What is the difference between the 3?

Posted on 2009-04-30
Medium Priority
Last Modified: 2012-05-06
Ok, here is an image below, and i just wondered what is the difference between:
Domain local
when creating a distribution group.

Thanks for your help
Question by:Roy_
LVL 27

Accepted Solution

bluntTony earned 500 total points
ID: 24268790
Domain Locals are used to grant access to resources in their own domain. E.g. create a DL group called Accounts_Files.
Global groups are then used to add the users into that you want to grant the access to, e.g. Accounts_Dept.
You then grant the Accounts_Dept the required access to the Account_Files group, thereby giving all the users access to them.
This is the MS best practice for group nesting.
Universal groups are used to grant various global groups access to various resources around multiple domains. You never place users into Universal group, only into globals, then place the globals into the universal.
It's also best practice to not put users into domain locals, again use globals.

Author Comment

ID: 24268801

Featured Post

Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
Scripts are great for performing batch jobs against users, however sometimes the GUI is all you need.
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question