SlideShare a Scribd company logo
1 of 12
Upgrade of Small Elementary
    School’s Technology
At Start
•   Wired network consisting of several switches
•   No border protection
•   1 windows server 2000 non AD enabled
•   50-60 windows 98, Millennium, and XP clients
•   Workgroup network design
•   No backup solution
•   No antivirus solution
•   No filtering solution
•   Low budgetary allowance
Considerations
• Budgetary constraints allow best case
  scenarios as opposed to ideal scenarios
• Technology upgrade
• Ease of administration
• Regulatory Compliance
Goals
•   Implement wireless network
•   Border protection
•   Implement centralized server solution
•   Upgrade existing client technology
•   Implement cost effective backup solution
•   Implement antivirus solution
•   Implement filtering solution
Implement Wireless Network
• Devices should be able to roam seamlessly
  across campus
• Site survey
• Implementation and testing
• Result: Freedom of movement
Border Protection
• Port blocking implemented on border device
• Administrator trained in use and concepts
• Result: Attack surface reduced
Centralized Server Solution
• Select appropriate hardware and install
• Train administrator on active directory
  concepts, user management, policy use and
  proper OU structure
• Design an effective OU structure, user
  management polices and other aspects that fit
  the clients needs and help alleviate future
  difficulties when the time for change comes
Centralized Server Solution 2
•   Install active directory and related services
•   Implement file server role
•   Implement user management
•   Implement print server role
•   Centralize user file management
•   Implement access control policies concerning
    centralized user data
Centralized Server Solution 3
• Result: Almost all user created data stored in a
  centralized solution due to polices directing user
  storage
• Result: Users are now managed centrally
• Result: User access to data now under the control of
  the Administrator in a centralized location, access
  control allows protection plus oversight of data
• Result: Users now have ability to print from any
  location on campus to any location on campus
• Result: Administrator now has control over the vast
  array of policies active directory offers
Upgrade Existing Client Technology
• Replace all older hardware and software with
  newer replacements allowing implementation
  of active directory policies
• Result: New technology equals more
  productivity
Implement Antivirus Solution
• Deploy server, and arrange policies for
  Symantec Endpoint protection
• Train administrator in use of Symantec
  Endpoint protection
• Result: Vast improvement in potential for
  security across the board
Implement Filtering
• Implement free proxy server software
  DansGuardian
• Implement squid proxy software
• Implement via active directory policies
  enforced use of proxy
• Result: Administrative control over internet
  content accessed by users

More Related Content

What's hot

Windows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte KachelnWindows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte KachelnA. Baggenstos & Co. AG
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Securityagoldsmith1
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceMichael Miller
 
A Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 EA Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 EBaker Robbins & Company
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentNeil Busby
 
Virtualization infrastructure governance policies Gargee S Hiray
Virtualization infrastructure governance policies  Gargee S HirayVirtualization infrastructure governance policies  Gargee S Hiray
Virtualization infrastructure governance policies Gargee S HirayGargee Hiray
 
Benefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional ITBenefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional ITINFOCHOLA SOLUTIONS PTE LTD
 
Elements of a Good Information System
Elements of a Good Information SystemElements of a Good Information System
Elements of a Good Information SystemMark John Ignacio
 
Final presentation
Final presentationFinal presentation
Final presentationspcslides
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc servicesElena Benson
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companiesSamrudhi Maknikar
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems ManagementPanda Security
 

What's hot (15)

Windows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte KachelnWindows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte Kacheln
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 
MAS-presentation-v22sep
MAS-presentation-v22sepMAS-presentation-v22sep
MAS-presentation-v22sep
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and Compliance
 
A Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 EA Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 E
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda Content
 
Virtualization infrastructure governance policies Gargee S Hiray
Virtualization infrastructure governance policies  Gargee S HirayVirtualization infrastructure governance policies  Gargee S Hiray
Virtualization infrastructure governance policies Gargee S Hiray
 
Open Daylight Forum India 2015
Open Daylight Forum India 2015Open Daylight Forum India 2015
Open Daylight Forum India 2015
 
Benefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional ITBenefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional IT
 
Elements of a Good Information System
Elements of a Good Information SystemElements of a Good Information System
Elements of a Good Information System
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companies
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems Management
 
AMS Net iq
AMS Net iqAMS Net iq
AMS Net iq
 

Similar to Upgrade of small elementary school’s technology

VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup Ricoh India Limited
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary DeploymentsPraveen Yalagandula
 
JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)Jim Abshire
 
IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security ConsiderationsAndreas Taudte
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesAbhishek kyal
 
Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...aish006
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12gameaxt
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesMarketingArrowECS_CZ
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consAmritpal Singh Bedi
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld
 

Similar to Upgrade of small elementary school’s technology (20)

VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
How to get the most out of your existing DCS
How to get the most out of your existing DCSHow to get the most out of your existing DCS
How to get the most out of your existing DCS
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
 
JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)
 
IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security Considerations
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
GRANT DELP724
GRANT DELP724GRANT DELP724
GRANT DELP724
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG Technologies
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
 

Recently uploaded

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Upgrade of small elementary school’s technology

  • 1. Upgrade of Small Elementary School’s Technology
  • 2. At Start • Wired network consisting of several switches • No border protection • 1 windows server 2000 non AD enabled • 50-60 windows 98, Millennium, and XP clients • Workgroup network design • No backup solution • No antivirus solution • No filtering solution • Low budgetary allowance
  • 3. Considerations • Budgetary constraints allow best case scenarios as opposed to ideal scenarios • Technology upgrade • Ease of administration • Regulatory Compliance
  • 4. Goals • Implement wireless network • Border protection • Implement centralized server solution • Upgrade existing client technology • Implement cost effective backup solution • Implement antivirus solution • Implement filtering solution
  • 5. Implement Wireless Network • Devices should be able to roam seamlessly across campus • Site survey • Implementation and testing • Result: Freedom of movement
  • 6. Border Protection • Port blocking implemented on border device • Administrator trained in use and concepts • Result: Attack surface reduced
  • 7. Centralized Server Solution • Select appropriate hardware and install • Train administrator on active directory concepts, user management, policy use and proper OU structure • Design an effective OU structure, user management polices and other aspects that fit the clients needs and help alleviate future difficulties when the time for change comes
  • 8. Centralized Server Solution 2 • Install active directory and related services • Implement file server role • Implement user management • Implement print server role • Centralize user file management • Implement access control policies concerning centralized user data
  • 9. Centralized Server Solution 3 • Result: Almost all user created data stored in a centralized solution due to polices directing user storage • Result: Users are now managed centrally • Result: User access to data now under the control of the Administrator in a centralized location, access control allows protection plus oversight of data • Result: Users now have ability to print from any location on campus to any location on campus • Result: Administrator now has control over the vast array of policies active directory offers
  • 10. Upgrade Existing Client Technology • Replace all older hardware and software with newer replacements allowing implementation of active directory policies • Result: New technology equals more productivity
  • 11. Implement Antivirus Solution • Deploy server, and arrange policies for Symantec Endpoint protection • Train administrator in use of Symantec Endpoint protection • Result: Vast improvement in potential for security across the board
  • 12. Implement Filtering • Implement free proxy server software DansGuardian • Implement squid proxy software • Implement via active directory policies enforced use of proxy • Result: Administrative control over internet content accessed by users