SlideShare a Scribd company logo
1 of 12
Upgrade of Small Elementary
    School’s Technology
At Start
•   Wired network consisting of several switches
•   No border protection
•   1 windows server 2000 non AD enabled
•   50-60 windows 98, Millennium, and XP clients
•   Workgroup network design
•   No backup solution
•   No antivirus solution
•   No filtering solution
•   Low budgetary allowance
Considerations
• Budgetary constraints allow best case
  scenarios as opposed to ideal scenarios
• Technology upgrade
• Ease of administration
• Regulatory Compliance
Goals
•   Implement wireless network
•   Border protection
•   Implement centralized server solution
•   Upgrade existing client technology
•   Implement cost effective backup solution
•   Implement antivirus solution
•   Implement filtering solution
Implement Wireless Network
• Devices should be able to roam seamlessly
  across campus
• Site survey
• Implementation and testing
• Result: Freedom of movement
Border Protection
• Port blocking implemented on border device
• Administrator trained in use and concepts
• Result: Attack surface reduced
Centralized Server Solution
• Select appropriate hardware and install
• Train administrator on active directory
  concepts, user management, policy use and
  proper OU structure
• Design an effective OU structure, user
  management polices and other aspects that fit
  the clients needs and help alleviate future
  difficulties when the time for change comes
Centralized Server Solution 2
•   Install active directory and related services
•   Implement file server role
•   Implement user management
•   Implement print server role
•   Centralize user file management
•   Implement access control policies concerning
    centralized user data
Centralized Server Solution 3
• Result: Almost all user created data stored in a
  centralized solution due to polices directing user
  storage
• Result: Users are now managed centrally
• Result: User access to data now under the control of
  the Administrator in a centralized location, access
  control allows protection plus oversight of data
• Result: Users now have ability to print from any
  location on campus to any location on campus
• Result: Administrator now has control over the vast
  array of policies active directory offers
Upgrade Existing Client Technology
• Replace all older hardware and software with
  newer replacements allowing implementation
  of active directory policies
• Result: New technology equals more
  productivity
Implement Antivirus Solution
• Deploy server, and arrange policies for
  Symantec Endpoint protection
• Train administrator in use of Symantec
  Endpoint protection
• Result: Vast improvement in potential for
  security across the board
Implement Filtering
• Implement free proxy server software
  DansGuardian
• Implement squid proxy software
• Implement via active directory policies
  enforced use of proxy
• Result: Administrative control over internet
  content accessed by users

More Related Content

What's hot

Final presentation
Final presentationFinal presentation
Final presentation
spcslides
 

What's hot (15)

Windows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte KachelnWindows 10: Mehr als viele bunte Kacheln
Windows 10: Mehr als viele bunte Kacheln
 
Open Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation SecurityOpen Architecture: The Key to Aviation Security
Open Architecture: The Key to Aviation Security
 
MAS-presentation-v22sep
MAS-presentation-v22sepMAS-presentation-v22sep
MAS-presentation-v22sep
 
The Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and ComplianceThe Cloud, Cold Chain, and Compliance
The Cloud, Cold Chain, and Compliance
 
A Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 EA Few Things You Might Not Know About Elite 3 E
A Few Things You Might Not Know About Elite 3 E
 
Datacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda ContentDatacentre Relocation Workshop Agenda Content
Datacentre Relocation Workshop Agenda Content
 
Virtualization infrastructure governance policies Gargee S Hiray
Virtualization infrastructure governance policies  Gargee S HirayVirtualization infrastructure governance policies  Gargee S Hiray
Virtualization infrastructure governance policies Gargee S Hiray
 
Open Daylight Forum India 2015
Open Daylight Forum India 2015Open Daylight Forum India 2015
Open Daylight Forum India 2015
 
Benefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional ITBenefits of cloud hosting solutions over traditional IT
Benefits of cloud hosting solutions over traditional IT
 
Elements of a Good Information System
Elements of a Good Information SystemElements of a Good Information System
Elements of a Good Information System
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Hosting facilities for companies
Hosting facilities for companiesHosting facilities for companies
Hosting facilities for companies
 
Panda Security - Systems Management
Panda Security - Systems ManagementPanda Security - Systems Management
Panda Security - Systems Management
 
AMS Net iq
AMS Net iqAMS Net iq
AMS Net iq
 

Similar to Upgrade of small elementary school’s technology

JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)
Jim Abshire
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 

Similar to Upgrade of small elementary school’s technology (20)

VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective VMworld 2013: VMware NSX: A Customer’s Perspective
VMworld 2013: VMware NSX: A Customer’s Perspective
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
RPASS - Ricoh Proactive ServiceS for Remote Monitoring & Backup
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
How to get the most out of your existing DCS
How to get the most out of your existing DCSHow to get the most out of your existing DCS
How to get the most out of your existing DCS
 
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications:Blue/Green and Canary DeploymentsContinuous Delivery of Cloud Applications:Blue/Green and Canary Deployments
Continuous Delivery of Cloud Applications: Blue/Green and Canary Deployments
 
JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)JAMES ABSHIRE-Resume (2)
JAMES ABSHIRE-Resume (2)
 
IPAM Security Considerations
IPAM Security ConsiderationsIPAM Security Considerations
IPAM Security Considerations
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
GRANT DELP724
GRANT DELP724GRANT DELP724
GRANT DELP724
 
Cloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantagesCloud computing-its usage, working and advantages
Cloud computing-its usage, working and advantages
 
Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...Decentralized cloud firewall framework with resources provisioning cost optim...
Decentralized cloud firewall framework with resources provisioning cost optim...
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Deployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG TechnologiesDeployment of Juniper Contrail in AVG Technologies
Deployment of Juniper Contrail in AVG Technologies
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
VMworld 2013: Symantec’s Real-World Experience with a VMware Software-Defined...
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Upgrade of small elementary school’s technology

  • 1. Upgrade of Small Elementary School’s Technology
  • 2. At Start • Wired network consisting of several switches • No border protection • 1 windows server 2000 non AD enabled • 50-60 windows 98, Millennium, and XP clients • Workgroup network design • No backup solution • No antivirus solution • No filtering solution • Low budgetary allowance
  • 3. Considerations • Budgetary constraints allow best case scenarios as opposed to ideal scenarios • Technology upgrade • Ease of administration • Regulatory Compliance
  • 4. Goals • Implement wireless network • Border protection • Implement centralized server solution • Upgrade existing client technology • Implement cost effective backup solution • Implement antivirus solution • Implement filtering solution
  • 5. Implement Wireless Network • Devices should be able to roam seamlessly across campus • Site survey • Implementation and testing • Result: Freedom of movement
  • 6. Border Protection • Port blocking implemented on border device • Administrator trained in use and concepts • Result: Attack surface reduced
  • 7. Centralized Server Solution • Select appropriate hardware and install • Train administrator on active directory concepts, user management, policy use and proper OU structure • Design an effective OU structure, user management polices and other aspects that fit the clients needs and help alleviate future difficulties when the time for change comes
  • 8. Centralized Server Solution 2 • Install active directory and related services • Implement file server role • Implement user management • Implement print server role • Centralize user file management • Implement access control policies concerning centralized user data
  • 9. Centralized Server Solution 3 • Result: Almost all user created data stored in a centralized solution due to polices directing user storage • Result: Users are now managed centrally • Result: User access to data now under the control of the Administrator in a centralized location, access control allows protection plus oversight of data • Result: Users now have ability to print from any location on campus to any location on campus • Result: Administrator now has control over the vast array of policies active directory offers
  • 10. Upgrade Existing Client Technology • Replace all older hardware and software with newer replacements allowing implementation of active directory policies • Result: New technology equals more productivity
  • 11. Implement Antivirus Solution • Deploy server, and arrange policies for Symantec Endpoint protection • Train administrator in use of Symantec Endpoint protection • Result: Vast improvement in potential for security across the board
  • 12. Implement Filtering • Implement free proxy server software DansGuardian • Implement squid proxy software • Implement via active directory policies enforced use of proxy • Result: Administrative control over internet content accessed by users