Solved

What is the best convention to create security groups in my domain?

Posted on 2014-11-20
1
90 Views
Last Modified: 2015-01-13
Hello All,

What will be the best and most standardized way to create security groups in a corporate environment? Including the naming convention. What will be the best criteria to create them?

Any hints or documentation links will be greatly appreciated.

Thanks!
0
Comment
Question by:LuiLui77
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 37

Accepted Solution

by:
Neil Russell earned 500 total points
ID: 40455978
A security group just defines a security boundary that collects together a number of objects, users or devices normally.

The normal consideration used to be departments. So a security group for FINANCE, one for HR etc
More common I find now is that security groups are being used more and more for Role Based boundaries. So rather than grouping everyone in FINANCE into a group and everyone in HR into another, you may instead have a group called SWPersonnelSystem and that contains all of the user of the Software (SW) package that is the Personnel System used by both Finance and HR.

At the end of the day it is down to your organisational need as to what groups you have.

Remember though that Security groups are not your only consideration.  the OU structure of your active directory is also a very important design consideration.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question