Strategies for Organizing Computers and Policies into Groups
Policy Commander lets you organize computers into groups with similar requirements or having similar functions. Appropriate security polices are then assigned to the group and are enforced for computers within the group.
Likewise, you can organize related policies into groups. For example, you may have a group of policies designed to protect sensitive data. Computers where data privacy is of utmost importance would be added to the group and would have the data privacy policies enforced.
Automatic Groups
By default, Policy Commander recognizes and automatically creates groups that reflect a computer’s Active Directory OU membership. For example, if your Active Directory domain is called MyCompany.com, and computers in the Accounting, Sales, Marketing and Administration OUs are managed with Policy Commander, the Dashboard will automatically show the following group structure:
MyCompany
Accounting
Administration
Marketing
Sales
Note: If you are not using Active Directory, turn off “Use Active Directory Naming” option in the Communications Settings section of the Settings page.
Manual Groups
You can also manually create groups to organize computers and/or policies using other criteria, such as location, function, role, etc.
Below is an example of a group structure based on computer roles within the organization. For example, the “Auditors” group would contain the PCs used by auditors when they are on site. A certain set of policies would be added to this group, perhaps policies that would lock down access to various files or folders.
Minneapolis Headquarters
Auditors
Bookkeeping
Customer Service
Executive
Loan Officers
Tellers
Rochester Branch
Bookkeeping
Customer Service
Loan Officers
Tellers
Below is an example of a group structure based on policy content. For example, the “Best Practices – Disable Services” group could contain all the policies supplied by New Boundary Technologies for disabling various services. It could also contain other polices that you authored to disable other services. You would then decide which computers needed to be more secure by having services disabled, and you would add them to the group.
Production Policies
Best Practices – Data Protection Policies
Best Practices – Disable Services
NIST Windows XP Security Template Policies
NIST Windows XP Security Policy Modules
NIST Windows 2000 Security Template Policies
NSA Security Template Policies
Microsoft Security Template Policies
No matter what group structure you choose, you manage groups by adding computers and policies to them.
On a scale of 1-5, please rate the helpfulness of this article
Optionally provide your comments to help us improve this article...
Thank you for your feedback!