Solved

Brackets in Group names.

Posted on 2006-06-20
6
354 Views
Last Modified: 2012-05-05
Quick 50 points guys.

Is it generally not good practise to use Brackets () when naming security groups.

Like in active directory when creating a new group and naming it, should one use brackets in the name.
I was thinking of creating groups with names like:-

Server Access (Datacenter)
Server Access (Headquarters)

If its not advisable, what about:-

Server Access - Datacenter
Server Access - Headquarters


Just wanted to know if a naming convention should be followed when creating groups and adding members/users to the group!

Thanks folks!
0
Comment
Question by:dqnet
  • 4
  • 2
6 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 16941636
Personal preference = use underscores Ive done this for years and never had a problem Server_Access_Datacenter for example
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 50 total points
ID: 16941650
but to answer the question illegal charecrers for groups are the same as for files and folders :)

A group can contain any uppercase or lowercase characters except the following:

"   /    \    [    ]    :    ;    |    =    ,    +    *    ?    <    >
0
 

Author Comment

by:dqnet
ID: 16941656
Oh, all my other groups I just used a space..

So:-

SQL Server Access


Should I start renaming / fixing?
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 57

Expert Comment

by:Pete Long
ID: 16944435
no no thats fine :) as long as there are no charecters that are illegal :)

spaces are fine - otherwise there couldnt be a power users group or a domain administrators group etc
0
 

Author Comment

by:dqnet
ID: 16949512
:)

Top man Pete! Cheers!
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 16953509
Thanq
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

The HP utility "HP Lights-Out Online Configuration Utility for Windows Server 2003/2008" could be of great use when it comes to remotely configure a HP servers ILO WITHOUT rebooting the server. We would only need to create and run scripts using thi…
by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now