Position | Description |
---|---|
1-3 | Entity. For objects under control of the |
4-5 | Functions Code. This code described the role of the device. The authorized options within this category are:MD - Mobile DeviceNB - Notebook / Laptop computerNX - Notebook / Laptop non-Domain Member (requires ISO Approval memo)TC - Thin Client Computing DeviceWK - Workstation / Desktop computerWX - Workstation non-Domain Member (requires ISO Approval memo) |
6-7 | Department. The 2 digit code that identifies the activity within the entity assigned the device for usage. If the device is a shared device, then the primary agency responsible for its proper usage will be identified. |
8-10 | Site Code. The 3 digit code identifies the city. Here is a good reference for CA city name codes Each state should have a state government website with similar codes. This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
11-15 | Asset Tag. The 5 digit code that reflects the official |
Example Computer Name
Position | Description |
---|---|
1-3 | Entity. For objects under control of the |
4-5 | Functions Code. The authorized options in this category are:AP - Application ServerAV - Anti-Virus ServerBE - Back End Mail ServerBG - Backup Gateway ServerBH - Bridgehead Mail ServerCA - Certificate Authority ServerDB - Database ServerDC - Domain ControllerDF - Distributed File System (DFS) ServerDH - Dynamic Host Configuration Protocol (DHCP)DN - Domain Name ServiceFE - Front End Mail ServerFS - File ServerFX - Fax ServerGA - Gateway / Bridge ServerGC - Global Catalog ServerLS - List ServerMD - Mobile DeviceML - Mail ServerMQ - Message Queue ServeGC - Global Catalog ServerML - Mail ServerMS - Media ServerNM - Network Management ServerPS - Print ServerPX - Proxy ServerRA - Remote Access ServerSM - System Management ServerSE - Security ServerWS - Web ServerVM - Voice MessagingVP - Voice Processor |
6-7 | Department – The 3 digit code that identifies the activity or agency assigned the device for usage. If the device is a shared device, then the primary agency responsible for its proper usage will be identified. |
8-10 | Site Code. The 3 digit code identifies the city. Here is a good reference for CA city name codes: http://www.dot.ca.gov/hq/structur/strmaint/brlog/table_c.htm This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
11-15 | Asset Tag. The 5 digit code that reflects the official |
Example Server Name
Position | Description |
---|---|
1-3 | Entity. For objects under control of the |
4-5 | Functions Code. The authorized options in this category are:AP - Application ServerAV - Anti-Virus ServerBE - Back End Mail ServerBG - Backup Gateway ServerBH - Bridgehead Mail ServerCA - Certificate Authority ServerDB - Database ServerDC - Domain ControllerDF - Distributed File System (DFS) ServerDH - Dynamic Host Configuration Protocol (DHCP)DN - Domain Name ServiceFE - Front End Mail ServerFS - File ServerFX - Fax ServerGA - Gateway / Bridge ServerGC - Global Catalog ServerLS - List ServerMD - Mobile DeviceML - Mail ServerMQ - Message Queue ServeGC - Global Catalog ServerML - Mail ServerMS - Media ServerNM - Network Management ServerPS - Print ServerPX - Proxy ServerRA - Remote Access ServerSM - System Management ServerSE - Security ServerWS - Web ServerVM - Voice MessagingVP - Voice Processor |
6-7 | Department – The 3 digit code that identifies the activity or agency assigned the device for usage. If the device is a shared device, then the primary agency responsible for its proper usage will be identified. |
8-10 | Site Code. The 3 digit code identifies the city. Here is a good reference for CA city name codes: http://www.dot.ca.gov/hq/structur/strmaint/brlog/table_c.htm This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
11-15 | Virtual Machine Session ID: This number begins with VM and contains 3 additional digits to represent the unique identification for the virtual machines session at that location (e.g. VM021). |
Example Virtual Server Name
Position | Description |
---|---|
1-3 | Entity. For objects under control of the |
4-5 | Functions Code. The authorized options in this category are:FW - FirewallGW - VoIP Gateway RouterRT - RouterSW - Switch |
6-7 | Department – The 3 digit code that identifies the activity or agency assigned the device for usage. If the device is a shared device, then the primary agency responsible for its proper usage will be identified. |
8-10 | Site Code. The 3 digit code identifies the city. Here is a good reference for CA city name codes: http://www.dot.ca.gov/hq/structur/strmaint/brlog/table_c.htm This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
11-15 | Asset Tag. The 5 digit code that reflects the official |
Example Network Infrastructure Name
Position | Description |
---|---|
1-3 | Entity. For objects under control of the |
4-5 | Functions Code. The authorized options in this category are:DM - Monitoring Device for HVAC / Environmental statusDS - Stand Alone Digital SendersPL - PlotterPR - Printers or Multi-function Print Devices (MFP)SC - Security Device, such as door badge system |
6-7 | Department – The 3 digit code that identifies the activity or agency assigned the device for usage. If the device is a shared device, then the primary agency responsible for its proper usage will be identified. |
8-10 | Site Code. The 3 digit code identifies the city. Here is a good reference for CA city name codes: http://www.dot.ca.gov/hq/structur/strmaint/brlog/table_c.htm This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
11-15 | Asset Tag. The 5 digit code that reflects the official |
Example Network Peripherals Name
Position | Description |
---|---|
1-3 | Entity Code. For objects under control of the |
4 | This position will use a “.” to delimit the different positions. |
5-11 | Service Name. This will generally be a friendly name to identify what the service account is used for. |
12 | This position will use a “.” to delimit the different positions. |
13-15 | Account Type. The 3 digit code will identify the Active Directory accounts use. The authorized options in this category are:SVC - Service AccountTSK - Scheduled Task |
Example Service Account Name
Position | Description |
---|---|
1-6 | Security Group Type. For objects under control of the < Entity Code Security Group Type >, the example code for this document is “XYZACL”. |
7 | This position will use a “_” to delimit the different positions. |
8-X | Object Identifier. This will generally be a friendly name to identify what the object is used for. Try to make the Object Identifier as descriptive as possible and unique for each object you might apply permissions to.AD - Active Directory Delegation of OUGPO - Group Policy Object e.g. Security Filtering of GPOFile - Network File Server Shared FolderWorkstation - Local Groups of Workstation e.g. Built-in Administrators Group (Workstation or Laptop)Network - Network device access. e.g. router and switchServer - Local Groups of Server e.g. Built-in Administrators GroupSPSite - Sharepoint SiteSPList - Sharepoint ListSPLibrary - Sharepoint Document RepositoryVMWare - VMWare permission delegation |
X-X | This position will use a “_” to delimit the different positions |
X-X | Object Name. This will be the friendly name of the object. e.g. OU Name, GPO Name, Folder Name. This field is not required if the object is being applied to all objects (for example: XYZACL_Workstation_LocalAdmins ). Additionally, an Object Name would be necessary if the group is being applied to only one system, (for example: XYZACL_Workstation_XYZNBSAC12345_LocalAdmins ). |
X-X | Permission. The permission will identify exact permission that the ACL is used (e.g. FullControl, Modify, LocalAdmins ). Try to make the permission as descriptive as possible. |
Example Security group that has delegated control of the Laptops OU
Example Security group that is added to the built-in Administrators Group of all client systems.
Example Security group that is added to the built-in Administrators Group of one client system.
Position | Description |
---|---|
1-6 | Security Group Type. For objects under control of the < Entity > domain. The example code for this document is “XYZUSR”. |
7 | This position will use a “_” to delimit the different positions. |
8-13 | Department/Team. This is the six digit code for the department and team. There is no set standard, each Entity will have to derive their own set of abbreviations. The first three digits should indicate the Department and the last three digits would be the sub team with-in the department, if it exists. Below are some examples.TECSVC - Technical ServicesHRSBEN - Human Resources Benefits SectionEXECUT - Executive Suite. E.g. CEO, CIOBRDDIR - Board of Directors |
14 | This position will use a “_” to delimit the different positions. |
15-X | Job Title. This will be the friendly job title of the employee. It should be based off the Human Resources position title document. |
Example of Security group User Job Title
Example of Security Group User for department “all” groups. In order to facilitate combining all the users in one department there should be a group that all the job title groups can be combined into.
Position | Description |
---|---|
1-6 | Security Group Type. For objects under control of the < Entity > domain. The example code for this document is “XYZCMP”. |
7 | This position will use a “_” to delimit the different positions. |
8-13 | Department/Team. This is the six digit code for the department and team. There is no set standard, each Entity will have to derive their own set of abbreviations. The first three digits should indicate the Department and the last three digits would be the sub team with-in the department, if it exists. Below are some examples.TECSVC - Technical ServicesHUMRES - Human ResourcesEXECUT - Executive Suite. e.g. CEO, CIOBRDDIR - Board of Directors |
14 | This position will use a “_” to delimit the different positions. |
15-X | Group Designation. This will be the friendly group name. e.g. “All” or “Test”. |
Example of Security Group Computers
Position | Description |
---|---|
1 | First Initial. This position should be the first name initial. |
2-X | Last Name. These positions should be the last name. |
X | This position will use a “.” to delimit the different positions |
X-X | Admin Function. These last two characters indicate what administrative function the account is used for.wk - Workstation Administratorsv - Server Administratordc - Domain Administratornd - Network Administrator e.g. router/switch accountadmin - Security appliance Administrator |
Example Client Administrator account name
Position | Description |
---|---|
1 | First Initial. This position should be the first name initial. |
2-X | Last Name. These positions should be the last name. |
X | This position will use a “.” To delimit the different positions. |
X-X | Account Classification. These three characters will be used to indicate the user type for purposes of any special restrictions that might need to be applied.emp - Employeectr - Contractorven - Vendorvol - Volunteerint - Intern |
X-X | Unique Identifier. This is an optional field and is only used if two or more people have the same first initial and last name.01-99 - Second and subsequent accounts |
Examples of standard employee user account
Examples of second standard employee user account for users with the same name
Examples of third standard employee user account for users with the same name
Position | Description |
---|---|
1-X | First Name. This position should be the first name. |
X | This position will use a “.” to delimit the different positions. |
X | Middle Initial. This positions should be the middle initial. (If no middle initial just place a single “.” Between first and last |
X | This position will use a “.” to delimit the different positions. |
X-X | Last Name. This position should be the last name. |
X | This position will use a “.” to delimit the different positions. |
X-X | Account Classification. These three characters will be used to indicate the user type for purposes of any special restrictions that might need to be applied.emp - Employeectr - Contractorven - Vendorvol - Volunteerint - Intern |
X | This position will use a “@” to delimit the start of the email domain. |
X-X | Company Domain Name. For the purposes of this document “XYZ” will be used. |
X | This position will use a “.” to delimit the different positions. |
X-X | TLD. This position is the top level domain name of “com” |
Example of standard user email account naming breakdown
Position | Description |
---|---|
1-3 | Agency Code. For the purposes of this document “XYZ” will be used. |
4 | In the Display name field this position will use a “ “ to delimit the different positions. In the Alias name field this position will use a “.” to delimit the different positions. |
5-X | Object Type. These positions will indicate whether the object is a Distribution List or Organizational Mailbox.Distribution List. This position will use “list” to indicate the object is a distribution list.Organizational Mailbox. In the Display name field this position will use “Mailbox” and “mbx” in the alias field. |
X | In the Display name field this position will use a “ “ to delimit the different positions.In the Alias name field this position will use a “.” to delimit the different positions. |
X-X | Object Name. This position should be the department name, abbreviation or friendly name of the distribution list. e.g. “IT Network Admins”, “IT” “ISO”, “IT HelpDesk”, “IT System Admins”. Each Object name should begin with the Department abbreviation when applicable. e.g “IT”, “HR”, “FIN” or contain a friendly generic name, such as:In the Display name field a “ “ will be used between words.In the Alias name field a “-” will be used between words. |
X | This position will use a “@” to delimit the start of the email domain. |
X-X | Company Domain Name. For the purposes of this document “XYZ” will be used. |
X | This position will use a “.” to delimit the different positions. |
X-X | TLD. This position is the top level domain name of “com” |
Example of Distribution List
Example of Organizational Mailbox
Position | Description |
---|---|
1-3 | Entity Code. For objects under control of the < Entity > domain. The example code for this document is “XYZ”. |
4-6 | Site Code. The 3 digit code that identifies the city. Here is a good reference for CA city name codes: http://www.dot.ca.gov/hq/structur/strmaint/brlog/table_c.htm This site has some cities with 4 character abbreviations, but in order to maintain the overall consistency with other areas of this document, use only 3 characters. |
7-8 | Site Number. This will identify any cities that might have multiple sites.01 - First or only site in a city02-99 - Second and subsequent sites in a city |
Example of Active Directory Sites and Services naming breakdown for a city with only one site
Example of Active Directory Sites and Services naming breakdown for a city with multiple sites.
This section is designed to provide an example for how to implement role based access. It can be used for both user and administrator delegation. Depending on the size of the organization, it could be very manpower intensive to implement, but provides a lot of value in the end. For the job title
Example of Role Based security groups used on a file server
Example of Role Based security group used for local administrative access of clients
domain.com
Example OU structure
Example OU with security group for file share
Example OU with security group for client local administrator group
Example OU with security group for Active Directory delegation