[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Why IDGLA is a good practice for MS File Server?

Posted on 2016-09-26
1
Medium Priority
?
80 Views
Last Modified: 2016-10-02
Dear Sir,

Why IDGLA is a good practice for MS File Server?

Thank you.

with regards,
Wataw
0
Comment
Question by:Wataw
1 Comment
 
LVL 24

Accepted Solution

by:
yo_bee earned 2000 total points
ID: 41815767
For overall management is the reason.  
It is easier to build a true hierarchy that your company adheres to and it becomes the policy.
The other reason is the larger your volumes become the amount of time it takes to apply ACL to the sub-directories for individuals vs apply the groups and have the users in the proper groups

Good example is
Level 1 people have rights to Folder A and B.  Your Level 2 group have more rights to folder C & D, but they also have rights to folder A & B.  By nesting them is level 1 group to be able to access both sets of folders with only having to add them to one group.  This also keeps control of who has access to what.  Now when a person changes position or leaves the company you can just remove them from the group and you know for 100% certainty that they do not have access to the folders.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question