Introduction
Organizations store important data, employee records and install computer softwares to ease their day-to-day administration. It is done at different levels and departments in a company to help in storage of information and easier retrieval of information. Most companies have embraced the use of computer systems as they enable them to set restrictions to the users according to their job levels. For example, the general manager can be able to log in to the system and have a look at all parts of the company and departments too.On the other hand, a departmental manager can only be able to view data that is related to his department. This ensures security of the company information since all the stored data is viewed by the relevant people only. In the past, data was stored in spring files, and it was vulnerable to accidents like fire and water. This paper is about company organizations and how computer systems have been used to improve their efficiency.
Plan
Since all the supervisory conductors operate the same system, a log in command in the system is necessary before accessing resources and data concerning the transport network. The log in system should operate by entering special password offered according to the staffs of the transport company. The special passwords will open the network system accord to the staff member superiority in the company. For instance, a HQ supervisory conductor should be able to access more fields than a supervisory conductor operating the child domain. With two of the supervisory conductors operating the HQ root domain and the other three operating the four child domains, restrictions ought to be created. The log in system must be able to offer the HQ supervisory conductors unlimited access to navigate the system freely with no restrictions. On the other hand,the remaining three supervisory conductors who run the child domains must be given access only to resources and data information relevant at their level of operations.
Advantages of AGUDLP
The AGUDLP is advantageous in this transport network module since it gives the Supervisory conductors HQ access the local domain group thus ensurering their efficiency of the transport network. Another advantage is that, the two Supervisory conductors can grant each other access to the system. This will ensure that access is possible in case of emergencies as long as the members are from the same group.Another advantage of the approach is the flexibility in case of change. The domain offers a bridge between domains and forests thus allowing change to take place (Noel et al., 2008). With few supervisory conductors in the network system, the approach is likely to be a benefactor.
Windows 2008 Tools for Creating Multiple User Accounts
The windows 2008 offer two new tools that are effective in creating multiple user and group accounts. PowerShell is one of the tools being offered. The tool offers an alternative of creating multiple user accounts at a faster rate rather than manually. The main objective of the tool is that, it simplifies the creation of multiple users in an Active Directory and maintains correction for punctuation into proper fields or departments in this case.
Another utility that can also be used to create new multiple accounts under the windows 2008 operating system is CSVDE. This is a command that imports and exports objects from the Active Directory into a Comma Separated Value (CSV) formatted file. This means that it can be easily read in Excel spread sheets. The company requires hiring hundreds of people in the main headquarters, but their clearance level should not allow them to access the forest root domain HQ. Their superiors should only integrate them into the system and offer them roles and responsibilities. These two tools offer the best choice since their core values are to import or export users in an Active Directory.
Benefits of Functional Designed Organizational Units
Organizational units are the smallest units through which one can delegate authority easily. Furthermore, one organizational unit cannot comprise of objects from another domain (Noel et al., 2008). Since the new hired employees are going to be transferred into different departments, creating organizational units to represent different department will have the following benefits:
- Delegation of responsibilities, authority, consultation and policies within that department will be much easier and comprehensive to follow. This will fill responsibility gaps within departments thus ensuring that each employee under different departments is going to do what chores. In the Transnational Railway Company, this will enhance transport system coherence among employees and ensure smooth flow of errands.
- Transnational Railway Company has different computing needs to fulfil in different departments. Functional design organizational units try to consider different departments that carry out varying functions. This allows flexibility and increases efficiency of carrying out these responsibilities independently. A hierarchy of functional managers is also respected within the structure. This means that communication between departments is carried out in consideration of the heads of department.
Moving Users across Organizational Units
Moving users across organizational units is a crucial process since it involves the transfer of important data. Creating back-ups for the transferred data is important to increase stability and smooth implementation of the system in phases. This ensures that weaknesses are identified early in the implementation stage thus increasing efficiency of the migration. With consideration to user account migration, the process should be carried out thoroughly to reduce errors and account insecurity.
Domain Wide Account Policies
Two vital domain account policies level that are easier to implement when it comes to safeguarding security include, password policy and account lockout policy. If these policies are set on any level below the domain in the Active Directory service,they affect local account users on member servers (Hunter, 2005).
- Password Policy
A user’s password is the most common authentication of the user’s identity in most operating systems. Ensuring that security is enhanced in this policy is key for the group users or departments.Application of strong passwords is necessary at this domain level. A good example is the combination of 10 characters with letters, numbers and symbols. In addition to this, changing of strong passwords regularly reduces the likelihood of hacking such accounts. The use of the same password over a long period of time increases vulnerability.
- Lockout Policy
Unsuccessful password submission by a user shows a trial and error basis of unlocking an account. This requires a countermeasure of blocking a user if more than three or given number of passwords are rejected.This policy assures users that their account is secure at all times and the fewer the submission chances the higher the safety of the account.Once the account is locked, resetting it should only be done by the administrator under a certain period of time. The policy should be able to identify or note that password-protected screensavers are not locked accounts thus reducing the chances of locking occupied accounts.
These two policies are essential towards guaranteeing the security of the network system. Their settings can be manipulated according to the user’s preference to accommodate their needs.
Implications to Planning an Auditing Strategy
It is not possible for an organisation, no matter how big to keep check of all its network activities due to the lack of resources. Organizations spend most of their resources to acquire antivirus softwares, setting up firewalls and encrypting their data just to protect it (Allen et al., 2008). Poor planning creates loopholes and gaps in the auditing process. Furthermore, trying to audit every aspect of the network creates too much monitoring data which analysts must assess thus increasing the possibility of passing out on important suspicious activities.
In addition to this, planning an effective auditing strategy requires on to find the most important activities and critical resources, apply appropriate auditing settings, assess the advantages and disadvantages, and keep track of them. After testing these settings, it makes it possible for the audit policy plans to be developed, deployed and managed.
Conclusion
Organizations depend on computer innovations to run their day-to-day activities be it in the transport, medical or any other sector. This calls for employee records management, data encryption, among other sensitive data assessment methods. Creating a secure data management system that conveys relevant information to employees is, therefore, important. Microsoft Windows and other operating software have proved to be a stepping-stone in the modern world of information safekeeping. Innovations in this sector will go a long way towards securing organizations policies.
Reference
Noel, M & Morimoto, R & Mistry, R. (2008).Windows Server 2008 Unleashed. New Jersey: Sams Publishing Limited
Hunter, L. (2005). Active Directory Field Guide. New York: Apress Publishers.
Allen, R & Laura, L. (2008). Active Directory Cookbook. New York: O’Reilly Media Inc.