?
Solved

Group Policy Question

Posted on 2008-10-16
2
Medium Priority
?
241 Views
Last Modified: 2010-03-17
AD USers and Computers:
1. Created OU called Circulation
2.moved 5 users from Users to Circulation OU
3.opened GP Management
4.created policy linked to Circulation OU

Question: Security filtering has Authenticated users. Do I remove that entry? Do I have to add the 5 users from Circulation OU there?

Whats the point of moving those 5 users into the Circulation OU if i have to add them to the policy security filtering anyway? Seems so redundant.
0
Comment
Question by:zen_68
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 1000 total points
ID: 22731998
The fact that "authenticated users" is in there means that be default it applies to all the members of the OU. LEAVE IT ALONE. Security filtering should only be used in extreme cases and as a last resort where you want to prevent some members in an OU from getting a policy and there is no other option available.
0
 

Author Comment

by:zen_68
ID: 22732560
KCTS, thank you. That makes perfect sense now. I imagine I will see you here (EE) again.
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Here's a look at newsworthy articles and community happenings during the last month.
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 16 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question