?
Solved

Managing Contractors in AD

Posted on 2014-02-26
2
Medium Priority
?
135 Views
Last Modified: 2014-04-21
Hi

Just really looking for some feedback from IT Pro's/managers on how their companies , manage contractors on email/AD.

We currently treat them the same as normal employees, but I have been asked to look into some type of identification/separation.

Was think of having a separate OU, different SMTP and possibly setting their AD accounts to expire at the end of their contract (possibly by some email alert to a line manager)

just wanted some other thoughts

thanks
0
Comment
Question by:kwatt562
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 13

Accepted Solution

by:
Santosh Gupta earned 2000 total points
ID: 39888740
Hi,

Below is some suggestions.

1.      Create different OU.
2.      User some prefix before AD accounts i.e T_xyz somthing.
3.      Account Expiry.
4.      Enable email journaling.
5.      Block to send emails to other domain (may be exception for some).
6.      Use send limitations on emails.
7.      Create a different Security and Distribution groups.
8.      Internet usages limitations (may be exception for some).
9.      Force user to keep internet explorer history for atleast 30 days by GPO.

etc.
0
 

Author Comment

by:kwatt562
ID: 40012425
Thanks and sorry for the late response!
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you troubleshoot Outlook for clients, you may want to know a bit more about the OST file before doing your next job. IMAP can cause a lot of drama if removed in the accounts without backing up.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month10 days, 14 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question