Business Requirements Report

FIND A SOLUTION AT Academic Writers Bay

Write a Business Requirements Report
Using the scenario information and the information provided to you by your assessor, write a short report that will be an overview of the current network infrastructure.
Your Business Requirements Report should include, as a minimum, the following:
Current servers
Operating system
Network topology – this could be in the form of a network diagram and must include:
Connected devices
Router, Switches, Gateways
Configuration layout
Firewall/Security
Server names
IP address information
Number of users/computers
Current hard disk space and available storage currently used for mail
CPU
Memory (RAM)
Bandwidth consumption
Internet server provider
Supported client operating system
Backup disk
Write a Server Identification Report
Describe the mail server that will be used with the existing network. For example, this may be Microsoft Exchange or Postifix.
Your description should include:
Mail server to be installed
Operating System
Memory (RAM)
CPU
Available space on Hard disk required
Backup capability
Security features
Remote access capabilities
Any network requirements specified for installation
Any software requirements specified for installation
Create an Implementation Plan
Create a Gantt chart that lists all the activities that will take place, along with the duration of tasks. Ensure that all activities are completed within the time-frame allocated.
The tasks that should be carried out include the following:
Preparation of existing network
Installation and configuration of mail servers
Configuration of users, mailboxes, address lists, distribution lists and user constraints
Configuration of mail-client access
Configuration of message integrity and anti-spam, antivirus and anti-phishing measures
Configuration of message transport to deliver mail within and outside enterprise
Monitoring of mail system performance
Implementation measures to provide high availability and data recovery
Configuration of mail server to provide remote access
Testing of functionality
Prepare the existing network
Complete the following activities to ensure that the existing network is ready to have a mail server installed.
Check whether the current system requires an upgrade
If an upgrade is required, upgrade it
Check what additional hardware needs to be upgraded, modified or purchased to support the new server and applications
Check whether a backup of the system been performed
Check whether a backup of the mailboxes/ data been performed
Check whether the current mailbox data is ready for migration
Review desktop configurations and operating systems to ensure they are compatible.
Check whether DNS requires configuration
Check whether there is a disaster recovery plan available for review
Check whether any remote or mobile connections are required
5.. Install the mail server
Install the mail server identified in the previous task. The installation steps will be dependent on the server being installed. Most will launch an installation wizard.
When the server has been installed, take a screen shot that verifies that the mail server has been installed.
Use AT2.5 Mail Server Installation Student to record the installation
6.Complete the following activity:
This activity requires you to write a Collaboration Software Report
Using the Content Management Software from your previous task, you are required to set up and configure one collaboration tool that will fulfil the requirements of the case study.
Provide a brief overview of the collaboration software that is being deployed.
Outline the steps taken to create a team or collaborative site that could be used for file sharing. (if a wizard is used to set up then include each final step in the configuration)
You should use screen shots that demonstrate that you have completed the following tasks:
Set up and configure the software for at least four users
Configure the privacy settings so that only the team can view and access the site or tool
Configure network domain services or connectivity services to enable file sharing
Chose site classification or security settings to ensure the safety of data and information being shared.
Make customisations to the software such as creating a group, adding a folder, changing themes, uploading a file, adding a page.
Monitor performance and logs
Implement measures to provide high availability and disaster recovery
Explain and demonstrate how to implement measures that will cover the following:
Data protection (such as human error, malicious attack, virus/malware, hardware failure, natural disaster, power outage)
Backup and frequency
How the software copes with performance, capacity, availability, acceptable downtime and availability.
Test functionality
The test plan should include functionality testing for at least two users and their:
ability to access a shared folder/files
ability to upload, delete, modify shared folders and files
Use the AT4 Collaboration Software Report Student to guide your work.
Save this document as AT4 Collaboration Software Report.
7. Configure the mail server
The steps for configuration will be dependent on whether a configuration wizard is launched or not. Whether this is a manual install or automatic install, take one screen shot of each final step to show that you have completed all the steps in the server configuration.
Write a Configuration Report
Dependent on how the server was installed and configured, you may be required to firstly set an admin password, web admin service and set up the Doman Name Resolver (DNR), before configuration can be undertaken.
Creating a domain (Adding a new domain will require the domain name and password. Only one domain is required)
Adding a user in a domain (add at least five users, each will require an account name and password.
Selecting a basic account type and default settings
Allowing and restricting user features (set restrictions for one user such as quota, or password restrictions)
Creating an address list (add at least five users)
Creating a distribution list (only one required)
SMTP (evidence to show configuration of one of the following: SMTP routing, activity logging, access control, usage restrictions, message acceptance policies, or any other relevant SMTP feature)
Anti-spam (define at least one setting for this feature)
Anti-virus (define at least one setting for this feature)
Anti-phishing (define at least one setting for this feature)
Message integrity (configuration will come with full security, therefore the screen shot should could include the set-up of at least three of the following: client authentication, certificates, encryption (such as SSL/TLS), message acceptance rules, anti-virus/anti-spam integration, routing rules, identity confirmation.
Set up remote access for web-based mail client
Evidence to show configuration of one of the following: listeners, HTTP protocol options, webmail options flow control, usage restrictions, access control for IP, Whitelisting or blacklisting, or any other relevant IMAP feature
Note that some of the above tasks will be pre-configured and set up during the installation and configuration of the mail server. Where this is the case, take a screen shot of the configuration that you have made.
Use AT2.7 Configuration Report to guide your work.
9 .Monitor system performance.
To ensure that the mail system is functioning correctly, you will need to monitor incoming and outgoing mail. Most email servers will have a reporting and monitoring feature available to support this process.
Take screen shots that show how the mail system is performing for at least one of the following:
connectivity, including mail clients to server, SMPT client to server, SMTP server to server
databases
mail flow
Create a new Word document that includes the screen shot(s).
Save the report as Performance Monitoring Report AT2.8.
10.Provide high data availability
Most email servers will have inbuilt features for high data availability.
If the server does not have this feature, then you will need to explain how the server can be configured to cope with high data availability.
Explain how the email server is able to cope with the following:
the event of a failure on one machine
service availability and continuity/database replication
You are required to use screen shots to illustrate your response where appropriate.

READ ALSO...   Threat Modelling Report
Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER