Solved

What is the best convention to create security groups in my domain?

Posted on 2014-11-20
1
81 Views
Last Modified: 2015-01-13
Hello All,

What will be the best and most standardized way to create security groups in a corporate environment? Including the naming convention. What will be the best criteria to create them?

Any hints or documentation links will be greatly appreciated.

Thanks!
0
Comment
Question by:LuiLui77
1 Comment
 
LVL 37

Accepted Solution

by:
Neil Russell earned 500 total points
Comment Utility
A security group just defines a security boundary that collects together a number of objects, users or devices normally.

The normal consideration used to be departments. So a security group for FINANCE, one for HR etc
More common I find now is that security groups are being used more and more for Role Based boundaries. So rather than grouping everyone in FINANCE into a group and everyone in HR into another, you may instead have a group called SWPersonnelSystem and that contains all of the user of the Software (SW) package that is the Personnel System used by both Finance and HR.

At the end of the day it is down to your organisational need as to what groups you have.

Remember though that Security groups are not your only consideration.  the OU structure of your active directory is also a very important design consideration.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now