Interfaces and methods for group policy management
First Claim
1. In a computing environment, a method comprising:
- receiving a request to manage security settings of a group policy data construct;
generating a permissions table based on security information associated with the group policy data construct, wherein each row in the permissions table corresponds to a trustee that is at least one computer or at least one user, and each column in the permissions table corresponds to a directory service permission, wherein a plurality of cells in the permissions table contain data regarding an access state to a directory service, whether the access state is inherited, and whether the access state is inheritable, the access state in one of the plurality of cells of the permissions table being denied and the access state in another of the plurality of the cells of the permissions table being allowed;
changing the permissions table to satisfy the request;
saving security settings to the group policy data construct based on the changed permissions table; and
performing a check of the permissions table to determine whether each access state is either in a state of allowed or in a state of denied.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for managing group policy objects in a network, including interfaces that allow access by programs or a user interface component to functions of a group policy management console that performs management tasks on group policy objects and other related objects. The interfaces abstract the underlying data storage and retrieval, thereby facilitating searching for objects, and providing the ability to delegate, view, change and permissions on those objects, and check and save those permissions. Modeling and other test simulations are facilitated by other interfaces. Other interfaces provide dynamic and interactive features, such as to convey progress and rich status messages, and allow canceling of an ongoing operation. Still other interfaces provide methods for operating on group policy related data, including group policy object backup, restore, import, copy and create methods, and methods for linking group policy objects to scope of management objects.
72 Citations
13 Claims
-
1. In a computing environment, a method comprising:
-
receiving a request to manage security settings of a group policy data construct; generating a permissions table based on security information associated with the group policy data construct, wherein each row in the permissions table corresponds to a trustee that is at least one computer or at least one user, and each column in the permissions table corresponds to a directory service permission, wherein a plurality of cells in the permissions table contain data regarding an access state to a directory service, whether the access state is inherited, and whether the access state is inheritable, the access state in one of the plurality of cells of the permissions table being denied and the access state in another of the plurality of the cells of the permissions table being allowed; changing the permissions table to satisfy the request; saving security settings to the group policy data construct based on the changed permissions table; and performing a check of the permissions table to determine whether each access state is either in a state of allowed or in a state of denied. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer storage medium storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
receiving a request to manage security settings of a group policy data construct; generating a permissions table based on security information associated with the group policy data construct, wherein each row in the permissions table corresponds to a trustee that is at least one computer or at least one user, and each column in the permissions table corresponds to a directory service permission, wherein a plurality of cells in the permissions table contain data regarding an access state to a directory service, whether the access state is inherited, and whether the access state is inheritable the access state in one of the plurality of cells of the permissions table being denied and the access state in another of the plurality of the cells of the permissions table being allowed; changing the permissions table to satisfy the request; saving security settings to the group policy data construct based on the changed permissions table; and performing a check of the permissions table to determine whether each access state is either in a state of allowed or in a state of denied. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. In a computing environment, a method comprising:
-
receiving a request to manage security settings of a group policy data construct; generating a permissions table based on security information associated with the group policy data construct, wherein each row in the permissions table corresponds to a trustee that is a computer or a group of computers in a domain, and each column in the permissions table corresponds to a directory service permission, wherein a plurality of cells in the permissions table contain data regarding an access state, whether the access state is inherited, and whether the access state is inheritable; changing the permissions table to satisfy the request; saving security settings to the group policy data construct based on the changed permissions table; and performing a check of the permissions table to determine whether each access state is either in a state of allowed or in a state of denied.
-
Specification