Solved

What is the best convention to create security groups in my domain?

Posted on 2014-11-20
1
84 Views
Last Modified: 2015-01-13
Hello All,

What will be the best and most standardized way to create security groups in a corporate environment? Including the naming convention. What will be the best criteria to create them?

Any hints or documentation links will be greatly appreciated.

Thanks!
0
Comment
Question by:LuiLui77
1 Comment
 
LVL 37

Accepted Solution

by:
Neil Russell earned 500 total points
ID: 40455978
A security group just defines a security boundary that collects together a number of objects, users or devices normally.

The normal consideration used to be departments. So a security group for FINANCE, one for HR etc
More common I find now is that security groups are being used more and more for Role Based boundaries. So rather than grouping everyone in FINANCE into a group and everyone in HR into another, you may instead have a group called SWPersonnelSystem and that contains all of the user of the Software (SW) package that is the Personnel System used by both Finance and HR.

At the end of the day it is down to your organisational need as to what groups you have.

Remember though that Security groups are not your only consideration.  the OU structure of your active directory is also a very important design consideration.
0

Featured Post

Can’t get the mobile email signature right?

Not having any luck when trying to create an email signature for mobile devices? Does the formatting keep messing up? Make sure you have great email signatures on all devices by using Exclaimer Cloud - Signatures for Office 365.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Remove Installed Application 1 42
local administrator password solution 26 74
RNC Hacking Question 6 28
Cloud to Hybrid 4 19
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now