Solved

What is this type of access/configuration policy?

Posted on 2015-01-07
9
173 Views
Last Modified: 2015-01-08
Heyas,

A rather odd question if you have 3 configuration files;
Domain config (Top)
Computer config (Middle)
User config (Bottom)

And your access policy states that configuration in the User can override any matching permissions/blocks in the computer config and domain config. Whilst the computer config and override any matching permission/block in the domain config. What is the name of an access/configuration policy structure?

Thank you
0
Comment
Question by:Zack
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 78

Expert Comment

by:arnold
ID: 40537173
Is this an assignment?

a policy where the domain has unequivocal authority over the computer which has it over user would likely be called centralized/concentrated type.
0
 

Author Comment

by:Zack
ID: 40537229
No I'm not doing an assignment I am writing a report. What your saying is correct however a user config would override a computer config if their no equivalent policy in the computer config.  Is their any term for that?
0
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 40537237
The opposite, I think it would be decentralized.
0
Is your NGFW recommended by NSS Labs?

Ours is! NSS Labs Next Generation Firewall Test gives the WatchGuard Firebox M4600 a "Recommended" rating! Curious where your NGFW landed on the  Security Value Map? See the map and download the full report today!

 

Author Comment

by:Zack
ID: 40537304
Can you provide any whitepapers or links that describe this type of access control structure?
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537320
What is the context of your report?  I simply reformulated your access control to come up with initially a clue in the event this was an assignment.

You can have it defined as a weighted access where domain has the highest weight least preferred to user that has the lowest weight highest preference.

In different schemes it can be interested from least specific to most specific .

I am trying to understand what it is you are trying to get to, to properly formulate the issue at hand in order to determine what the answer is.
0
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 40537598
lsdou  local,site, domain,org unit are the orders of precedence in group policy

http://technet.microsoft.com/en-us/library/cc785665%28v=ws.10%29.aspx
0
 
LVL 24

Expert Comment

by:VB ITS
ID: 40537798
That's the first thing that came to mind for me too, David - Group Policy.
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537892
GPO is centralized where settings set in a domain can not be overridden by anything unless another policy is enforced.  While he ordered them domain, computer, user the dominant is the user not the domain.
0
 

Author Closing Comment

by:Zack
ID: 40539657
That's fine I will leave it at that, as I am still learning about the system myself I don't have any information as this stage.

Thanks for the help.
0

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question