123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> System-Network-Administration >> View Article

How Active Directory Object Permissions Can Aid Security

Profile Picture
By Author: Shirley Green
Total Articles: 129
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

To understand how Active Directory object permissions can aide security, you can study the effect of MCSE 2003 exams object permission changes on an OU object. OUs contain user and computer accounts, among other objects, and any permissions set on OUs can affect the management and security of the computer accounts and user accounts that reside in the OU. Examining the available permissions can help you determine how to design a permission infrastructure that will do the best job at increasing security. Open the Security Property page (shown in Figure 9-13) of any OU object in Active Directory Users and Computers. As it does for files and folders, this page presents a broad list of permissions. These permissions, like similar ones for files and folders, are actually composite permissions.
In addition to using the object editor to change Active Directory permissions or using the Delegation Of Authority Wizard, you have three additional ways that these permissions can be modified. You can use the dsacls command.You can also use the ADS-lEdit tool (Adsiedit.msc) or programmatic methods ...
... to edit Modify permissions on MCSE study guides free download Active Directory objects.
To explore the permissions behind Full Control, for example, click the Advanced button, and then click the Edit button. Two additional pages of permissions are dis?played, one labeled Object and the other labeled Properties. The object page (shown in Figure 9-14) is a list of over 70 permissions that define access to these types of objects if they are present within the OU. The Property page displays a list of more than 70 permissions and defines access to the properties of objects within the OU container. Table 9-2 lists some permissions of each type and provides information about how they might be used. The first seven permissions represent the comprehensive permissions on the first security page. (Six are visible in the figure.)
One question remains. What "will be the effect if multiple objects exist in the inheritance path and each object provides permissions that are inherited? Figure 9-9 shows a multiobject inheritance path. It also indicates two permissions set at each level. For purposes of simplification, assume that inheritance is not blocked at any level and that all permissions applied at each level are inherited by the MCITP study guides free download file quarterlyreport.doc. Will John be able to read the file or not?

Total Views: 708Word Count: 392See All articles From Author

Add Comment

System/Network Administration Articles

1. The Real Difference Between Ai Tools And Ai Systems
Author: Orson Amiri

2. Document Manager Software: Tools To Organize Business Files
Author: DocSmart Solutions

3. Best Online Cybersecurity Training Institute In India
Author: securium Academy

4. Mechanical Optical Switch: Reliable Light Routing For Optical Networks
Author: Ryan

5. Optical Switches: Enabling Fast And Flexible Optical Networks
Author: Ryan

6. Fiber Cable Stripping Machine: Precision And Efficiency In Fiber Optic Processing
Author: Ryan

7. 20% Off PmpĀ® Certification: Turn This Christmas Into A Career Milestone
Author: securium Academy

8. The Fiber Jumper Production Line: Streamlining The Manufacturing Of High-quality Fiber Optic Cables
Author: Ryan

9. The Fiber Coupler Production Line: Enabling Efficient Signal Distribution In Fiber Optic Networks
Author: Ryan

10. Top 10 Cyber Threats Of 2026 And How To Prepare For Them
Author: securium Academy

11. Cloud Technology Solutions For Businesses: Improve Efficiency & Growth
Author: Venttech

12. Ethical Hacking Training Institute Building Future Ready Cybersecurity Experts
Author: Hanna Vahab

13. How Oscp Certification Opens Doors To Global Cybersecurity Roles?
Author: securium Academy

14. Fiber Optic Cable Production Line: The Backbone Of Modern Connectivity
Author: Ryan

15. Fiber Cable Production Line: Revolutionizing Connectivity
Author: Ryan

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: