?
Solved

What is the best convention to create security groups in my domain?

Posted on 2014-11-20
1
Medium Priority
?
91 Views
Last Modified: 2015-01-13
Hello All,

What will be the best and most standardized way to create security groups in a corporate environment? Including the naming convention. What will be the best criteria to create them?

Any hints or documentation links will be greatly appreciated.

Thanks!
0
Comment
Question by:LuiLui77
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 37

Accepted Solution

by:
Neil Russell earned 2000 total points
ID: 40455978
A security group just defines a security boundary that collects together a number of objects, users or devices normally.

The normal consideration used to be departments. So a security group for FINANCE, one for HR etc
More common I find now is that security groups are being used more and more for Role Based boundaries. So rather than grouping everyone in FINANCE into a group and everyone in HR into another, you may instead have a group called SWPersonnelSystem and that contains all of the user of the Software (SW) package that is the Personnel System used by both Finance and HR.

At the end of the day it is down to your organisational need as to what groups you have.

Remember though that Security groups are not your only consideration.  the OU structure of your active directory is also a very important design consideration.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Ready to improve network connectivity? Watch this webinar to learn how SD-WANs and a one-click instant connect tool can boost provisions, deployment, and management of your cloud connection.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question