configure Windows defender antivirus with group policy -
us/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-
windows-defender-antivirus
Castagna, Crocetti & Sullivan. (2019, July 3). What is cloud backup and how does it work?.
Fellows & Crocetti, R. P. (2019, July 17). Types of backup explained: Full, incremental,
37 | P a g e
https://searchdatabackup.techtarget.com/feature/Full-incremental-or-differential-How-
to-choose-the-correct-backup-type
Lowe, S. (2002, April 22). Server room power: Plan for redundancy and flexibility. Retrieved
from https://www.zdnet.com/article/server-room-power-plan-for-redundancy-and-
flexibility/
PaperCut. (2020, January 1). Tips for managing printers and reducing printing costs. Retrieved
from
https://www.papercut.com/kb/Main/TipsForManagingPrintersAndReducingPrintingCost
38 | P a g e