Specification of organizational Active Directory design
The organizational Active Directory design is the hierarchical active directory with the president of WWTCO acting as the root directory at the top of the structure. The second level of the structure consists of six different vice presidents at different capacities. The vice presidents (VP) include the operational vice president (VP POR), the North West, south west, north east, south east and M USA vice presidents, all of the United States. Each vice president has the first and the second manager (manager 1 and manager 2 respectively who works under them in the third and forth level of the directory in that order with the exception of operational vice president having the chief executive officer of IT (CEO IT) and CET FIN in the third and forth level of the directory structure. At level five is the chief executive officer for the human resource under directly under CEO FIN. Bellow manager 1 and manager2 will be three staff and four brokers namely broker 1, broker 2, broker 3 and broker4 for each case. Every level of directory will exist as a work station office with printer and server.
Recommended features of the active directory infrastructure
The features of the directory will include design features of Cisco wireless local area network controllers, Cisco Aironet indoors rugged, indoor, wireless mesh and outdoor rugged access points such as access point based on IEEE 802.11n draft 2.0 standard and others, indoor access points and the outdoor rugged access points. Cisco Aironet access points, Gigabit Ethernet ports, IEEE 802.1D spanning tree protocol for higher availability, IPsec encryption, wireless LAN controllers among others are the specific examples of Cisco wireless LAN controllers. The indoor access points comprise of integrated dual band 802 .11 a/b gradios Ethernet, fiber and cable modem interface with mesh access points that permits cost effective and scalable deployment of safe or secure outdoor WLAN.
Level of users
The OU level for users and devices in their respective OU will include the high privileged and low privileged users. The high level of privileged users will be able to get access to nearly all sensitive parts of the network information for the organization. On the other hand, the less privileged users will only be able to access less sensitive information in the network system. The staff at the top of the directory structure will have access to high sensitive information while those at the lower part will have access to less sensitive information files.
Global, universal and local group users
The global group will involve users originating both from the United States and other parts of the world and will comprise of all users in every department within WWTCO such as ICT department, operations department, human resource department, purchasing department and many other department within the organization. Universal users are restricted for access of particular information. In this case high privileged users will access all kinds of information, whether highly sensitive or least sensitive. Low privileged users will only get the right of entry in to specific l less sensitive files. The local groups of users are to access particular information files only within the United States or their country of origin.
Appropriate GPO and GPO policies
The group purchasing organizations, GPO will have to merge or combine the purchasing strengths of their affiliates and be capable of bargaining or discussing the contracts with suppliers of input on their behalf. The GPO will also have to get attention from the justice department as well as from the commission of federal trade due to other concerns to do with monopsony power and other standardizations. The policies of GPO in general will cover the concerns of competition. Thus the GPO will be procompetive and preserves its operational benefits. It will also have to safeguard consumers from the limitation of any completion (Blair & Durrance, 2014). The GPO is also to use the system of carrying out several operations on group policy objects through the manipulation of objects for group policy as one entity in order to conduct the backup, import, restore as well as copying of operations (Shaji, Gupta & Whalen, 2012).
References
Shaji, U., Gupta, R., & Whalen, W. J. (2012). U.S. Patent No. 8,244,841. Washington, DC: U.S. Patent and Trademark Office
Blair, R. D., & Durrance, C. P. (2014). Group Purchasing Organizations, Monopsony, and Antitrust Policy. Managerial and Decision Economics, 35(7), 433-443.