What should you include in the recommendation?
###BeginCaseStudy###
Case Study: 15
Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main
office is located in New York. The branch office is located in Sydney. The main office has
5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch
office. Only members of the local Administrators group can run App2. Proseware is
evaluating whether to deploy virtual desktop pools. The virtual desktop pools must meet the
following requirements:
• Apply the settings in GPO1 to the virtual machines (VMs).
• Prevent the VMs from receiving the Automatic Updates settings from GP02,
• Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes
corrupt.
• Minimize the amount of storage used to support the VMs.
• Minimize the amount of memory and CPU resources used by the VMs.
• Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3). All of the client computers in the main
office are configured as Microsoft Enterprise Desktop Visualization (MED-V) and Microsoft
Application Virtualization (App-V) clients. A two-node Hyper-V cluster is deployed in the
main office. The cluster uses Clustered Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The
functional level of the forest is Windows Server 2008. The relevant organizational units
(OUs) for the domain are configured as shown in the following table.
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains
corporate computer security settings. A custom GPO named GP02 is linked to both office
OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
• WSUS
• Hyper-V
• File Services
• Remote Desktop Web Access (RD Web Access)
• Remote Desktop Session Host (RD Session Host)
• Remote Desktop Virtualization Host (RD Virtualization Host)
• Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they
must automatically receive the local administrator rights to that computer. When users logs
off, they must lose the administrator rights. The disk space on all file servers must be
monitored. If any file server has less than 20% free disk space on a volume, a script must run
that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users
in the legal department. Legal department users report that it takes a long time to locate files
in the Legal share by using keyword searches.
###EndCaseStudy###
You need to recommend a VHD configuration for the virtual desktop pool VMs. What should you
include in the recommendation?
What should you recommend?
###BeginCaseStudy###
Case Study: 15
Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main
office is located in New York. The branch office is located in Sydney. The main office has
5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch
office. Only members of the local Administrators group can run App2. Proseware is
evaluating whether to deploy virtual desktop pools. The virtual desktop pools must meet the
following requirements:
• Apply the settings in GPO1 to the virtual machines (VMs).
• Prevent the VMs from receiving the Automatic Updates settings from GP02,
• Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes
corrupt.
• Minimize the amount of storage used to support the VMs.
• Minimize the amount of memory and CPU resources used by the VMs.
• Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3). All of the client computers in the main
office are configured as Microsoft Enterprise Desktop Visualization (MED-V) and Microsoft
Application Virtualization (App-V) clients. A two-node Hyper-V cluster is deployed in the
main office. The cluster uses Clustered Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The
functional level of the forest is Windows Server 2008. The relevant organizational units
(OUs) for the domain are configured as shown in the following table.
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains
corporate computer security settings. A custom GPO named GP02 is linked to both office
OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
• WSUS
• Hyper-V
• File Services
• Remote Desktop Web Access (RD Web Access)
• Remote Desktop Session Host (RD Session Host)
• Remote Desktop Virtualization Host (RD Virtualization Host)
• Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they
must automatically receive the local administrator rights to that computer. When users logs
off, they must lose the administrator rights. The disk space on all file servers must be
monitored. If any file server has less than 20% free disk space on a volume, a script must run
that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users
in the legal department. Legal department users report that it takes a long time to locate files
in the Legal share by using keyword searches.
###EndCaseStudy###
You need to recommend a solution to provision new Applications on the VMs for the planned virtual
desktop pool deployment. What should you recommend?
What should you include in the recommendation?
###BeginCaseStudy###
Case Study: 15
Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main
office is located in New York. The branch office is located in Sydney. The main office has
5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch
office. Only members of the local Administrators group can run App2. Proseware is
evaluating whether to deploy virtual desktop pools. The virtual desktop pools must meet the
following requirements:
• Apply the settings in GPO1 to the virtual machines (VMs).
• Prevent the VMs from receiving the Automatic Updates settings from GP02,
• Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes
corrupt.
• Minimize the amount of storage used to support the VMs.
• Minimize the amount of memory and CPU resources used by the VMs.
• Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3). All of the client computers in the main
office are configured as Microsoft Enterprise Desktop Visualization (MED-V) and Microsoft
Application Virtualization (App-V) clients. A two-node Hyper-V cluster is deployed in the
main office. The cluster uses Clustered Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The
functional level of the forest is Windows Server 2008. The relevant organizational units
(OUs) for the domain are configured as shown in the following table.
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains
corporate computer security settings. A custom GPO named GP02 is linked to both office
OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
• WSUS
• Hyper-V
• File Services
• Remote Desktop Web Access (RD Web Access)
• Remote Desktop Session Host (RD Session Host)
• Remote Desktop Virtualization Host (RD Virtualization Host)
• Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they
must automatically receive the local administrator rights to that computer. When users logs
off, they must lose the administrator rights. The disk space on all file servers must be
monitored. If any file server has less than 20% free disk space on a volume, a script must run
that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users
in the legal department. Legal department users report that it takes a long time to locate files
in the Legal share by using keyword searches.
###EndCaseStudy###
You need to recommend a solution for configuring the Automatic Updates settings on the VMs.
What should you include in the recommendation?
What should you recommend configuring?
###BeginCaseStudy###
Case Study: 15
Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main
office is located in New York. The branch office is located in Sydney. The main office has
5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch
office. Only members of the local Administrators group can run App2. Proseware is
evaluating whether to deploy virtual desktop pools. The virtual desktop pools must meet the
following requirements:
• Apply the settings in GPO1 to the virtual machines (VMs).
• Prevent the VMs from receiving the Automatic Updates settings from GP02,
• Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes
corrupt.
• Minimize the amount of storage used to support the VMs.
• Minimize the amount of memory and CPU resources used by the VMs.
• Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3). All of the client computers in the main
office are configured as Microsoft Enterprise Desktop Visualization (MED-V) and Microsoft
Application Virtualization (App-V) clients. A two-node Hyper-V cluster is deployed in the
main office. The cluster uses Clustered Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The
functional level of the forest is Windows Server 2008. The relevant organizational units
(OUs) for the domain are configured as shown in the following table.
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains
corporate computer security settings. A custom GPO named GP02 is linked to both office
OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
• WSUS
• Hyper-V
• File Services
• Remote Desktop Web Access (RD Web Access)
• Remote Desktop Session Host (RD Session Host)
• Remote Desktop Virtualization Host (RD Virtualization Host)
• Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they
must automatically receive the local administrator rights to that computer. When users logs
off, they must lose the administrator rights. The disk space on all file servers must be
monitored. If any file server has less than 20% free disk space on a volume, a script must run
that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users
in the legal department. Legal department users report that it takes a long time to locate files
in the Legal share by using keyword searches.
###EndCaseStudy###
You need to recommend a solution for managing administrative rights for the branch office client
computers. The solution must meet the company’s technical requirements. What should you
recommend configuring?
What should you include in the recommendation?
###BeginCaseStudy###
Case Study: 15
Proseware, Inc
Scenario
COMPANY OVERVIEW
Proseware, Inc. is a publishing company that has a main office and a branch office. The main
office is located in New York. The branch office is located in Sydney. The main office has
5,000 users. The branch office has 1,000 users.
PLANNED CHANGES
Proseware plans to deploy a new 64-bit Application named App2 to 10 users in the branch
office. Only members of the local Administrators group can run App2. Proseware is
evaluating whether to deploy virtual desktop pools. The virtual desktop pools must meet the
following requirements:
• Apply the settings in GPO1 to the virtual machines (VMs).
• Prevent the VMs from receiving the Automatic Updates settings from GP02,
• Ensure that only the host VM is affected if a virtual hard disk (VHD) file becomes
corrupt.
• Minimize the amount of storage used to support the VMs.
• Minimize the amount of memory and CPU resources used by the VMs.
• Minimize administrative effort.
EXISTING ENVIRONMENT
All servers run either Windows Server 2008 or Windows Server 2008 R2. All of the client
computers in the main office run Windows 7. All of the client computers in the branch office
run Windows XP (x86) with Service Pack 3 (SP3). All of the client computers in the main
office are configured as Microsoft Enterprise Desktop Visualization (MED-V) and Microsoft
Application Virtualization (App-V) clients. A two-node Hyper-V cluster is deployed in the
main office. The cluster uses Clustered Shared Volumes.
Existing Active Directory/Directory Services
The network contains a single Active Directory domain named proseware.com. The
functional level of the forest is Windows Server 2008. The relevant organizational units
(OUs) for the domain are configured as shown in the following table.
A custom Group Policy object (GPO) named GPO1 is linked to the domain, GPO1 contains
corporate computer security settings. A custom GPO named GP02 is linked to both office
OUs. GP02 contains Windows Server Update Services (WSUS) settings.
Existing Network Infrastructure
Each office has servers that have the following server roles or role services installed:
• WSUS
• Hyper-V
• File Services
• Remote Desktop Web Access (RD Web Access)
• Remote Desktop Session Host (RD Session Host)
• Remote Desktop Virtualization Host (RD Virtualization Host)
• Remote Desktop Connection Broker (RD Connection Broker)
REQUIREMENTS
Technical Requirements
When users interactively logs on to any of the client computers in the branch office, they
must automatically receive the local administrator rights to that computer. When users logs
off, they must lose the administrator rights. The disk space on all file servers must be
monitored. If any file server has less than 20% free disk space on a volume, a script must run
that deletes temporary files.
Problem Statements
The main office has a shared folder named Legal. The Legal share is only accessed by users
in the legal department. Legal department users report that it takes a long time to locate files
in the Legal share by using keyword searches.
###EndCaseStudy###
Users frequently search for documents from the Start menu or in Windows Explorer. You need to
recommend a solution to minimize the amount of time it takes for users in the Legal department to
locate tiles stored on the Legal share. What should you include in the recommendation?
What should you include in the recommendation?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to recommend changes to the intranet site that meet the company’s technical
requirements. What should you include in the recommendation?
What should you recommend?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to recommend a deployment strategy for App1. What should you recommend?
Which technical requirement is NOT met by a HyperV deployment?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You are evaluating whether to deploy Hyper-V. Which technical requirement is NOT met by a HyperV
deployment?
You need to identify each help desk user who bypasses the new corporate security policy
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to identify each help desk user who bypasses the new corporate security policy. What
should you do?
Which tool should you identify?
###BeginCaseStudy###
Case Study: 16
Trey Research
Scenario
COMPANY OVERVIEW
Trey Research is a pharmaceutical company that has a main office and two branch offices.
The main office is located in Denver. The branch offices are located in New York and
Seattle. The main office has 10,000 users. Each branch office has approximately 200 users.
PLANNED CHANGES
You plan to deploy a new Application named App1. App1 is developed in-house. The binary
executables and support files for App1 contain sensitive intellectual property. Users must
access App1 through document invocation. The users must be prevented from directly
copying or accessing the App1 program files.
EXISTING ENVIRONMENT
The network contains a single Active Directory domain named treyresearch.com. All servers
run Windows Server 2008 R2. All client computers run Windows 7 Enterprise. The network
contains a Web server named Web1 that hosts an intranet site. All users use Web1. Users
report that access to the content on Web1 is slow. You discover that the CPU utilization of
Web1 is approximately 90 percent during peak hours. Microsoft System Center
Configuration Manager is used to deploy updates to all of the client computers.
Existing Network Infrastructure
Each office has several file servers. The file servers have a limited amount of storage space.
Users access the data on all of the file servers. Each branch office has a WAN link to the
main office. Users in the branch office frequently access the file server in the main office.
Current Administration Model
All servers are currently administered remotely by using Remote Desktop. Help desk users
perform the following administrative tasks in the domain:
• Manage printers.
• Create shared folders.
• Manage Active Directory users.
• Modify file permissions and share permissions.
All of the help desk users are members of a global group named HelpDesk. Business Goals.
Trey Research has the following business goals:
• Minimize the cost of making changes to the environment.
• Minimize the cost of managing the network infrastructure and the servers
REQUIREMENTS
Technical Requirements
Trey Research plans to Virtualize all of the servers during the next three years. Trey
Research must meet the following technical requirements for virtualization:
• Simplify the management of all hardware.
• Allocate CPU resources between virtual machines (VMs).
• Ensure that the VMs can connect to multiple virtual local area networks (VLANs).
• Minimize the amount of administrative effort required to convert physical servers to
VMs.
Trey Research must ensure that users can access content in the shared folders if a single
server fails. The solution must also reduce the amount of bandwidth used to access the shared
folders from the branch offices. Trey Research must meet the following technical
requirements for the intranet site:
• Improve response time for users.
• Provide redundancy if a single server fails.
Security Requirements
A new corporate security policy states that only Enterprise Administrators are allowed to
interactively log on to servers.
User Requirements
Users report that it is difficult to locate files in the shared folders across the network. The
users want a single point of access for all of the shared folders in the company.
###EndCaseStudy###
You need to identify which tool the help desk users must use to perform administrative tasks. Which
tool should you identify?