Profession
Provide an action plan based on Group Policy that: Highlights each phase of the SDLC and the associated aspect of Group Policy
The action plan consists of the group policy that will leverage the efficient installation of software with the minimum costs in each phase of the System Development Life Cycle (SDLC). The action plan is useful as it has provided the IT managers with the tools, equipment and costs that are needed for the successful software installation in SDLC Phases. The action plan is also an evidence of the visibility of design, the development and the status of installations that are needed and are time specific and fall within the budget. Through the action plan, the IT managers are aware of the management authority required to provide timely direction, co-ordination, review and the approval of the system development project.
The installation of software will pass through different development lifecycles and it captures the way it is created and the methods of upgrading. The SDLC is made up of six phases: initial phase, design stage, development stage, requirement definition phase, Integration and test stage, Installation and acceptance stage.
Initial/planning stage
The group policy in this phase provides an overview of the intended software product. This will guide the installation manager to come up with a basic structure project, evaluate the performance and the risks that are entitled to the project and explain the required approaches in management and technical departments.
In planning, the most important element is listing the goals of the product requirement. Each goal must be clearly defined, consists of a title, and also textual description. The outputs in this phase include the configuration management plan, the project plan and schedule and the quality assurance plan. The policies also provides comprehensive list of scheduled activities for the next phase and level and cost estimates expected.
Design stage
Its inputs are based with the requirements that are needed in the document known as approved requirements. It describes the characteristics of the software and includes several diagrams on hierarchy functions. It also has a detailed ERD and a data dictionary. The characteristic of the design explains the software in depth and the programmers therefore develops the software without hesitation and complexities.
Development and Requirements definition stage
The inputs in this phase are the goals highlighted in the initial phase. The goals constitutes of a detailed set of requirements. There is the definition of the roles of the intended software installation, the definition of reference data areas and operational data regions, and lastly data entities. The policy will highlight the user hierarchy formed and link with the chief functions, data areas and data entities.
It has a policy that known as the requirements document and the requirements traceability matrix (RTM). This policy will describe each requirement in full details, and it will constitute of diagrams and references to all external documents. The RTM has a duty to describe all the components highlighted in all stages that are connected with the software development life cycle.
The outcomes associated with this phase includes: requirements document, an up to date project plan and the RTM.
Integration and test stage
In this phase, the software artifacts and test data are transferred to a different test surrounding. The test cases are run so that they can confirm about the accuracy and completeness of the software. The test will confirm correct robust and complete capabilities of the installation. The expected outcomes constitutes of an combined set of software, an implementation map, an acceptance plan, an online help system and an updated project plan.
Installation and acceptance stage
The product server input receives the software artifacts, the online help, and an initial production data. The running of the test cases is also done to verify the accuracy and the completeness of the software. The test suite must satisfy the needs of a customer and guarantee that the software will be perfect after its installation. The outputs will include the product application, a complete test suite acceptance, and a memorandum that a customer has accepted the software.
Use the Group Policy Management tool to immediately help these employees access the software
The group policy management is concerned with giving authority to the identified users so that they can use the software in the system. The access policy is considered a heart in the integrated GPO system. It works in ensuring that there is an improved regulatory compliance, risk management and a high output and productivity. The technology applied helps the users to access the software because of the following steps:
- Application level; the access policy will bring in unison the policies guiding the security of the software and the controlled access of these applications and resources. The access will therefore be accessible to all users that are defined in the end user in the institution.
- Network access level; the policy management tool together with the technology applied will guard all network assets and there system will require the passwords that will be given to all the users so that they can be in a position to access the software with consent from the administrator.
- Information level; this will help the employee access the software since the policy will address the growing risk to protect the enterprise data. This is enhanced by the sharing and distribution of all important information. Therefore the key of using to software will be given to all users.
- Host level; at this stage, the group policy management policy has a responsibility to give authority to all the hosts in a way that it lists the entire objective and the permissions to access to all intended authorized bodies. This will help all groups of individuals to access the software.
It is important for the mangers to visualize the network and discover what is needed; he must also reduce the overlapping and the duplicate rules for unauthorized vendors. The next step will be creating alerts that will identify denied access issues. In conclusion, there is need to reduce the manual time by ensuring that firewall changes are undertaken.
Diagram of the group policy management tool
Use of Policy Management Tool to enhance accessibility of the software
A Group Policy Management tool, such as Group Policy Management Console, it is easier to maintain access and control all the computers in the network. This tool has various features that help the user to have easy access of the software. The features include a user interface that enhances the simplicity of use of Group Policy. With the Group Policy Editor, the management is able to configure fundamental window settings such as creation shortcut of the software to the user’s desktop. The short cut improves the accessibility of the system since the user can be able to access the software with ease.
Software upgrading
Software upgrade to the latest version will involve enhancing computing data that enhances performance, usability and security susceptibilities within a piece of pre-existing software. The upgrade in this case involves new software that has new changes and content to the current software that is in use in the network. By upgrading this software, it means that the user have the best resources at their disposal as well as updated ideas developed in the computer programs and applications.
Documenting a disaster recovery plan for your Windows Server 2008 Active Directory network
The documentation is written in order to pervade the software life cycle. This is the most significant manifestation of the software as it functions as a guide through software maze. The documentation should involve the source code, and error code that are accompanied by their meaning. In this case, Windows server 2008 R2 Documentation Survival could be applied to do the documentation. This application enhances convenience of resources and facilitates security and essential documentation.
Maintenance and monitoring procedures
Computer network requires security procedures tool to ensure that the security and safety of the network is enhanced and malicious hackers and non-authorised users are prohibited from accessing the network. One of the procedures includes the enabling of the firewall. The firewalls are able to monitor the outgoing and ingoing network traffic, allow or block particular communication with regard to user’s settings. However, the user must make sure that the firewall is ready to inspect all outgoing and ingoing traffic and the spam blocking features of the firewall are enabled.
Another precautionary procedure in maintaining and monitoring computer network involves wireless and data encryption. When wireless connection to internet is used, the user should always make sure that the network is privatized and encrypted with either WPA2 or WPA encryption. In addition confidential and important data in the computer hard disks should b encrypted with software such as Pretty Good Privacy or TrueCopy.
All computers in the network should also have virus protection software. This is done by ensuring that there is running virus software with an update virus database to filter and scan all the viruses that may have a pathway to the network. In this case appropriate antivirus software such as AVG, Karspersky or Internet Security might be installed in all the computers in the network.
Above all, the secure behaviour must be practiced by all the computer users in the network. It is identified that many computer security and viruses breaches happens because of the conducts of the users. Therefore, all the users in the network should comply with some conditions such as avoiding reading e-mails from unknown sender and avoid opening files of unknown origin.
Procedure for restoring Active Directory
The Symantec tool is used to restore the system state if the Active Directory component on the server corrupts. Below is the procedure for applying Symantec tool in restoring the Active Directory.
1. Go at the “start” button and then type “ntbackup” into the shown text box. Select the “advance mode” in the first window to display the restore utility.
2. Select the “restore wizard”, then “next”. Apply the “system state” option in the backup files list and then click “next”.
3. Choose the “Original Location" from the drop-down box and then "Next." Ignore the recommended option indicated "Leave Existing Files" on the next window, and then click "Next."
4. Look for the box labeled "Restore Security Settings" followed by "Next." The final "Summary" window displays the list containing restoration options. select "Finish" button to restore your system state.
References
Blanchard, B. S., & Fabrycky, W. J. (2006) Systems engineering and analysis (4th ed.) New Jersey: Prentice Hall.
Cummings, Haag (2006). Management Information Systems for the Information Age. Toronto, McGraw-Hill Ryerson
Long, M., Microsoft Corporation, & VTC Incorporated, (2008). Microsoft Windows server 2008. S.l.: Virtual Training Co.