Implementing group security policy

Implementing a group security policy can reduce a company's technical support staff's time in resolving support related issues. A group security policy should include the following:

  • Restricting changes that can be made to the Internet Explorer configuration. This prevents users from manipulating restricted site settings or adjusting security-access levels.


  • Preventing users from making changes to the network configuration. A group policy that covers this area limits users from adding share access to their hard drives, reducing the risk of exposing the company's network if file sharing is enabled when browsing the Internet.


  • Preventing users from adding and removing services. If this is not controlled, you could not keep track of "plugging the hole" in vulnerable areas of the network operating system. This obviously increases the risk of an attack.

Note that when implementing a group security policy, all users should not have the same level of policy structure. Categorize users in different groups and the group security policy applied to these respective groups applies to the members of the group. For example, the Help Desk group, which will consist of personnel with technical skills, may have a policy that allows them to access users' workstations to resolve problems remotely but within the company

Requires Free Membership to View

network. However, this same group should not access confidential files stored in network servers or senior department members' hard drives.

Also look at mobile devices, such as notebooks, Palm devices, etc. when applying group policies. Group policies for these users should limit them to e-mail and updating of files stored on the network servers, depending on which server they are authorized to access.

Adesh Rampat has 10 years of experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

This was first published in April 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.