Imagine if your users had full control of everything on the network. This Processor.com article takes an in-depth look at the purpose of implementing access control policies and enforcing group policies to reduce the risk of data loss. Noted in the article is that a good security group policy is only effective when you determine which employees need rights and which don’t.
“According to Manny Vellon, chief technology officer with Likewise (www.likewise.com), it’s not easy to determine which employees or groups of employees need rights and which ones don’t. “There is no single blueprint that works for every organization,” Vellon says. ‘We recommend a two-pronged approach. First, develop a plan based on your current understanding of your systems. Second, make sure that you establish processes that keep track of subsequent requests for specific rights and to try to establish patterns based on their requests.'”