Group types

Description

Microsoft 70-410 (Active Directory) Note on Group types, created by kamsz on 13/08/2013.
kamsz
Note by kamsz, updated more than 1 year ago
kamsz
Created by kamsz almost 11 years ago
66
0

Resource summary

Page 1

Group types Groups are used to collect user accounts, computer accounts, and other group accounts into manageable units. Working with groups instead of with individual users helps simplify network maintenance and administration.There are two types of groups in Active Directory: distribution groups and security groups. You can use distribution groups to create e-mail distribution lists and security groups to assign permissions to shared resources. Distributions groups Distribution groups can be used only with e-mail applications (such as Exchange) to send e-mail to collections of users. Distribution groups are not security-enabled, which means that they cannot be listed in discretionary access control lists (DACLs). If you need a group for controlling access to shared resources, create a security group. Security groups Used with care, security groups provide an efficient way to assign access to resources on your network. Using security groups, you can: Assign user rights to security groups in Active Directory User rights are assigned to security groups to determine what members of that group can do within the scope of a domain (or forest). User rights are automatically assigned to some security groups at the time Active Directory is installed to help administrators define a person's administrative role in the domain. For example, a user who is added to the Backup Operators group in Active Directory has the ability to backup and restore files and directories located on each domain controller in the domain.This is possible because by default, the user rights Back up files and directories and Restore files and directories are automatically assigned to the Backup Operators group. Therefore, members of this group inherit the user rights assigned to that group.You can assign user rights to security groups, using Group Policy, to help delegate specific tasks. You should always use discretion when assigning delegated tasks because an untrained user assigned too many rights on a security group can potentially cause significant harm to your network. Assign permissions to security groups on resources Permissions should not be confused with user rights. Permissions are assigned to the security group on the shared resource. Permissions determine who can access the resource and the level of access, such as Full Control. Some permissions set on domain objects are automatically assigned to allow various levels of access to default security groups such as the Account Operators group or the Domain Admins group. Security groups are listed in DACLs that define permissions on resources and objects. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to individual users. The permissions are assigned once to the group, instead of several times to each individual user. Each account added to a group receives the rights assigned to that group in Active Directory and the permissions defined for that group at the resource. Like distribution groups, security groups can also be used as an e-mail entity. Sending an e-mail message to the group sends the message to all the members of the group.

Converting between security and distribution groups A group can be converted from a security group to a distribution group, and vice versa, at any time, but only if the domain functional level is set to Windows 2000 native or higher. No groups can be converted while the domain functional level is set to Windows 2000 mixed.NoteAlthough a contact can be added to a security group as well as to a distribution group, contacts cannot be assigned rights and permissions. Contacts in a group can be sent e-mail. 

New Page

Show full summary Hide full summary

Similar

Group Policy loopback processing
kamsz
Active Directory Flexible Single-Master
kamsz
Microsoft Exam 70-410: Volume1- Test 1
Alex Quito
WMI Filters
kamsz
Active Directory Schema snap-in
kamsz
Starter GPO
kamsz
Group scopes
kamsz
GPO Link icons
kamsz
5.2 Authentication and Authorization Technologies
DJ Perrone
Active Directory Architechture
Tyler Lee-Farrell
Windows Server 2012
kamsz