57.0k views
2 votes
Scenario: Full Office Deployment Proposal

Your company has made the decision to open new office space at the Hukilau Marketplace located at 55-370 Kamehameha Hwy, Laie, HI. 96762. The new space will occupy 7,000 square feet and 45 employees. The space will serve as a hybrid call center that includes several tourist guide stations providing assistance, information on cultural, historical, and contemporary heritage to people looking for guided sightseeing tours.

Create a proposal including the following elements that will be part of your full office deployment using best practices:

Server Architecture and Server Baseline

Storage Capacity

Hardware and Software Troubleshooting

Server Backup/Restore

Encrypted File System

Security Protection

Server Hardening

Users and Groups for Active Directory

Principle of Least Privilege

Disaster Recovery

1 Answer

6 votes

Final answer:

The proposal for the new office space includes setting up a well-planned server architecture with sufficient storage capacity, implementing troubleshooting processes, ensuring data security through EFS, server hardening, and robust security protection, plus establishing an Active Directory while following the Principle of Least Privilege and preparing a detailed disaster recovery plan.

Step-by-step explanation:

Full Office Deployment Proposal

For the new office space at the Hukilau Marketplace, a comprehensive server architecture is essential to support the hybrid call center and guide stations. The server baseline should accommodate the data needs of 45 employees, with expansion possibilities. A tiered storage solution could effectively balance cost and performance, starting with an estimated 10TB of capacity for files, databases, and backups.

For hardware and software troubleshooting, a robust support system with a ticketing process will ensure timely resolutions. Implementing server backup/restore protocols, possibly offsite or in cloud services, will guarantee data preservation. To protect sensitive information, an Encrypted File System (EFS) alongside comprehensive security protection measures, like firewalls and intrusion detection systems, should be in place. Server hardening practices, such as removing unnecessary services and continuous monitoring, will fortify infrastructure against threats.

Creating Users and Groups within Active Directory will streamline management while adhering to the Principle of Least Privilege, ensuring employees have the minimal access necessary to perform their tasks. A disaster recovery plan, including frequent testing of backups and redundancy strategies, will secure the office's operational integrity against various scenarios.

User Andrew Barr
by
8.6k points