Solved

Group Policies review

Posted on 2016-07-27
1
152 Views
Last Modified: 2016-08-25
As part of an IT audit, what would/should you focus on in terms of group policies applied to computers and servers. I'm just not sure what you could really focus on, or what common issues there would be - and what tools you could look to to assist in identifying any problems/risks in the group policies being deployed?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
Mike earned 500 total points
ID: 41731339
What type of Audit are we talking about?  A compliance audit, a voluntary audit, a perspective client site assessment?

I've never seen a voluntary audit or site assessment really touch on GPO's.  I've worked with many different clients and they each have specific things they want, but most just have GPO's to map drives, map printers, and disabled Windows Firewall.

Your main defenses against issues should be corporate antivirus, hardware firewall, strong file share permissions, and good backups.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

An introduction to the wonderful sport of Scam Baiting.  Learn how to help fight scammers by beating them at their own game. This great pass time helps the world, while providing an endless source of entertainment. Enjoy!
A small collection of useful tips and tricks for Windows 10 users that I decided to write as a result of recent questions that were asked and answered at Experts Exchange. Two short video tutorials included. Enjoy..
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question