Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment -

Overview - Here are some general requirements for this assignment:

You will create a set of scripts for managing Active Directory (AD) User Accounts on your Windows domain or another server, as specified in the scripts' parameters. From a highlevel perspective, these scripts will manage user account querying, creation, and deletion. In the real world, additional scripts and capabilities would be useful to implement as well.

Your scripts will be written to interact with whatever server is specified in the pServer parameter for each script, and to use the credentials of whatever user is specified in the pCredential parameter of each script. These do not accept input from the pipeline. The server parameter is optional, and has a default of "10.8.10.75". The credential parameter is mandatory, and, if not specified on the command-line, the default credential should be obtained by prompting for it via get-credential.

Your scripts will be able to manage Active Directory user accounts on any server for which you are authorized. You should test to make sure that you can run your scripts on your Windows machines, and that they work interacting with AD on your WS and on my server. My Powershell server has special accounts, OUs, and permissions for you to manage accounts within your OU, so you should be especially careful to test them there. Of course, because it has a private IP address, in order for your script(s) to interact with this computer you will have to be on another machine within the private class network we have been using all semester - your cloned Windows Server and Windows Client are the two best options for this.

You have been given an account and organizational unit (OU) on my server through which and within which you may manage accounts. Specifically, any accounts you create on my machine will reside only within your specified OU. All student accounts and OU's will reside within a top-level OU on my machine named "STAR_2018_1". For instance, a student by the name of "Han Solo" would have an account on this server named "TEST_SoloHa" and would manage an OU on this server named "TESTOU_SoloHa". Notice that this is the normal LLLLFF naming convention, but with "TEST_" or "TESTOU_" added on the front. You cannot actually log in to my server; rather, you will perform all work remotely by issuing Powershell AD commands from the command-line, and, ultimately, from within your scripts.

Because you will be managing accounts only in your specific Active Directory Organizational Unit on my machine, your scripts will also all need to be able to optionally specify a "path" or OU designation in which they should work. See the individual script specifications below for more details.

You will name the scripts exactly as named in the detailed instructions below. Notice that these names have simple hyphens (dashes) in them. Be sure to name them correctly, including upper/lower-case / CamelCase style. They will, with some small variations as described below, follow the standard Powershell cmdlet "verb-noun" naming convention.

You will name the script parameters exactly as named in the detailed instructions below. Notice that these names all start with "p" (for "parameter"). They must be named exactly as shown in the instructions, or my automated grading script will not be able to run your scripts correctly and you will lose (many!) points.

You will create a group of scripts. The group is named "A". The set of scripts within this group are designed to manage querying, creating, and removing user accounts in Active Directory, working together to provide the full functionality desired. The scripts in this group work together, some depending on others to provide functionality. Thus, for example, if your user query script doesn't work, or doesn't work correctly, then it is likely that your user removal script may not work as expected/required and vice versa. However, each script will be graded and awarded points independently (as much as possible, given the interdependencies among them).

Any time a script refers generically to "Account Name" or "Name", we will use SAMAccountName as the unique identifier. When specified, however, we will use the specified unique identifier. (Ex: DistinguishedName, etc).

These scripts will function as "cmdlets", not as "functions".

You will use the BEGIN, PROCESS, and END block design when building your scripts.

You will implement the specified named parameters and ability to pipe certain types of information into your scripts. You will implement parameters via the "CmdletBinding" and "param" / "Parameter" blocks in your script.

You will generate a single consistent kind of output to the pipeline for each script, so that it can be used as a general-purpose tool. The exact kind of output is specified in the description for each script.

You will generate "Verbose" output via the Write-Verbose mechanism when the user specifies the "- Verbose" common parameter.

You will generate "Error" output via the Write-Error mechanism.

You will handle errors "gracefully" so that your scripts don't crash; rather, they continue processing additional data, as appropriate, but send error information to the error pipeline via Write-Error. Try-Catch and If statements are the standard ways that you will do this, depending on the type of error that needs to be handled. Powershell's WarningAction, ErrorAction, and Trap are also helpful techniques in some situations.

In addition to standard descriptive comment blocks and statements at the beginning of and throughout your scripts, you will also include comment blocks that will facilitate standard Powershell "Get-Help" functionality for your scripts.

Script Group: User Account Management

This set of scripts provides functionality to manage user accounts. It allows accounts to be created, listed, and removed. The three scripts you will create in this group are:

1. Get-User.ps1

2. New-User.ps1

3. Remove-User.ps1

In addition to the general requirements detailed above.

Attachment:- Assignment File.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92773323

Have any Question?


Related Questions in Computer Engineering

Suppose users share a 3 mbps link also suppose each user

Suppose users share a 3 Mbps link. Also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time. When circuit switching is used, how many users can be supported? For the ...

Question high-performing teambullimagine that you are an

Question: "High-Performing Team" • Imagine that you are an agile coach. Outline a plan that sets the expectations for your team when beginning a project. Provide a rationale for your response. • Read the mini-case titled ...

Calculate the probability of selecting a random sample of

Calculate the probability of selecting a random sample of 225 observations with a sample proportion of 0.54 or greater, if the sample population has a population proportion of 0.50.

Stepscreate a java project in eclipse called lab 2 next

Steps: Create a Java project in Eclipse, called Lab 2. Next create a java class called Dashboard. It should extend javafx.application.Application. This will be the main GUI for your lab, and it should use a VBox as the r ...

Task the first task is to create your business narrative

Task The first task is to create your business narrative. Some of the questions that you should address include (but are not limited to) the following. •What is the name of your business? •Who will be the users of the sy ...

A a simple encryption of a character a can be performed by

a) A simple encryption of a character A can be performed by exclusive-ORing A with some key K to produce the encrypted value E. The original value A can be recovered by exclusive-ORing again with the same key. Write a c/ ...

Penetration testing is a technique used to identify

Penetration testing is a technique used to identify security weaknesses in your network. Discuss a type of penetration testing and the different methods utilized to recognize vulnerabilities in your network.

Question what is stuxnet and what are its real-world

Question : What is Stuxnet and what are its real-world implications? Should your national government be concerned about the potential of a Stuxnet-like attack? Why or why not.

What is the purpose of load balancing i need full

What is the purpose of load balancing? (I need full explanation) I already know what load balancing is, I just need to know why we use it

Why would a policy of re-importation of prescription drugs

Why would a policy of re-importation of prescription drugs be ineffective?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As