Solved

Adverse effects of changing group from Distribution to Security?

Posted on 2013-05-21
3
552 Views
Last Modified: 2013-05-21
Quick question -

Had to make a shared folder for a management group, and instead of applying permissions one by one i wanted to use a group.  While creating group I found it already existed, as a distribution group.  This distro had the same users and uses the name i wanted to use.  Obviously as a distribution group it would not be available to apply permissions with.

Went into AD and changed it from Distribution to Security.  Permissions applied fine. Sent test email to distro and all members received it.  Seems fine to me, but i want to ensure that i haven't missed any steps or could have something bad happen down the line.

Thanks in advance
0
Comment
Question by:jstiling82
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 19

Assisted Solution

by:Peter Hutchison
Peter Hutchison earned 250 total points
ID: 39184195
No, it should be fine changing from Distribution to Security of a group.

There are issues changing from Security to Distribution of a group as you will loose permissions.
0
 
LVL 1

Accepted Solution

by:
ssk_2k3 earned 250 total points
ID: 39184286
this is easy way and you will loose only the permissions.

Please refer the below link for more info.
http://exchangepedia.com/2012/08/exchange-2010-change-security-group-to-distribution-group.html
0
 

Author Closing Comment

by:jstiling82
ID: 39185429
makes sense, in regards to the possibility of unintended users either having access to resources or being on a distribution list.  in this case, as i'm dealing with a tight-knit management team, i don't foresee this being an issue.  thank you both for your responses.
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Journaling 2 8
GPO denied - but why ? 6 51
Certificate Questions - Exchange 2016 11 39
WannaCry ransomware worm 2008 and 2012 server 1 132
Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question