You are on page 1of 38

LAB RATS INC.

PROJECT PLAN

Project Final Project

Date: 04/22/2020

This Report was prepared by:

Samantha Hernandez

samhern1@uat.edu

1|Page
Executive Summary

Introduction to the report


Combination of each assignment for a final large proposal

Project Report
All assignments plus a logical network diagram, timeline and a labor cost table

References for the report


Shown in last two pages

2|Page
Introduction
The following report was designed for use in the University of Advancing Technology

NTW216 Foundations of System Administration class within the network engineering degree

path. The objectives of this project are understanding the steps for installing and configuring

active directory, troubleshooting and planning, communicating effectively, meeting customer

demand, building effective proposals, learning how businesses submit requirements, discuss the

thought processes and hurdles for the project. The complete proposal will successfully cover all

the enterprise work orders that have been submitted for detailed work on the network.

Completed Work Orders


Operating System
Windows Server 2016

Windows Server 2016 was chosen as the primary operating system for the Lab Rats

infrastructure due to its ability and reliability in the market. After observing all the quality

features of the rest of the OSs’ like Windows Server 2008, 2012 RS and 2019, 2016 came on top

due to the requirements needed for the company. Choosing Windows Server 2016 over Windows

Server 2019 was due partially to my knowledge of the amount of issues that newer OSs always

encounter after their release to the public that end up needing vast amount of software updates to

fix them. On the other hand, the semi newer option of Windows Server 2016 would not have

those problems due to it being in the market for quite some years, allowing it to in a sense mature

and be stable due to it having all of its required software updates to avoid any issues to arise only

needing newer feature updates. Lab Rats Inc requirements for the OS can be easily met with the

3|Page
many sophisticated features of 2016. Its fully and partially supported features are listed below:

Table 1. Windows Server 2016 Features & Support Status

Feature Name Service Partially Fully


Supported Supported
Synchronizing file servers to Azure File Services Yes
VM protection Yes
Unified management Yes
Storage Spaces Storage Yes
Enhanced Storage Spaces Direct (S2D) Yes
Mirror-accelerated parity Yes
Storage class memory Storage Yes
Storage Replica Storage Yes
Storage Quality of Service (QoS) Storage Yes
Data deduplication Storage Yes
Virtual machine storage resiliency Storage Yes
Cloud Witness Storage Yes
Storage health monitoring Storage Yes
Cluster OS rolling upgrade Clustering Yes
Mixed OS mode cluster Clustering Yes
Site-aware failover clusters Clustering Yes
Linux and FreeBSD workloads Multi-processors Yes
Hot add and remove for disk, memory, and network RAM Yes
Network controller Yes
Virtual networking Yes
Software load balancer (SLB) Yes
Distributed firewall and micro-segmentation Web Services Yes
Hybrid SDN gateways Web Services Yes
Converged RDMA Yes
HTTP/2 Web Services Yes
IP address management (IPAM) and DNS DNS & DHCP Yes
MultiPoint services role Multi-Processors Yes
High-availability RDS connection broker Yes
SDN with IPv4/IPv6 Yes
Shielded VMs for Windows Yes
Just-enough administration Yes
Just-in-time administration Yes
Credential guard Yes
Control flow guard Yes
Remote credential guard Yes
Device guard (code integrity) Yes
Dynamic access control Yes
AppLocker Yes
BitLocker Yes
Windows Server containers Yes
Nano Server base container image Yes
Group Managed Service Accounts (gMSA) Yes
Hyper-V isolation Yes
Azure Service Fabric for Windows Server Yes
PowerShell 5.1 Yes
PowerShell Desired State Configuration (DSC) Yes

4|Page
Visual Studio Code Yes
.NET Core Yes

Cost Benefit Analysis


The cost of the software is most likely the make or break obstacle in deciding the

adequate option for your business client. The budget of your client is very well an important key

factor when building a plan for them. A quick comparison of prices between the Windows Server

Standard 2012 R2 and the Windows Server Standard 2016, 2016 does come in slightly costing

about 4 more dollars than 2012. The biggest differences come down to the quantity of licenses

that comes with that price which is eight for 2016 and only one for 2012. Below is a quick

comparison table between the two.

Table 2. Windows Server Standard 2016 & Windows Server Standard 2012 R2 Price

Comparison

License Price Quantity Total


Windows Server Standard 2016 2-pack $83 8 $664
Windows Server Standard 2012 R2 2-processor $662 1 $662

Screenshots

Figure 1. VM OS Installation. Figure 2. Selecting Windows Server 2016.

5|Page
Figure 3.WS 2016 Installation Process. Figure 4. Windows Server 2016 Running.

Figure 5. Server Manager.

Web Services

Figure 6. Add Roles & Features. Figure 7. Installation Type.

6|Page
Figure 8. Server Roles. Figure 9. Roles Services.

Figure 10. Installation.

Deployment of the Web Services for the Lab Rats Inc company is a necessary in

order to meet the customers’ needs within the business network. The process to set up the Web

Services happens within the Server Manager through the Windows Server 2016 Standard

operating system. The first step would be to open the Server Manager, if it doesn’t automatically

open at initial boot-up and click on Add Roles and Features in the top-middle of the screen. The

next step would be to select the Role-based or Feature-based Installation option and click next to

proceed. Then, selecting the correct server which should be the local server that is chosen by

default and clicking next to continue. Within the server roles, enable Web Server (IIS) and

clicking next as well. In the additional features, continue by clicking next since no other features

are needed to install the Web Adaptor and click next. Within the Web Server Role (IIS) dialog

7|Page
box continue through by clicking next as well. Getting to the Select Role Services dialog box,

enable these components: Default Document, Static Content, Request Filtering, Basic

Authentication, Windows Authentication, .NET Extensibility 4.6 or 4.7, .NET Extensibility,

ASP.NET 4.6, ASP.NET, ISAPI Extensions, ISAPI Filters, WebSocket Protocol, IIS

Management Console, IIS 6 Management Compatibility, IIS Management Scripts and Tools, and

Management Service. After selecting those listed components, verify the selections are correct

and click Install. Finally, once the installation is completed, click close.

Domain Services

Figure 11. Server Roles. Figure 12. AD Domain Services.

Figure 13. Installation.

The benefits of utilizing Active Dictionary in a Windows Server are centralized resources

and security administration, single logon for access to global company resources, and a

8|Page
simplified resource location (Intelecis, 2018). An Active Directory allows an administrator to go

to one spot to manage and secure network components for their organization. As well as ensuring

the implemented company policies of security, network and resources are properly enforced

throughout the virtual technology environment.

Figure 14. Deployment Config. Figure 15. Domain Name.

Figure 16. Installation. Figure 17. Active Directory.

The process to deploy the Active Directory also happens within the Server Manager

found within the Windows Server 2016. As predicted the first step would be to open the Server

Manager, if not already opened, and click on Add Roles and Features. The next step would be to

select the Role-based or Feature-based Installation option and click next. Then would follow to

select the server which typical would be your local server that is first in the list and click next.

9|Page
Within the Select Server Roles, enable the Active Directory Domain Services option and click

next. In the Add Roles and Features Wizards dialog box, click Add Features. Within the Features

section, proceed to click next as no additional features are necessary. In the Active Directory

Domain Services, click next to continue. At the Confirmation Window, review the selected

features and click Install. Once the installation is complete, click on the Promote This Server to a

Domain Controller hyperlink in the results box. Within the Deployment Configuration dialog

box, select the Add a New Forest option then type in a domain name of your choice and click

next. Proceed to type in a unique password of your choice as well that follows the set guideline

and click next. In the DNS Options, Additional Options, Paths Sections and Review Options,

click next to proceed. Once the Prerequisites Check is completed, click Install. After the

installation is completed the server will automatically reboot. After reboot, login with your

created credentials and within the Server Manager, click on Tools, then Active Directory Users

and Computers. Finally, within the Active Directory Users and Computers dialog box, expand

the domain root and click on Domain Controllers, which should display your new server.

Administrator Account & Hard Disk Space

Figure 18. RAM & Hard Disk Space.

Ensuring the Administrator account is active and has a password set is critical when it

comes to the server configuration. Within the Server Manager, click on Tools and then Active

Directory Users and Computers. The next step would be to look for your Domain Name, you

10 | P a g e
created and expand the domain root selection. Within the domain root selection, click on Users,

then click on the Administrator account. Type in your name and when prompted, create a unique

password of your choice then click Apply. Finally click close to exit the window. Returning back

to the Sever Manager home page, click on Local Server. Within the window, ensure the RAM is

2GB and the Hard Disk Space is at least 30GB. Finally, exit out as you have completed the

process to install the services.

Troubleshooting NIC Guide


Setting up NIC Teaming

1. Open up Server Manager and click on All Servers.

2. Right click on Server Name and select Configure NIC Teaming.

Figure 19. Configure NIC Teaming.

3. In the NIC Teaming window, Locate the Adapters and Interfaces section.

4. Click on the Network Adapters tab, right click on the selected adapter, and click Add

to New Team.

11 | P a g e
Figure 20. Add to New Team

5. In the NIC Teaming dialog box, type in a unique Team Name and click on

Additional properties.

6. For Teaming mode, select Switch Independent; Load balancing mode, select

Address Hash and click Ok.

Figure 21. Naming NIC Team.

Adding additional NICs to a server VM

1. In the Hyper Vision, right click on your VM.

12 | P a g e
2. Click on Settings.

Figure 22. VM Settings.

3. In the Settings dialog box, click on Add Device.

Figure 23. VM Add Device.

4. Select Network Adapter and click Add.

13 | P a g e
Figure 24. Adding NICs.

5. Select the Custom: Specific virtual network and select your unique network name.

6. Click Ok.

Configure a spare NIC for the NIC Team

1. In the Adapters and Interfaces section, click on Network Adapters tab.

2. Right click on the available adaptor (NIC).

3. Click Add to <Team Name>, the unique name you created for your team.

Figure 25. Configure NIC.

Testing the NIC

1. Locate and click on your Windows/Microsoft logo at the bottom of your screen.

2. Click on Settings.

3. Click on Network.

4. In the Overview section, locate the Network status section.

5. The result should be your NIC Team Name displayed within your network diagram.

14 | P a g e
Figure 26.NIC Check & Test. Figure 27. Team Created.

File System
The new file system configuration will meet the needs of the organization by being

selective of who can manage which files depending on their department. Only certain folders and

files should be available to the specific departments group for security purposes. Allowing the

managers of each department to have full control over the files is essential due to given them the

rights to control their department virtually as well. On the other hand, allowing limited

customization to the users within that department enhances the security within the department of

protecting its documents to ensure they are not formatted differently. Setting up permissions

within a server to adequately separate or distribute documents adds a security protection to the

different files needed.

Creating a New Disk

Figure 28. Adding Disk.

15 | P a g e
Figure 29. New Hard Disk.

Figure 30. Configuring New Disk.

Creating a new disk happens within the Hyper Vision VM settings. First right click on the

selected VM of your choice and select “Settings”. Then, click on “Hard Disk (SCSI)” and click

“Add Device”. Click on the icon labeled “New Hard Disk” and within the configuration set the

disk space at 60 GB. After click on the “Advanced options” and uncheck the “Split into multiple

files” box. Finally, click “Apply” as the disk has been created successfully.

16 | P a g e
Figure 31. Initializing Disk. Figure 32. New Simple Volume Wizard.

Figure 33. Disk Management.

Setting up the disk happens within the Server Manager application. First click on “Tools”

located on the top right hand of your screen and select “Computer Management”. Then, click on

“Disk Management” and right click on the new disk and select the “Online” option. Right-click

on the new disk and select “Initialize Disk”, click “Ok”. Once again, right click on the storage

space of the new disk and select “New Simple Volume”, click “Next”. In the Specify Volume

Size, Assign Drive Letter & Format Partition section, click “Next”. Finally, in the Complete the

New Simple Volume Wizard, select “Finish”.

17 | P a g e
Creating Users & Groups

Figure 34. Adding Groups. Figure 35. Adding Users.

Figure 36. User Setup. Figure 37. Manager Setup.

Creating groups happens within the server manager application. First, click on “Tools”,

select “Active Directory Users and Computers”. Click on “Users” on you left side of the dialog

box. Right click on the empty space and hover over “New” and click on “Group”. Next, type in

the desired group name, in group scope select “Domain Local” and in group type select

“Distribution”. Repeat this process when creating a new group.

Creating users happens within the server manager application. First, right click on the

empty space within the “User” tab. Hover over “New” and select “User” and type in the desired

18 | P a g e
username. Next, click “Next” and type in a unique password, click “Finish”. Repeat this process

when creating a new user.

Adding Users to Groups

Figure 38. Selecting Group. Figure 39. Adding Users to Group.

Adding users to groups happens in the Active Directory Users and Groups section within

the server manager application. First, right click on the desired group needed and click on

“Properties”. Click on the “Member” tab and click “Add”. Next, click on “Advanced” and select

the “Find Now” option. Finally, select a user and its corresponding manager previously created

and click “Ok”. Repeat this process when adding users to different groups.

Creating Files

Figure 40. Creating a Folder. Figure 41. Folders.

19 | P a g e
Creating files happens in the File Explorer located in the main menu. First. Click on the

File Explorer icon at the bottom of the screen. Click on “This PC” located in the left side of your

screen and select the (E:) Drive which was the one you created previously. Next, right click in

the empty space and hover over “New” and select on “Folder”. Finally, type in a desired name

for the folder according to your needs. Repeat this process when creating folders in the

drive/disk.

File Permissions

Figure 42. Folder Properties. Figure 43. Selecting Users.

Figure 44. Modifying Permissions. Figure 45. Diagram.

20 | P a g e
Modifying file permissions happens in the File Explorer located in the main menu. First,

right click on desired file and select “Properties”. Select the “Security” tab, click “Advanced”

and click on “Add”. Next, click on “Select a principal”, select “Advanced” and “Find Now”.

Select the corresponding group/users and click “Ok”. Finally, select the desired permissions for

the manager and individual user. Repeat this process for every file and its users/managers.

Quotas

Figure 46. Disk Quota Management.

Configuring the disk happens in the File Explorer located in the main menu. First, click

on the “Files Explorer” icon located at the bottom of your screen and select “This PC”. Right

click on the (E:) Drive and select “Properties”. Next, select the “Quota” tab and check the

“Enable quota management” box. Select the “Limit disk space to” option and type in “1GB” and

“100MB”. Finally, click on “Apply” and “Ok” as the process has been completed.

High Availability
High availability will meet the needs of the organization by installing Network Load

Balancing (NLB) Nodes. This will allow to minimize server problems dealing with connectivity

21 | P a g e
between the network. This will potentially increase the productivity within since it will allow the

adapters more capacity to property function. Responsiveness is always a key factor within a

network that is critical in a company with time limits on projects. Allowing less interruptions

throughout the network to create a steady flow. Administrators are able to monitor its health and

reliability throughout time since it is installed through the Server Manager application.

Installing NLB Nodes

Figure 47. NLB Feature. Figure 48. NLB Installation.

Installing the NLB Feature happens in the Server Manager application. First, click on

“Add Roles and Features” and continue selecting “Next” to get to the Features section. In the

Features section, select “Network Load Balancing”, click “Add Features” and select “Next”.

Once at the confirmation section, click “Install”. Finally, click “Close” once the installation is

completed.

22 | P a g e
Figure 49. NLB Manager. Figure 50. Adding New Cluster.

Figure 51. Host Look-Up. Figure 52. Adding IP Address.

Figure 53. Cluster IP Address. Figure 54. Cluster Mode.

23 | P a g e
Figure 55. Created Cluster.

Creating an NBL cluster happens in the Network Load Balancing Manager application.

First, click on the “Network Load Balancing Manager” that is located in the main settings at the

bottom left of the screen. Right-click on “Network Load Balancing Clusters” and select “New

Cluster”. Within the “New Cluster: Connect” wizard, type in the name of your host and click

“Connect”. Once the connection is set, click “Next”. When prompted with the DHCP dialog box,

click “Ok”. In the prompt box of “Additional IPs”, click “Next” and when prompted with the

“No Dedicated IP Addresses”, click “Yes”. Next, in the “Add IP Addresses” section, type in an

IP Address of your choice and click “Ok” and “Next”. In the “Cluster Parameters” select your

preferred mode of Unicast, Multicast, or IGMP Multicast and click “Next”. Finally, in the “Port

Rules” section, add any ports that may be necessary and click “Finish”.

GPOs
The imposed GPO changes will meet the needs of the organization by implementing

changes for each computer/user located within the network of the Lab Rats Inc company. By

doing these changes with the Group Policy Management tool you ensure each user/computer

found in your network has implied these necessary changes, which ultimately saves time and

energy by allowing one change to be done to all other users within company structure. GPOs

24 | P a g e
allow the administrators to easily customize policies for a group of users to limit or expand their

permissions according to software. As well as restricting the company guidelines by allowing

one trusted web browser to be used throughout the company to minimize troubleshooting and

security occurrences.

Figure 56. Group Policy Management. Figure 57. Create a GPO.

Figure 58. OU. Figure 59. Created OU.

Creating a new organizational unit (OU) happens within the Server Manager application.

First, click on “Tools” located on the top right hand of your screen and select “Group Policy

Management”. Then, expand your “Forest” and “Domains” and right click on the chosen domain

name. Next, click on “Create a GPO in this domain and Link it here…”. Finally, type in the

desired name and click “Ok”.

25 | P a g e
Going back to the Server Manager screen, click on “Tools” and select “Active Directory

Users and Computers”. Then, right-click on the domain name, hover over “New” and select

“Organizational Unit”. Finally, type in the desired name and click “Ok”.

Back to the Group Policy Management, right click on the previous created OU and select

“Link an Excising GPO”. Next, click on the created domain and click “Ok” as you are finished

creating an OU.

Board of Directors Policies

Figure 60. Password Policy. Figure 61. Accounting Dept. Wallpaper.

Figure 62. Configuring Wallpaper Policy. Figure 63. Google Chrome.

26 | P a g e
Figure 64. Windows Defender Setup. Figure 65. Computer Kiosk.

Figure 66. AD Users & Computers. Figure 67. User’s Member Of.

Before configuring the policies within the group policy management, giving your user

account the permission of two different important admins will allow you to configure the policies

needed with no problem. First within the Server Manager application, click on “Tools” and select

“Active Directory Users and Computers”. Next, click on “Users” and double click your named

user account. Select the “Member Of” tab and click “Add”. Type “Domain Admin” and

“Enterprise Admin”. Finally, click “Ok”, “Apply”, and “Ok” as you have given yourself god

access.

27 | P a g e
Configuring the policies happens within the Group Policy Management Editor, which

was opened from the Server Manager previously. In order to configure the password policy, right

click on the created policy and select “Edit”. Next, expand the “Computer Configuration”,

“Policies”, and “Windows Settings”. Click on “Security Settings”, “Account Policies”, and

“Password Policy”. Then, change each policy within listed to the adequate setting needed and

click “Apply” and “Ok”.

In order to configure the accounting departments wallpaper settings, expand the “User

Configuration”, “Policies”, “Administrative Templates” and “Desktop”. Next, click on

“Desktop” and double click on “Desktop Wallpaper”. Then, select the option “Enable” and type

in the wallpaper path. Finally, change the “Wallpaper Style” to “Fill” and click “Apply” and

“Ok”

In order to configure the Google Chrome as the only web browser, open the “Internet

Explorer Web Browser” and the settings dialog box. Next, click on the “Security” tab and select

“Custom level...”. Select the “Enable” option and click “Ok”. Exit out the settings dialog box. In

the web browser engine, type “Google Support page” and click “Enter”. Then, download the

“policy template zip file” and click “Save” and “Show in Folder”. Right click on the

“policy_templates” folder and select “Extract All”. In the pop-up window, select the folder and

click “Extract”. Once extraction is finished, open up the “Windows” folder and the “admx”

folder. Right click on the “chrome.admx” file and select “Copy”. Open the “Run” window and

type “%systemroot%\PolicyDefinitions” and click “Ok”. Right click on the empty space and

select” Paste”. In the pop-up window, click “Continue”. Minimize the current window and in the

previous window, right click the “chrome.adml” file and select “Copy”. Open the “Run” window

and type “%systemroot%\PolicyDefinitions\en-US” and click “Ok”. Right-click on the empty

28 | P a g e
space and select “Paste”. In the pop-up window, click “Continue”. Open the “Run” window and

type “gpedit.msc” and click “Ok”. Under the “Computer Configuration”, expand the

“Administrative Templates” and scroll down to look for the Google Chrome software as it has

been successfully added to the network.

In order to configure the anti-virus software within the organizations within the “Group

Policy Management Window”, expand “Group Policy Object” and right click on the GPO

previously created. Select “Edit” and within the “Computer Configuration” section, expand the

“Policies”. Next, click on “Administrative Templates” and expand “Windows Components”.

Then, click on “Windows Defender Antivirus” and select the “Custom User Interface”. Finally,

configure the needed setting within for security or restrictions.

In order to configure the kiosk method, open the selected GPO to apply the settings to.

Under the “User Configuration” section, click on “Administrative Templates” and select

“System”. Next, double click on “Custom User Interface” and select the “Enable” option. Then,

in the interface file name box type in “c:\program files\internet explorer\iexplore.exe”. Finally,

click “Ok” and close the window as the kiosk has been set.

To configure the kiosk settings, within the “Computer Configuration” section, click on

“Administrative Templates”. Next, click on “Internet Explorer” and configure the settings

needed. Repeat this process for the User Configuration section as well.

29 | P a g e
Routing & Remote Access (RRAS)

Figure 68. Add Roles and Features. Figure 69. Remote Access Server.

Figure 70. Roles Services. Figure 71. Server Installation Complete.

Figure 72. Configure Remote Access. Figure 73. Enable Remote Access.

30 | P a g e
Figure 74. Configuration. Figure 75. Remote Access Service Setup.

Installing the Routing and Remote Access Server happens within the Server Manager

application. First, click on the “Add roles and features” and continue clicking “Next” until you

get to the “Server Roles” section. In the “Server Roles” section, select the “Remote Access”

option and click “Next”. Continue clicking “Next” until you get to the “Role Services” section.

Then, select the “DirectAccess and VPN (RAS)” option and click “Next”. Once at the

“Installation” section, click “Install”. In the “Configure Remote Access” window pop-up, select

the option that best suites the company or purpose. Once in the configuration window, right click

on your server and select “Configure and Enable Routing and Remote Access”. Next, select

“Custom Configuration” and “VPN Access”. Click “Next” and “Finish”. Continue by clicking

“Ok” on the pop-up window. Finally, click “Start Service” as the Remote Access feature is ready

to be put to use.

Kiosk
The implementation on the kiosk policy to allow the marketing department to go mobile

meaning they can access anything they are authorized to view on the go. Many businesses

worldwide have implemented this feature based on a mobile app where it has certain restrictions

31 | P a g e
and can be used worldwide when traveling outside the country. The cost to produce a mobile app

that would serve as a kiosk would be about a total of $3,440. This mean price budget includes all

the necessaries like management software, 24/7/365 technical support, installation, and an initial

project management fee of $300. Products that would comply with a full kiosk definition would

most likely be tablets and iPads since they are portable enough to take on the go when traveling,

especially in an airport setting. Keep in mind the more security implementation desired for the

kiosk software the higher the price will be.

Strategic Plan for Policies


1. No downtime for corporate Domain Controllers will be accepted to the board. This

must be kept within industry standards.

In order for the Domain Controllers to not have a downtime, a redundant power source will

be required to be implemented. The Uninterruptible Power Supply (UPS) and generator system

would be a great option. Servers like the Domain Controller, which is one of the critical ones,

would have to be connected onto a UPS with separated power circuits to maximize the power

supply. Since UPS’s are usually used to provide temporary power for only certain minutes, that’s

when a generator would come into play to supply infinite power without a limit. To avoid any

possible downtime, the first defense would be most likely be two UPS to create a backup to the

backup. The next step towards defense would be the generator where these UPS would

potentially be connected to, to ensure power quality. Having many layers of defense towards

power supplies, decrease the possibility of downtime failure affecting the Domain Controllers in

a negative way. This will keep the company prepared of unplanned situations dealing with the

Domain Controllers status.

32 | P a g e
2. Employees must have complete and uninterrupted access to all corporate

documentation.

3. The Legal department has requested to have separate redundant storage capability

to maintain integrity of corporate legal documents. The legal department is

currently using their own file server.

In order for employees to have complete and uninterrupted access, a backup system would be

needed to put in place. Although there are many types of backups like full, incremental,

differential, and mirror selecting the adequate system required intensive research to meet the

needs of the company. Incremental and cloud backups options would best fit the company needs

of storage and security. Incremental backups technically copy data from the files that had a

recent change done to them. This allows the company to run as many backups as needed. Backup

applications are great at keeping track of the last modification made on files. These types of

backups are completed at a fast speed and require a small amount of data. Cloud backups would

be used as a secondary backup to the incremental backup, a backup to the backup. Cloud

backups usually use a third-party service provider with a selection of different amounts of data

store capabilities. These backups would decrease the workload on IT staff which would equal out

the data charges for cloud storage. Backups and security go hand in hand since they have

protection features implemented within them to protect any data stored within them.

4. Customers and employees must not experience queuing issues when printing.

In order to avoid queuing issues when printing, use multiple printers connected to different

servers. Connecting printers to different servers, with different IP addresses, increases

connectivity status and avoids overloading servers with multiple printing requests. Configuration

of printer locations is a great practice to avoid collisions between each printer within a server.

33 | P a g e
The Windows Active Directory is a great option to help manage the printers within a network as

well as maintaining them. Maintaining printers with their current software updates is a minor

action that can keep them healthy and functionable.

5. Dynamic IP addressing will be used for all client computers.

In order for Dynamic addressing to be used for all client computers, Domain Name System

(DNS) and Dynamic Host Configuration Protocol (DHCP) services must be installed within your

network. The DNS and DHCP servers can be implemented and configured for all client

computers using the Windows Server 2016. IP addressing schemes can also be configured within

these servers to be applied to any client computers desired within your network base. IP

addressing schemes can facilitate having multiple connections to avoid overloading a single

connection to create a steady and unison flow of data along the company with no interruptions to

the network.

Logical Network Diagram for Enterprise


Domain
Domain Controller UPS System UATNTW 216.local Drive Drive
Drive
VM WINDOWS SERVER 2016 STANDARD

Drive
Acc.
Drive Drive
Updated Printer HR
Server Drive Drive

Drive Drive Legal


RAID Drive Drive
Storage Array: Corp
File Server 1
Server Drive Drive
Config
Drive Drive IT

Drive Drive
NIC Teaming RRAS Main.
Drive Drive

Drive Drive Total of 1000 users


Host within the all the
NLB Nodes UAT NTW216 Drive Drive
Lab Rats departments

Figure 76. Enterprise Layout Diagram for Lab Rats Inc.

34 | P a g e
Implementation Timeline

Proposed Implementation Timeline


Ma rch 2 9 Ap ril 12 Ap ril 2 6
20 20 20 20
20 20
Installing Operation Systems File Operation Logical Network Diagram
High Availability Proposed Labor Cost

Installing Active Directory GPO's & Security


Troubleshooting Continuity of Operations

Ap ril 5 Ap ril 19
20 20 20 20

Figure 77. Implementation Timeline.

Proposed Labor Costs


Table 3. Proposed Labor Cost for System Administrator

Labor Costs Jr. System Sr. System


Administrator Administrator
Salary (Hourly) $ 64.00 $ 94.00
Medicare Tax (1.4%) $ 0.90 $ 1.32
Social Security Tax (6.2%) $ 3.97 $ 5.83
Federal Unemployment Tax (5.2%) $ 3.33 $ 4.89
State Unemployment Tax (5.4%) $ 3.46 $ 5.08
Profit (5%) $ 3.20 $ 4.70
401K Plan Cost (5%) $ 3.20 $ 4.70
Medical Plan Cost (25%) $ 16.00 $ 23.50
Dental Plan Cost (1.5%) $ 0.96 $ 1.41
Insurance Costs (15%) $ 9.60 $ 14.10
TOTAL LABOR RATE $ 108.62 $ 159.53

35 | P a g e
References
Microsoft. (2020, January 1). Compare features in Windows Server versions. Retrieved from

https://archive.is/DjnCI

Microsoft. (2020, January 1). Windows Server 2016. Retrieved from

https://www.google.com/url?

sa=t&rct=j&q=&esrc=s&source=web&cd=12&ved=2ahUKEwiSjZri4L3oAhUNnq0KH

fmeAkgQFjALegQIBhAB&url=http%3A%2F%2Fdownload.microsoft.com

%2Fdownload%2Fe%2F6%2F4%2Fe64f72bf-55e9-4d85-9efe-

39605d7ce272%2Fwindowsserver2016-licensing-

guide.pdf&usg=AOvVaw18AKSA5OcZFRAO-s-96tMO

ArcGIS Enterprise. (2019, December 27). Enabling IIS and required IIS components on

Windows Server 2016. Retrieved from https://enterprise.arcgis.com/en/web-

adaptor/latest/install/iis/enable-iis-2016-components-server.htm

Intelecis. (2018, August 17). Benefits of active directory domain services. Retrieved from

https://www.intelecis.com/benefits-of-active-directory-domain-services/

PC Addicts. (2016, January 18). Setup active directory on Windows Server 2016. Retrieved

from https://pc-addicts.com/setup-active-directory-server-2016/

Intel. (2020, January 28). Setting up NIC teaming for Windows Server 2012*/2012

R2*/2016*/2019*. Retrieved from

https://www.intel.com/content/www/us/en/support/articles/000022706/network-and-i-

o/ethernet-products.html

Rich, D. (2020, January 22). Understand and learn how to build a NIC team in Windows Server.

Retrieved from https://adamtheautomator.com/nic-teaming-windows-server/


36 | P a g e
Canvas. (n.d.). NTW216 HOWTO Videos. Retrieved from

https://synchronic.uat.edu/courses/3100/files/folder/HOWTO%20Videos?

Panek, W. (2018). MCSA Windows Server 2016 complete study guide: Exam 70-740, exam 70-

741, exam 70-742, and exam 70-743 [Kindle 6 Version].

Brinkmann, M. (2015, April 1). How to install chrome policy templates on Windows machines.

Retrieved from https://www.ghacks.net/2015/04/01/how-to-install-chrome-policy-

templates-on-windows-machines/

Computerwurld. (2018, June 6). How to Install Chrome Group Policy Templates. Retrieved

from https://www.youtube.com/watch?v=t-c8-j0myMo

Graber, J. (2018, March 20). Internet explorer on Windows Server: Enable file downloads.

Retrieved from https://improveandrepeat.com/2018/03/internet-explorer-on-windows-

server-enable-file-downloads/

Letsielo. (2009, August 18). Enforcing kiosk mode via GPO or other methods. Retrieved from

https://social.technet.microsoft.com/Forums/lync/en-US/207ef293-2a5c-461a-aafb-

630caacd3d56/enforcing-kiosk-mode-via-gpo-or-other-methods?forum=winserverGP

Microsoft. (2018, September 3). Configure Windows defender antivirus with group policy -

Windows security. Retrieved from https://docs.microsoft.com/en-

us/windows/security/threat-protection/windows-defender-antivirus/use-group-policy-

windows-defender-antivirus

Castagna, Crocetti & Sullivan. (2019, July 3). What is cloud backup and how does it work?.

Retrieved from https://searchdatabackup.techtarget.com/definition/cloud-backup

Fellows & Crocetti, R. P. (2019, July 17). Types of backup explained: Full, incremental,

differential and mirror. Retrieved from

37 | P a g e
https://searchdatabackup.techtarget.com/feature/Full-incremental-or-differential-How-

to-choose-the-correct-backup-type

Lowe, S. (2002, April 22). Server room power: Plan for redundancy and flexibility. Retrieved

from https://www.zdnet.com/article/server-room-power-plan-for-redundancy-and-

flexibility/

PaperCut. (2020, January 1). Tips for managing printers and reducing printing costs. Retrieved

from

https://www.papercut.com/kb/Main/TipsForManagingPrintersAndReducingPrintingCost

38 | P a g e

You might also like