Governing GPOs with a Layered Security Framework


This paper gives an example of how users with sufficient privileges can modify a GPO in ways that compromise network security. It then takes you through these five layers of increasingly tight protection to keep that from happening to your mission-critical GPOs:

Read the paper to see whether a layered framework for AD security would meet your organization’s needs.