Solved

Why IDGLA is a good practice for MS File Server?

Posted on 2016-09-26
1
54 Views
Last Modified: 2016-10-02
Dear Sir,

Why IDGLA is a good practice for MS File Server?

Thank you.

with regards,
Wataw
0
Comment
Question by:Wataw
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 23

Accepted Solution

by:
yo_bee earned 500 total points
ID: 41815767
For overall management is the reason.  
It is easier to build a true hierarchy that your company adheres to and it becomes the policy.
The other reason is the larger your volumes become the amount of time it takes to apply ACL to the sub-directories for individuals vs apply the groups and have the users in the proper groups

Good example is
Level 1 people have rights to Folder A and B.  Your Level 2 group have more rights to folder C & D, but they also have rights to folder A & B.  By nesting them is level 1 group to be able to access both sets of folders with only having to add them to one group.  This also keeps control of who has access to what.  Now when a person changes position or leaves the company you can just remove them from the group and you know for 100% certainty that they do not have access to the folders.
0

Featured Post

Comparison of Amazon Drive, Google Drive, OneDrive

What is Best for Backup: Amazon Drive, Google Drive or MS OneDrive? In this free whitepaper we look at their performance, pricing, and platform availability to help you decide which cloud drive is right for your situation. Download and read the results of our testing for free!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains the steps required to use the default Photos screensaver to display branding/corporate images
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question