Solved

What is this type of access/configuration policy?

Posted on 2015-01-07
9
167 Views
Last Modified: 2015-01-08
Heyas,

A rather odd question if you have 3 configuration files;
Domain config (Top)
Computer config (Middle)
User config (Bottom)

And your access policy states that configuration in the User can override any matching permissions/blocks in the computer config and domain config. Whilst the computer config and override any matching permission/block in the domain config. What is the name of an access/configuration policy structure?

Thank you
0
Comment
Question by:Zack
9 Comments
 
LVL 78

Expert Comment

by:arnold
ID: 40537173
Is this an assignment?

a policy where the domain has unequivocal authority over the computer which has it over user would likely be called centralized/concentrated type.
0
 

Author Comment

by:Zack
ID: 40537229
No I'm not doing an assignment I am writing a report. What your saying is correct however a user config would override a computer config if their no equivalent policy in the computer config.  Is their any term for that?
0
 
LVL 78

Accepted Solution

by:
arnold earned 500 total points
ID: 40537237
The opposite, I think it would be decentralized.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 

Author Comment

by:Zack
ID: 40537304
Can you provide any whitepapers or links that describe this type of access control structure?
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537320
What is the context of your report?  I simply reformulated your access control to come up with initially a clue in the event this was an assignment.

You can have it defined as a weighted access where domain has the highest weight least preferred to user that has the lowest weight highest preference.

In different schemes it can be interested from least specific to most specific .

I am trying to understand what it is you are trying to get to, to properly formulate the issue at hand in order to determine what the answer is.
0
 
LVL 80

Expert Comment

by:David Johnson, CD, MVP
ID: 40537598
lsdou  local,site, domain,org unit are the orders of precedence in group policy

http://technet.microsoft.com/en-us/library/cc785665%28v=ws.10%29.aspx
0
 
LVL 24

Expert Comment

by:VB ITS
ID: 40537798
That's the first thing that came to mind for me too, David - Group Policy.
0
 
LVL 78

Expert Comment

by:arnold
ID: 40537892
GPO is centralized where settings set in a domain can not be overridden by anything unless another policy is enforced.  While he ordered them domain, computer, user the dominant is the user not the domain.
0
 

Author Closing Comment

by:Zack
ID: 40539657
That's fine I will leave it at that, as I am still learning about the system myself I don't have any information as this stage.

Thanks for the help.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
The Windows functions GetTickCount and timeGetTime retrieve the number of milliseconds since the system was started. However, the value is stored in a DWORD, which means that it wraps around to zero every 49.7 days. This article shows how to solve t…
This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question