Download presentation
Presentation is loading. Please wait.
Published byCleopatra Dalton Modified over 9 years ago
1
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7
2
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE2 GATHERING AND ANALYZING DESIGN INFORMATION Administration model Active Directory structure Security group structure Group Policy structure User job roles Hardware resources Physical topology Forest and domain design Administration model Active Directory structure Security group structure Group Policy structure User job roles Hardware resources Physical topology Forest and domain design
3
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE3 CHOOSING AN ADMINISTRATION MODEL
4
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE4 UNDERSTANDING ORGANIZATIONAL UNITS
5
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE5 STANDARD MODELS FOR OU STRUCTURE
6
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE6 USING OUs TO DELEGATE ADMINISTRATIVE CONTROL
7
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE7 ENVISIONING THE OU STRUCTURE Physical locations Types of administrative tasks Types of objects Physical locations Types of administrative tasks Types of objects
8
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE8 PLANNING FOR INHERITANCE
9
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE9 USING OUs TO LIMIT OBJECT VISIBILITY
10
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE10 ORGANIZATIONAL UNITS AND GROUP POLICY Create GPOs for OUs as needed Add OUs to support Group Policy as needed. For example: Subdivide OUs so that you can apply different policies to different groups of users Create new OUs based on location Create new OUs based on the type of objects that will be stored in the OU Create GPOs for OUs as needed Add OUs to support Group Policy as needed. For example: Subdivide OUs so that you can apply different policies to different groups of users Create new OUs based on location Create new OUs based on the type of objects that will be stored in the OU
11
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE11 OU STRUCTURE AND GROUP POLICY Security requirements Administration requirements Software deployment and update requirements Planned network infrastructure Security requirements Administration requirements Software deployment and update requirements Planned network infrastructure
12
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE12 DETERMINING DESIGN REQUIREMENTS
13
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE13 SECURITY REQUIREMENTS
14
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE14 ADMINISTRATION REQUIREMENTS Planned administrative model and roles User requirements Computer requirements Remote office requirements Planned administrative model and roles User requirements Computer requirements Remote office requirements
15
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE15 SOF T WARE DEPLOYMENT AND UPDATE REQUIREMENTS
16
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE16 GROUP POLICY DESIGN CONSIDERATIONS
17
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE17 INHERITANCE AND FILTERING METHODS Group Policy inheritance review Security filtering through access control lists (ACLs) Windows Management Instrumentation (WMI) filters User Group Policy loopback processing mode Block Policy Inheritance Group Policy inheritance review Security filtering through access control lists (ACLs) Windows Management Instrumentation (WMI) filters User Group Policy loopback processing mode Block Policy Inheritance
18
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE18 PERFORMANCE CONSIDERATIONS Limit the number of GPOs Consider slow links Limit how often GPOs are updated Group Policy and slow link detection Disable unused portion of GPO (Computer Settings | User Settings) Monitor and track usage Limit the number of GPOs Consider slow links Limit how often GPOs are updated Group Policy and slow link detection Disable unused portion of GPO (Computer Settings | User Settings) Monitor and track usage
19
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE19 TESTING AND MAINTENANCE OF GROUP POLICIES Group Policy backup procedures Administrative strategy Change management plan Group Policy backup procedures Administrative strategy Change management plan
20
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE20 DEVELOPING AN ADMINSTRATIVE STRATEGY
21
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE21 DEVELOPING A CHANGE MANAGEMENT PLAN
22
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE22 GROUP POLICY IMPLEMENTATION FOR NEW USERS New computers and users added to default locations unless otherwise specified. Redirusr.exe Redircomp.exe Allows you to immediately apply user- and computer-specific GPOs to new objects. New computers and users added to default locations unless otherwise specified. Redirusr.exe Redircomp.exe Allows you to immediately apply user- and computer-specific GPOs to new objects.
23
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE23 FINALIZING THE GROUP POLICY DESIGN
24
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE24 PLANNING AN ACCOUNT STRATEGY
25
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE25 ACCOUNT NAMING STRATEGIES
26
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE26 PLANNING A PASSWORD POLICY
27
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE27 CREATING AN AUTHENTICATION, AUTHORIZATION, AND ADMINISTRATION STRATEGY
28
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE28 DESIGNING A SECURITY GROUP STRATEGY
29
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE29 SECURITY GROUP STRATEGY (continued)
30
Chapter 7: DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE30 SUMMARY Gather information before making your design plans Name some factors that influence OU design Give some examples of IT administration models Top-level OU structure should be relatively static Identify and plan for security threats Carefully assess user and computer requirements Separate users, groups, and permissions to increase the efficiency of network administration Gather information before making your design plans Name some factors that influence OU design Give some examples of IT administration models Top-level OU structure should be relatively static Identify and plan for security threats Carefully assess user and computer requirements Separate users, groups, and permissions to increase the efficiency of network administration
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.