Access over 20 million homework & study documents

Think critically 4 1 configuring users working environmentsyou h docx

Content type
User Generated
Rating
Showing Page:
1/1
Think Critically 4-1: Configuring Users' Working Environments
You have been told that all users in the Marketing Department must have a computer working
environment that meets certain criteria. Marketing Department users don't always sign in to the
same computer every day, so these requirements should apply wherever they sign in. You have a
Windows Server 2016 domain, and all computers are domain members. All Marketing Department
user and computer accounts are in the Marketing OU. All desktops run Windows 10. The criteria
follow:
Marketing users must be able to access documents they save in the Documents folder in
their profiles from any computer they sign in to.
A company marketing application must be installed automatically when users sign in if it's
not already installed.
The marketing application they run leaves behind temporary files named mktapp.tmpX in
the C:\MktApp folder (with the X representing a number). These files contain sensitive
information and must be deleted when the user signs out.
How can you make sure all these criteria are met? What should you configure to meet each
criterion? Be specific about any options that should be enabled or disabled and how the
configuration should be applied.
Answer:
1. For Marketing users to access documents from any computer they sign in to I would
create a shared documents folder in the Marketing OU. Once a user of the marketing
department is authenticated and authorized on the domain they can then access the shared
documents folder. I would set their permissions to read, write, and possibly executed
depending on the type of file or document they need. Activation of folder redirect will store
documents on the server for centralized management and backup.
2. The company marketing application would be assigned to all users in the Marketing OU in
the domain. Assigning the application in the computer configuration node would
automatically install the application to targeted computers when the user signs in and are
authenticated on the domain. A shared folder on a server is created with read and execution
permission. If changes are made to the software package or updates are applied, the
security tab in the Advanced Application Deployment Options dialogue box is set to give
administrators full control to re-deploy the application when changes are made.
3. The sensitive files left by the application need to be either secure or deleted when the
user signs out. Under the User Configuration node, I would prepare a logoff script using a
.bat file to delete or secure the temporary files left behind. I would navigate to User
Configuration, Policies, Windows Settings, Scripts. Using a Power Shell script with the UNC
path in the Sysvol.

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Think Critically 4-1: Configuring Users' Working Environments You have been told that all users in the Marketing Department must have a computer working environment that meets certain criteria. Marketing Department users don't always sign in to the same computer every day, so these requirements shou ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4