Solved

various Security Policies

Posted on 2004-05-03
2
429 Views
Last Modified: 2010-04-11
My Windows 2000 server manual does not give a clear understanding of the differences between :

i)  Local Security Policy

ii) Domain Security Policy

and

iii)Domain Controller security Policy

When would you want to use each?

Any assistance would be greatly appreciated.


Peter
0
Comment
Question by:Peter_Fabri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Assisted Solution

by:IceRaven
IceRaven earned 250 total points
ID: 10976335
Hi Peter_Fabri,

In essence, the difference is the order in which they are applied.

--Snip---

Domain Controller Security Policy applies only to the domain controllers
container while Domain Security Policy applies to the whole domain. However GP
is applied in this order local>site>domain>OU where a setting defined at the OU
level will override a setting defined at the domain level, etc. Therefore any
settings defined in the Domain Controller Security Policy will override any
identical settings defined at the domain level. There is on notable exception in
that password/account policy for domain  accounts can only be defined at the
domain level. To enable auditing for just domain  controllers, do it in the
Domain Controller Security Policy. To do it for other domain computers, do it at
the local, domain, or OU level based on your needs. Also when you enable
auditing it is an all or nothing deal. You will get the unwanted events along
with the ones you are looking for, though you can use filter view or programs
like Event Comb to scan multiple computers for certain events. Auditing of
account logon will not show user logoffs - you need to audit logon events for
that.

--Snip---

Hope that helps.


Cheers,
IceRaven
0
 
LVL 67

Accepted Solution

by:
sirbounty earned 250 total points
ID: 10976343
**With the local security policy, you can control:

Who accesses your computer.
What resources users are authorized to use on your computer.
Whether or not a user or group's actions are recorded in the event log.

**Group Policy is administered through the use of Group Policy Objects, data structures that are attached in a specific hierarchy to selected Active Directory Objects, such as Sites, Domains, or Organizational Units. These GPOs, once created, are applied in a standard order: LSDOU, which stands for (1) Local, (2)Site, (3)Domain, (4)OU, with the later policies being superior to the earlier applied policies.

When a computer is joined to a domain with the Active Directory and Group Policy implemented, a local Group Policy Object is processed. Note that LGPO policy is processed even when the Block Policy Inheritance option has been specified.

Local Group Policy Objects are processed first, and then domain policy. If a computer is participating in a domain and a conflict occurs between domain and local computer policy, domain policy prevails. However, if a computer is no longer participating in a domain, local Group Policy object is applied.

http://support.microsoft.com/?kbid=221930

**You can use Domain Controller Security Policy to create and manage security policies for domain controllers in the domain.

Screenshots of different policies:
http://www.comptechdoc.org/os/windows/win2kgraph/win2kdsp.html (domain)
http://www.comptechdoc.org/os/windows/win2kgraph/win2kdcsp.html (domain security)
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question