Group policies
What are group policies?
Group policies define permissions and settings for groups of users, enabling administrators to standardize and streamline access control.
How are group policies useful?
Group policies help ensure consistency in user permissions, simplify administrative tasks, and support secure and efficient management of user groups.
How do I access the Group Policies page?
- Sign into app.beyondtrust.io.
The BeyondTrust Home page displays. - From the left menu, click Remote Support > Users & Security.
The Users page displays. - At the top of the page, click Group Policies.
The Group Policies page displays.
How to configure group policies
Add new policy, edit, delete
Create a new policy, modify an existing policy, or remove an existing policy.
NoteIf you edit the group policy that is the default for the local provider, or has local administrator users, and remove administrator permissions, a warning message appears. Ensure other users have administrator permissions before proceeding.
Change order
Click the Change Order button to drag and drop group policies to set their priority. Click Save Order for prioritization changes to take effect. When multiple policies apply to a given user, the permissions take effect by starting at the top of the Group Policies list, and then moving down the list. If a permission conflicts with a permission applied by a group policy higher in the list, then the lower permission will overwrite the higher, unless the higher was set as Final. In short, group policies that appear lower in the list have a higher functional priority than those that are higher.
Search group policies
To quickly find an existing policy in the list of Group Policies, enter the name, or part of the name. The list filters to all policies with a name containing the entered search term. The list remains filtered until the search term is removed, even if the user goes to other pages or logs out. To remove the search term, click the X to the right of the search box.
If you click the Change Order button after searching the list, all group policies appear. You can drag and drop group policies to set their priority. When you click Save Order, the changes take effect and the list returns to policies with a name containing the entered search term.
Expand all / collapse all
To assist with searching and navigating the group policies, click the Expand All link above the grid to expand the details of all listed group policies. Click Collapse All to return to the unexpanded list of group polices.
Copy
To expedite the creation of similar policies, click Copy to create a new policy with identical settings. You can then edit this new policy to meet your specific requirements.
Add or edit policy
After making your edits, click Save to save your changes to this group policy.
Policy name
Create a unique name to help identify this policy.
Available members and policy members
To assign members, select a member from the Available Members list and click Add to move it to the Policy Members box. Use the Search box to find existing members.
You can select users from your local system, or select users or entire groups from configured security providers. To add users or groups from an external directory store such as LDAP, RADIUS, or Kerberos, you must first configure the connection on the /login > Users & Security > Security Providers page. If an attempt to add a user from a configured security provider is invalid, the synchronization log error message appears here as well as in the log.
You can also apply a Jump Policies to manage user access to the Jump Items in this Jump Group.
Updated about 2 months ago