GPO Configuration for Atria
Overview
Atria provisions permissions within Active Directory (AD) to support the assignment of Group Policy Objects (GPOs) to restricted customer Organizational Units (OUs).
This document outlines how permissions must be configured for GPO assignment to work reliably in Atria-managed environments.
AD Structure Example
The following is an example of a permission structure that supports GPO assignment to customer-specific OUs:
GPOAccess Group Permissions
The GPOAccess groups are assigned read/traversal-level permissions on the relevant OUs. These enable GPO application while restricting broader access.
| Permission | Definition | Active Directory Definition |
|---|---|---|
| Deny - List Contents | Prevents viewing of the contents of the OU and its descendant objects | Prevents users from seeing files or subfolders inside the OU. |
| Allow - List Object | Allows viewing of the OU itself | Users can see the OU exists, but cannot access contents. |
| Allow - Read all properties | Allows reading of all properties of the OU | Users can view metadata (e.g., name, timestamps), but not modify anything. |
- These permissions enable GPO application without exposing sensitive data or OU structure.
Proxy User Group Permissions
Proxy (CustomerCode) Users groups are used to grant read access for GPO application and filtering.
| Permission | Definition | Active Directory Definition |
|---|---|---|
| Allow - Read | Allows reading of the OU and its descendant objects | Grants visibility into contents of the OU and subfolders, without permission to modify them. |
Traversal and Inheritance
To ensure GPOs reach the correct user objects:
GPOAccessgroups must provide "Read all properties" and "List object" access through each level of the OU hierarchy.- This allows traversal of "broken inheritance" structures.
- Permissions above the customer OUs are typically granted to the Authenticated Users group.
Microsoft Security Patch: MS16-072
With the release of MS16-072, Microsoft enforced stricter security rules for GPO processing: