Solved

What is this type of access/configuration policy?

Posted on 2015-01-07
9
169 Views
Last Modified: 2015-01-08
Heyas,

A rather odd question if you have 3 configuration files;
Domain config (Top)
Computer config (Middle)
User config (Bottom)

And your access policy states that configuration in the User can override any matching permissions/blocks in the computer config and domain config. Whilst the computer config and override any matching permission/block in the domain config. What is the name of an access/configuration policy structure?

Thank you
0
Comment
Question by:Zack
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 78

Expert Comment

by:arnold
ID: 40537173
Is this an assignment?

a policy where the domain has unequivocal authority over the computer which has it over user would likely be called centralized/concentrated type.
0
 

Author Comment

by:Zack
ID: 40537229
No I'm not doing an assignment I am writing a report. What your saying is correct however a user config would override a computer config if their no equivalent policy in the computer config.  Is their any term for that?
0
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 40537237
The opposite, I think it would be decentralized.
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 

Author Comment

by:Zack
ID: 40537304
Can you provide any whitepapers or links that describe this type of access control structure?
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537320
What is the context of your report?  I simply reformulated your access control to come up with initially a clue in the event this was an assignment.

You can have it defined as a weighted access where domain has the highest weight least preferred to user that has the lowest weight highest preference.

In different schemes it can be interested from least specific to most specific .

I am trying to understand what it is you are trying to get to, to properly formulate the issue at hand in order to determine what the answer is.
0
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 40537598
lsdou  local,site, domain,org unit are the orders of precedence in group policy

http://technet.microsoft.com/en-us/library/cc785665%28v=ws.10%29.aspx
0
 
LVL 24

Expert Comment

by:VB ITS
ID: 40537798
That's the first thing that came to mind for me too, David - Group Policy.
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537892
GPO is centralized where settings set in a domain can not be overridden by anything unless another policy is enforced.  While he ordered them domain, computer, user the dominant is the user not the domain.
0
 

Author Closing Comment

by:Zack
ID: 40539657
That's fine I will leave it at that, as I am still learning about the system myself I don't have any information as this stage.

Thanks for the help.
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Windows functions GetTickCount and timeGetTime retrieve the number of milliseconds since the system was started. However, the value is stored in a DWORD, which means that it wraps around to zero every 49.7 days. This article shows how to solve t…
Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

736 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question