Hi All,
Just wondering what best practices you admins have when setting up an OD Master where you are seriously locking down mac workstations.
This includes preventing the users from making system changes, installing/removing applications, locking out websites, ensuring the user's dock always has at least these "x" icons and alias's, etc. etc.
What permissions do you often give to the user?
What is your methodology to how you approach these security measures?
Do you control this at the user level, the group level, the computer level, or the computer group level?
Do you communicate every decision to the owner / CEO?
Do you provide documentation on who has what privileges?
Every office is different and every situation differs, but I just would love to hear how others approach this critical segment of deployment.
All the best!
--Matthew
Just wondering what best practices you admins have when setting up an OD Master where you are seriously locking down mac workstations.
This includes preventing the users from making system changes, installing/removing applications, locking out websites, ensuring the user's dock always has at least these "x" icons and alias's, etc. etc.
What permissions do you often give to the user?
What is your methodology to how you approach these security measures?
Do you control this at the user level, the group level, the computer level, or the computer group level?
Do you communicate every decision to the owner / CEO?
Do you provide documentation on who has what privileges?
Every office is different and every situation differs, but I just would love to hear how others approach this critical segment of deployment.
All the best!
--Matthew