IT tutorials
 
Applications Server
 

Configuring Active Directory Server Roles : Administering Active Directory - Planning the OU Structure (part 2) - Delegating Administrative Control

3/19/2014 2:34:31 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

2. Understanding OU Inheritance

When you rearrange OUs within the structure of Active Directory, you can change several settings. When they are moving and reorganizing OUs, systems administrators must pay careful attention to automatic and unforeseen changes in security permissions and other configuration options. By default, OUs inherit the permissions of their new parent container when they are moved.

By using the built-in tools provided with Windows Server 2008 and Active Directory, you can move or copy OUs only within the same domain.

You cannot use the Active Directory Users And Computers tool to move OUs between domains. To do this, use the Active Directory Migration Tool (ADMT) v3.1. This is one of the many Active Directory support tools.


3. Delegating Administrative Control

We already mentioned that OUs are the smallest component within a domain to which administrative permissions and group policies can be assigned by administrators. Now, you'll take a look at specifically how administrative control is set on OUs.

Delegation occurs when a higher security authority assigns permissions to a lesser security authority. As a real-world example, assume that you are the director of IT for a large organization. Instead of doing all of the work yourself, you would probably assign roles and responsibilities to other individuals. For example, if you worked within a multidomain environment, you might make one systems administrator responsible for all operations within the Sales domain and another responsible for the Engineering domain. Similarly, you could assign the permissions for managing all printers and print queues objects within your organization to one individual user while allowing another individual user to manage all security permissions for users and groups.

In this way, you can distribute the various roles and responsibilities of the IT staff throughout the organization. Businesses generally have a division of labor that handles all of the tasks involved in keeping the company's networks humming. Network operating systems (NOSs), however, often make it difficult to assign just the right permissions, or in other words, do not support very granular permission assignments. Sometimes, fine granularity is necessary to ensure that only the right permissions are assigned. A good general rule of thumb is to provide users and administrators the minimum permissions they require to do their jobs. This way you can ensure that accidental, malicious, and otherwise unwanted changes do not occur.

You can use auditing to log events to the Security Log in the Event Viewer. This is a way to ensure that if accidental, malicious, and otherwise unwanted changes do occur, they are logged and traceable.


In the world of Active Directory, you use the process of delegation to define responsibilities for OU administrators. As a system administrator, you will be occasionally tasked with having to delegate responsibility to others—you can't do it all, although sometimes some administrators believe that they can. We understand the old IT logic of doing all the tasks yourself for job security, but this can actually make you look worse and not better.

NOTE

You can delegate control only at the OU level and not at the object level within the OU.

If you do find yourself in a role to delegate, remember that Windows Server 2008 was designed to offer you the ability to do so. In its simplest definition, delegation allows a higher administrative authority to grant specific administrative rights for containers and subtrees to individuals and groups. What this essentially does is eliminate the need for domain administrators with sweeping authority over large segments of the user population. You can break up this control over branches within your tree, within each OU you create.

NOTE

To understand delegation and rights, you should first understand the concept of access control entries (ACEs). ACEs grant specific administrative rights on objects in a container to a user or group. The containers' access control list (ACL) is used to store ACEs.

When you are considering implementing delegation, keep these two main concerns in mind:


Parent-child relationships

The OU hierarchy you create will be very important when you consider the maintainability of security permissions. OUs can exist in a parent-child relationship, which means that permissions and group policies set on OUs higher up in the hierarchy (parents) can interact with objects in lower-level OUs (children). When it comes to delegating permissions, this is extremely important. You can allow child containers to automatically inherit the permissions set on parent containers. For example, if the North America division of your organization contains 12 other OUs, you could delegate permissions to all of them at once (saving time, and reducing the likelihood of human error) by placing security permissions on the North America division. This feature can greatly ease administration, especially in larger organizations, but it is also a reminder of the importance of properly planning the OU structure within a domain.


Inheritance settings

Now that you've seen how you can use parent-child relationships for administration, you should consider inheritance, the process in which child objects take on the permissions of a parent container. When you set permissions on a parent container, all of the child objects are configured to inherit the same permissions. You can override this behavior, however, if business rules do not lend themselves well to inheritance.

4. Applying Group Policies

One of the strengths of the Windows operating system is that it offers users a great deal of power and flexibility. From installing new software to adding device drivers, users can make many changes to their workstation configurations. However, this level of flexibility is also a potential problem. For instance, inexperienced users might inadvertently change settings, causing problems that can require many hours to fix.

In many cases (and especially in business environments), users only require a subset of the complete functionality the operating system provides. In the past, however, the difficulty associated with implementing and managing security and policy settings has led to lax security policies. Some of the reasons for this are technical—it can be very tedious and difficult to implement and manage security restrictions. Other problems have been political—users and management might feel that they should have full permissions on their local machines, despite the potential problems this might cause.

That's where the idea of group policies comes in. Simply defined, group policies are collections of permissions that you can apply to objects within Active Directory. Specifically, Group Policy settings are assigned at the site, domain, and OU levels, and they can apply to user accounts, computer accounts, and groups. Examples of settings that a systems administrator can make using group policies include the following:

  • Restricting users from installing new programs

  • Disallowing the use of Control Panel

  • Limiting choices for display and Desktop settings

 
Others
 
- Configuring Active Directory Server Roles : Administering Active Directory - Planning the OU Structure (part 1) - Logical Grouping of Resources
- Configuring Active Directory Server Roles : Administering Active Directory - An Overview of OUs
- Configuring Active Directory Server Roles : Active Directory Rights Management Services
- Microsoft Lync Server 2013 : Mediation Server Troubleshooting (part 2) - Synthetic Transactions, Telnet
- Microsoft Lync Server 2013 : Mediation Server Troubleshooting (part 1)
- Microsoft Lync Server 2013 : Mediation Server Administration
- Microsoft Lync Server 2013 : Mediation Server Configuration
- Microsoft Lync Server 2010 : Installing Mediation Server (part 4) - Create Certificates
- Microsoft Lync Server 2010 : Installing Mediation Server (part 3) - Install Lync Mediation Server Components
- Microsoft Lync Server 2010 : Installing Mediation Server (part 2) - Create a Mediation Server Pool
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us