NETWORK & DATA SECURITY

Policies are key to managing user levels and access

UTM

Unified Threat Management

EMAIL

Email security and archiving

ENDPOINT SECURITY

Data breach security

POLICIES

User and group policies

Policies

Group policies allow for the centralised management of user's computing environments. Group policy gives you additional controls over users and computer accounts in your business network.
Policies - Technical Outsource

Group Policy is a feature of Microsoft Windows Active Directory. It offers a hierarchical infrastructure that allows a network administrator in charge of Microsoft’s Active Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool and can be used to apply security settings to users and computers.

Group Policy, in part, controls what users can and cannot do on a computer system:

Group Policy examples:

  • Enforce a password complexity policy
  • Prevent unidentified users from connecting to a network share
  • Block access to Windows Task Manager
  • Restrict access to specific folders etc.

The Benefits of Group Policy

Ease of Management

Managing a network is so much easier if you connect all users through Group Policy. You can make everyone’s machine aesthetically uniform, i.e. same wallpapers, same screen savers, same log-on messages, etc.

Cost and Time

With Group Policy, we can install/update/upgrade software from a single location, and service every single machine simultaneously. If your network is 500+ machines or 10 machines, a system upgrade is no longer a nightmare. Not only that, we can schedule the updates/installs to occur outside of business hours, that way no one is interrupted while they’re working! This prevents downtime and lost productivity time.

Roaming Profiles

To illustrate how roaming profiles work, let’s create a hypothetical scenario:

Company XYZ has offices on four floors of a building. There are 400 employees, spread throughout 25 departments. Annie is a graphic designer who works on the 3rd floor, and she’s been working on a big project for the last two weeks and is about to present it to her client. She joins the client and her boss in the conference room on the 1st floor of the building.

There’s a computer in the conference room, but it doesn’t have any of the graphics software that Annie uses for her job, because no one on the first floor needs it. Because Company XYZ uses Active Directory, Group Policy enables users to have roaming profiles, so when Annie logs onto the computer in the conference room, it loads all the settings to which Annie’s account is authorised. She is then able to access all the software she needs to present her work and can make changes on the spot if necessary, without having to worry about accessibility issues.

Group policy is critical for your business. We’re here to help you set it up and manage it.

Group policy

VISIT US

37 Homestead Rd,
Edenburg, Sandton
2128, South Africa

Open Monday to Friday 8 am to 5 pm

CALL US

Please use the numbers below to give us a call and tell us your needs. We will gladly arrange a call out introductory meeting

 

EMAIL US

For more information on our services and solutions, please drop us an email and we will revert at the earliest

contact@technicaloutsource.co.za.

Copyright © 2019. All Rights Reserved.
Website design and hosting by The Business City