Professional Documents
Culture Documents
COMPANY PROFILE
The company is managed by Board of Directors, with Shri Kumar Mangalam Birla as the
chairman of the Board of Directors. Day to day affairs of the company is managed by a team
of professionals Executives headed by Shri Ratan Shah as the Director (Whole Time).
Hindalco in India enjoys a leadership position in aluminium and copper. The Company's
aluminium units across the country encompass the entire gamut of operations from bauxite
mining, alumina refining, aluminium smelting to downstream rolling, extrusions, foils and
alloy wheels, along with captive
power plants and coal mines. The Birla Copper unit produces copper cathodes, continuous
cast copper rods along with other by-products, including gold, silver and DAP fertilisers.
All of Hindalco's units are ISO 9001:2000, ISO 14001:2004 and OHSAS 18001 certified.
Several units have gone a step further with an Integrated Management System (IMS),
combining ISO 9001, ISO 14001 and OHSAS 18001 into one Business Excellence Model.
The company has been accorded the Star Trading House status in India. Its aluminium metal
is accepted for delivery under the High Grade Aluminium Contract on the LME (London
Metal Exchange), while its copper quality standards are also internationally recognised and
registered on the LME with
Grade “A” accreditation.
1
In Aluminum Market:
J2EE, Cold Fusion, ASP, Java (JSP, Servelet, EJB & Applet), JavaScript, PHP, XML,
VoiceXML, WAP.
Web Servers
· All popular web servers.
Database
· Sql server, MS SQL & Access, Cache.
2
1.5 POSITION OF ADITYA BIRLA GROUP:
(1) Largest producer of Viscose Staple Fiber with 20% global market share.
(2) Third largest manufacturer of Insulators.
(3) Fifth largest producer of Carbon Black.
(4)India’s largest integrated aluminum producer and among the world’s lowest cost
producers.
(5) Apparel/Garments- India’s premium branded apparel brand includes Louis Phillipe, Van
Hausan, Byford, Peter England & San Frisco.
(6) The group also has a significant presence in the Financial Sector, Power and
Telecommunications Sector in tie ups with giants like Birla Sun life Insurance (Canada),
Powergen Ltd. (U.K.) and AT&T (USA), Idea Cellular Limited.
Location of Renukoot:
Lying in the foothills of the Vindhya Range, Renukoot is about 160 km From Varanasi, and
260 km from Allahabad. It is well connected to these cities by beautiful metalled rods
passing through green forests.
3
CHAPTER-2
DOMAIN CONTROLLER
2.1 INTRODUCTION
On Windows Server Systems, a domain controller (DC) is a server that responds to security
authentication requests (logging in, checking permissions, etc.) within the Windows Server
domain.
In Windows NT, one domain controller per domain was configured as the Primary Domain
Controller (PDC); all other domain controllers were Backup Domain Controllers (BDC). A
BDC could authenticate the users in a domain, but all updates to the domain (new users,
changed passwords, group membership, etc) could only be made via the PDC, which would
then propagate these changes to all BDCs in the domain. If the PDC was unavailable (or
unable to communicate with the user requesting the change), the update would fail. If the
PDC was permanently unavailable (e.g. if the machine failed), an existing BDC could be
promoted to PDC. Because of the critical nature of the PDC, best practices dictated that the
PDC should be dedicated solely to domain services, and not used for file/print/application
services that could slow down or crash the system. Some network administrators took the
additional step of having a dedicated BDC online for the express purpose of being available
for promotion if the PDC failed.
Windows 2000 and later introduced Active Directory ("AD"), which largely eliminated the
concept of primary and backup domain controllers in favor of multi-master replication.
However, there are still a number of roles that only one domain controller can perform, called
the "Flexible Single Master Operation" roles (some of these roles must be filled by one DC
per domain, while others only require one DC per AD Forest). If the server performing one of
these roles is lost the domain can still function, and if the server will not be available again,
an administrator can designate an alternate DC to assume the role (a process known as
"seizing" the role). This is a procedure used at some schools and buisnesses.
Fig2.1:Domain Controller
2.2 SCOPE:
The scope of the project is to implement the Domain controller and Additional Domain
Controller. The Domain Controller would be used to implement the Desktops level security
through Group Policy objects centrally. This system will help us to manage the Password
Policy, Screen Saver lockout policy, Time Synchronization at desktop levels. The system will
also utilize to authenticate user at Domain Level.
4
2.2.1 PROJECT CATEGORY:
Implementation of Desktop level security through group policy.
2.2.2 PROJECT OBJECTIVE:
User level authentication and Implementation of Information Security Policy centrally.
2.3 SCHEDULE
Refer / attach/ embed project schedule.
5
2. Now Logoff and Login with Administrator Id and Password.
6
Do not use personal media i.e. USBs, external hard-drives, CDs/DVDs etc. on workstations
connected to the Corporate Network.
1. Screen Lockout Policy: The screen should be lockout after 10 minutes of idle.
2. Use is not able to add/remove software from systems.
3. All the systems are synchronize the time from server.
4. Password policy like
1 : Minimum 8 characters,
2 : If the password is worng more then 5 times then account has been locked out.
3: password must be change after 90 days.
2.10) SCREEN SHOTS OF THE DOMAIN CONTROLLER STEPS :
1 Change the domain in computer name change option and give the domain name as
Hil.com
Snapshot 2.1
2. Then reboot and give the EMP code and connect to our domain (HILRKTADC)
and change the password.
3. Then logon to administrator and then copy the old profile to new EMP Code profile.
7
Snapshot 2.2
4. Go to control panel then security center and then off the window firewall.
Snapshot 2.3
8
Snapshot 2.4
6. Lock the Local user and set the password of the local administrator.
9
Snapshot 2.5
7. Then reboot the system and logon to Emp code user and password and check the each
application of LAN like Oracle application. Lotus notes and maximo etc.
CHAPTER-3
3.1 INTRODUCTION
The previous subsection reviewed the domain policy configured by default for all new
domains. This subsection reviews the default DC policy, which specifies security settings for
all machines in the DC OU. By default, Windows 2000 DC computers are added to the DC
OU.
3.2 DEMONSTRATION
In this subsection, the Group Policy snap-in is demonstrated rather than the Active Directory
Users and Computers snap-in as the path to the default DC GPO.
2. From the Console menu, select Add/Remove Snap-in, and click the Add button.
3. From the Available Standalone Snap-in list, select Group Policy, and click the Add
button.
10
Snapshot 3.1
4. In the Select Group Policy Object dialog box, click the Browse button.
The default GPO selected when the group policy snap-in is added is the one for the local
computer. Double-click the GPO for the DC OU as shown in below.
Snapshot 3.2
Note that the default domain policy (reviewed in the previous subsection) is also listed here,
as well as a folder containing Group Policy objects for the DC OU.
1. In the Browse for a Group Policy Object dialog box, double-click the folder
containing the GPOs associated with the DC OU.
11
4. In the Add Standalone Snap-in dialog box, click Close.
In the results pane, notice that a Password Policy is not defined in the default DC
GPO, because password policy is defined for the entire domain in the default domain
GPO.
Snapshot 3.3
3. In the Console, navigate to Local Policies, and select User Rights Assignments.
In the results pane, note that user rights are configured in the default DC GPO. As
seen in the previous subsection, user rights are not defined in the default domain
GPO.
12
Snapshot 3.4
13
Snapshot 3.5
Snapshot 3.6
14
Snapshot 3.7
Snapshot 3.8
15
The below screen will appear.
Click on SEP-Packages
Snapshot 3.9
The below screen will appear.
Click on:- 256mb users Package
Snapshot 3.10
16
The below screen will appear.
Click on setup
Snapshot 3.11
Snapshot 3.12
17
Snapshot 3.13
CHAPTER-4
REQUIREMENTS OF DOMAIN CONTROLLER
18
Processor Intel 3 GHz on x64 only with the following
Pentium IV
3.0 GHz or
Above processors:
19
Training should be provided to Trainee.
The IT- skill development Program.
4.4 RESOURCE PLANNING AND MANAGEMENT
H/w - New Procrument.
S/w - Existing
Manpower - IT Staff and Trainee.
4.5 MANPOWER – TRAINING AND / OR RECRUITEMENT:
Training should be provided to Trainee.
The IT- skill development Program to conduct by IT Team.
4.6 INTERFACES
Internal Interfaces: Amol Anand, Jitendra Diwakar.
Team meetings—Periodicity: as per requirement.
Network administrator for Software CDs / Shared folder: Amol Anand,
Jitendra Diwakar..
Project Manager will interact with his reporting officer regarding progress of
the project.
External Interfaces: Head – IT Department (V K Dogra)
20
2. Desktop protected from Spyware.
3. Automated scanning Scheduled.
4. Automated Update Scheduled.
5. Administration Rights for uninstallation of antivirus revoked from users.
21
CHAPTER-5
CONCLUSION
5.1 SCOPE
Its application is in every industry that has a network established and needs to implement
security measures.
5.2 RELIABILITY:
Reliability of the software is the extent to which a program satisfies its specification and
fulfills the customer’s objectives. Reliable software is expected to perform its intended
function with required precision.
5.3 SCALIBITY:
Scalability is the extent to which the software can tolerate the external overweight without its
performance getting affected. These overweight can be number of users, processors speed
etc.
The techniques and control allied to small web applications do not scale upward well. It is not
uncommon for a simple web application grows significantly interconnections with existing
information’s systems, databases, and portal gateway are implemented. As size and
complexity grows, can have small change can have far-reaching and unintended effect that
can be problematic. Therefore the rigor of configuration control mechanisms should be
directly proportional to application scale.
22
Thus delatailed study of Domain Controller has been conducted and checked with the
implementation of Symantec Antivirus installation.
CHAPTER-6
23
1. Windows Server 2003 Deployment Kit: Designing and Deploying Directory and Security
Services http://www.microsoft.com/downloads/details.aspx?FamilyID=6CDE6EE7-5DF1-
4394-92ED-2147C3A9EBBE&displaylang=en#filelist
9. NetWare Add-on
Services http://www.microsoft.com/ntserver/techresources/interop/netware/AddonService
s.asp
24