How You Can Structure Groups - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

How you can structure groups

Once you have organized your computers into logical groups, you can more easily
manage your security policies.
See
Performing tasks that are common to all security policies"
You can create multiple groups and subgroups to match the organizational
structure of your company. You can base your group structure on function, role,
geography, or a combination of criteria.
Criteria for creating groups
Table 8-2
Criterion
Description
Function
You can create groups based on the types of computers to be managed, such
as laptops, desktops, and servers. Alternatively, you can create multiple
groups that are based on usage type. For example, you can create a Mobile
group for the clients that travel and a Local group for the clients that remain
in the office.
Role
You can create groups for department roles, such sales, engineering, finance,
and marketing.
Geography
You can create groups based on the offices, cities, states, regions, or countries
where the computers are located.
Combination
You can create groups based on a combination of criteria. For example, you
can use the function and the role.
You can add a parent group by role and add child subgroups by function, as
in the following scenario:
Sales, with subgroups of laptops, desktops, and servers.
Engineering, with subgroups of laptops, desktops, and servers.
For example, suppose that a company has telemarketing and accounting
departments. These departments have staff in the company's New York, London,
and Frankfurt offices. All computers in both departments are assigned to the same
group so that they receive virus and security risk definitions updates from the
same source. However, IT reports indicate that the telemarketing department is
more vulnerable to risks than the accounting department. As a result, the system
administrator creates separate telemarketing and accounting groups.
Telemarketing clients share configuration settings that strictly limit how users
can interact with their antivirus and security risk protection.
See the knowledge base article
Managing groups of client computers
Best Practices for Creating Group
How you can structure groups
on page 119.
Structure.
103

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents