Chase Olson
Chase Olson

System Administrator

Systems Engineer

Network Engineer

Cloud Engineer

Cyber Security

0

No products in the cart.

Chase Olson

System Administrator

Systems Engineer

Network Engineer

Cloud Engineer

Cyber Security

Active Directory Re-Architecture and Group Policy Implementation

  • Project Lead Chase Olson
  • Client Celestica
  • Date Oct 2024 - Dec 2024
  • Coffee Consumed 140 Cups

Led the re-architecture of Active Directory (AD) to organize resources and users for optimal security and access management. Replaced direct user assignments with security group associations to enforce best practices for design and implementation for a client.

  • Security Group-Based Access Control: Implemented a security group model to manage access to file shares, applications, and network printers. Group memberships were assigned based on roles and departments, ensuring a scalable and secure approach to resource provisioning.
  • Role-Based Resource Management: Utilized security groups to automate access provisioning for shared applications, file shares, and network resources, eliminating manual configurations and enhancing operational efficiency.
  • Optimized Device Policies: Applied security group filtering for Group Policy Objects (GPOs) to enforce device-specific configurations, such as encryption, software deployment, and network access control, based on department or usage needs.
  • Enhanced Security and Compliance: Strengthened compliance by enforcing password policies, access restrictions, and encryption through security group-filtered GPOs, aligning with organizational and regulatory requirements.
  • Testing and Validation: Conducted comprehensive testing to validate security group memberships and GPO application, ensuring seamless access to necessary resources while maintaining strict security controls.
  • Documentation and Training: Authored detailed documentation on security group configurations and trained IT staff on maintaining and managing the updated AD architecture effectively.
  • Improved Efficiency: Streamlined access management and reduced administrative overhead by shifting to security group-based assignments, aligning IT operations with organizational needs and strengthening overall security posture.