###BeginCaseStudy###
Case Study: 10
Litware Inc.
COMPANY OVERVIEW
Litwate Inc. is a manufacturing company that has a main office and four branch offices.
PLANNED CHANGES
Litware plans to deploy Group Policy object (GPOs). The planned deployment must meet the
following requirements:
Deploy a GPO to a client computer based on its respective local office.
Minimize the amount of administrative effort required to manage the GPOs.
Prevent the users m each department from receiving CPOs from other departments.
Deploy a GPO to a user based on his respective department.
Litware plans to change the name of AD.liteware.com to east.ktware.com. The planned change must
meet the following retirements:
Minimize administrative effort.
Minimize the impact on the users m AD.liteware.com.
Litware plans to deploy RemoteApp programs to meet the following requirements:
The RemoteApp programs must be visible from the Start menu on each client computer.
The RemoteApp programs must be published by using the minimum amount of administrative
effort.
Litware plans to deploy several Hyper-V servers that will host multiple virtual machines (VMs). The
deployment must meet the following requirements:
Minimize administrative effort.
Back up the VMs to a tape library.
Store all of the VM files on a Storage Area Network (SAN).
Convert all of the client computers in the finance department to a VM.
Litware plans to deploy a network access solution. The planned deployment must use the minimum
amount of administrative effort.
EXISTING ENVIRONMENT
All servers run Widows Server 2008 R2. All client computers run Windows 7.
Litware has three departments, including a finance department. Each department has users n each
office. The network contains a Microsoft Exchange Server 2010 organization.
Existing Active Directory Environment
The network contains a single Active Directory forest named litware.com. The Forest contains one
child domain named AD.litware.com and two other domains.
The functional level of the forest is Windows Server 2003.
A single Active Directory site exists for all of the offices.
Existing Network Infrastructure
The network contains an internal network and a perimeter network that are separated by a
hardware-based firewall. A hardware-based firewall also separates the perimeter network and the
Internet.
The following protocols on the default ports are allowed through the firewall that is connected to
the Internet:
HTTP
HTTPS
Point-To-Point Tunneling Protocol (PPTP)
Only the client computers on the perimeter network can connect to the client computers on the
internal network.
The perimeter network contains a VPN server. Users who work remotely use PPTP to establish VPN
connections to the network.
Current Administration Model
Each domain contains a file server that stores confidential documents.
Each domain has dedicated user Accounts for auditing purposes. The user accounts are only used for
auditing the company’s confidential documents.
SECURITY REQUIREMLNTS
The corporate security policy states the following requirements:
• Ensure that the latest windows updates are installed on all client computers.
• Ensure that Windows Firewall is enabled on every client computer that connects remotely.
• Prevent all client computers that do not comply with the security policy from connecting to
the internal servers.
The corporate auditing poky must meet the following requirements:
• Only the dedicated user accounts must be able access servers that contain confidential
documents.
• The dedicated user accounts must be assigned auditing rights as a group, not as individual
users.
• The number of groups that contain the dedicated user accounts must be minimized.
###EndCaseStudy###
You need to recommend a backup strategy for the VMs that supports the company’s planned
changes.
What should you include in the recommendation?
A.
Microsoft System Center Data Protection Manager
B.
Microsoft System Center Virtual Machine Manager (VMM)
C.
Storage Manager for SANs
D.
Windows Server Backup
http://thelazyadmin.com/blogs/thelazyadmin/archive/2008/10/06/backing-up-hyper-v-withwindows-serverbackup.aspx
http://blogs.technet.com/b/virtualization/archive/2008/08/29/backing-up-hyper-v-virtualmachines.aspx