Reassessing My AD Cleanup Strategy: Am I Overcomplicating It?

0
0
Asked By TechieTurtle92 On

I've recently taken over an Active Directory setup at a healthcare organization that's desperately in need of some organization. The previous admins and a managed service provider (MSP) tried to 'clean up' the environment, but honestly, they just shuffled things around without bringing any real structure.

I'm looking to implement a straightforward Role-Based Access Control (RBAC) model while keeping Organizational Units (OUs) flat and reducing the admin workload. My aim is to prepare for future integrations with our HR system for auto-provisioning and Intune deployment.

**Current Situation:**
- No nested security groups; everything is assigned directly, leading to dozens of randomly named security groups with only a few users in each.
- Users and computers are only organized by location (we have many small offices).
- There's no consistent naming convention.
- There's a lack of clarity regarding what each role should have access to.

**Proposed Solution:**
I'm thinking of a simplified OU structure with just 5 top-level OUs:
```
Root Domain
├── Healthcare Organization
│ ├── Users OU
│ ├── Computers OU
│ ├── Servers OU
│ ├── Groups OU
│ └── Service Accounts OU
```

I plan to have a three-tier RBAC model where users are direct members of:
1. Location Groups
2. Department Groups
3. Role Groups

My goal is to maintain a simple OU structure while using security groups for access control through this nested RBAC approach.

So I'm wondering:
1. Is my approach too complex for an organization of about 1000 users?
2. Are there any potential problems I'm missing?
3. Any advice on migration strategies from our current chaotic setup?

Before I dive into a test implementation, I'd love to get some feedback or hear any relevant experiences. I really want to balance simplicity, security, and manageability, but it feels overwhelming at times!

5 Answers

Answered By OldSchoolAdmin On

I've been using a similar approach for years, and it works well! Just remember, the simpler you keep it, the better it's going to be for everyone in the long run. Keep asking questions and gathering feedback as you implement changes.

Answered By UserGuru87 On

It sounds like you're trying to simplify the environment, but just be careful! The flat OU structure with RBAC is generally good, but make sure your roles are well-defined before committing, as it might turn chaotic later on. Understanding the current state thoroughly is crucial before making changes.

SystemSage55 -

Absolutely! Before you make the swap, dive into the existing GPOs—those could unveil important insights about the current setup.

Answered By SureThingSam On

Your current system might already have some good elements in place, so I’d hesitate to change everything at once. Consider slowly building your new structure atop the existing one and reevaluate as needed!

Answered By FutureBuilder79 On

I think your proposed structure is on the right track! You might want to add an additional OU for disabled users, so you can manage those accounts more easily. Also, keep in mind that as roles evolve, individual permissions might come into play, so be ready to tweak things as needed.

JustMyTwoCents -

That’s a solid point! In my experience, it always ends up being that people need specific access, which complicates things down the line.

Answered By ComplianceCaptain On

Make sure you know the regulations applicable to your healthcare environment. Compliance is key, and if your implementation isn’t compliant, it could spell disaster for the organization. Have you talked to stakeholders about who carries the risk if things go south? Those conversations are essential.

OverthinkingAdmin -

I can relate—compliance isn’t something to overlook. Initially, I ignored it, thinking I could figure it out later, which led to a lot of headaches!

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.