Solved

top 10 group policy that should apply to AD

Posted on 2009-05-04
3
448 Views
Last Modified: 2012-05-06
top 10 group policy that should apply to AD
0
Comment
Question by:kasian2008
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 200 total points
ID: 24298394
There are no concrete answers for this as every environment is different.  
There are some good security guidelines out there that you can look at to give you ideas
http://adisfun.blogspot.com/2009/04/how-do-you-secure-ad-and-windows.html
This article may also give you some ideas
http://windowsitpro.com/article/articleid/45614/10-ways-to-manage-desktops-with-group-policy.html
...as mentioned in the first link.  Always test before deploying a policy
Thanks
MIke
 
0
 

Accepted Solution

by:
kasian2008 earned 0 total points
ID: 24436847
is there any best practice which group policies we should use?
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 200 total points
ID: 24436860
Some general grou policy best practices
http://technet.microsoft.com/en-us/library/cc779168(WS.10).aspx
but not exact settings, those vary, see my first link for the security guides
Thanks
Mike
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question