Weekly Tip 23

Set your SCCM collections up with proper limiting collections to have a hierarchical setup. It makes permissions management much easier.

Example: company XYZ has two offices, one in New York and one in LA. Each office has its own technical support needing SCCM console rights to their respective collections, but not the other office’s. Each office has its own sales, marketing, and accounting staff. Set collections up like this:

DescriptionCollection NameLimiting Collection Name
All Company Computers(all computers from NY and LA)All-XYZ-ComputersAll Systems
All LA ComputersLA-OfficeAll-XYZ-Computers
All NY ComputersNY-OfficeAll-XYZ-Computers
All LA Sales ComputersLA-Sales-ComputersLA-Office
All LA Marketing ComputersLA-Marketing-ComputersLA-Office
All LA Accounting ComputersLA-Accounting-ComputersLA-Office
All NY Sales ComputersNY-Sales-ComputersNY-Office
All NY Marketing ComputersNY-Marketing-ComputersNY-Office
All NY Accounting ComputersNY-Accounting-ComputersNY-Office

Now, when I assign my rights, I will assign New York technical support staff to the NY-Office collection and LA technical staff to the LA-Office collection. Because of the way limiting collections work, granting them access to those two collections will also grant them access to their respective sales, marketing, and accounting collections. Furthermore, for IT staff such as the help desk that needs to see all devices, I can grant them rights to the All-XYZ-Computers collection and they will see LA-Office, NY-Office, and all sales, marketing, and accounting collections.

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 020
Cyber Security

WME Security Briefing 26 July 2024

Pro-Houthi Group Targets Yemen Aid Organizations with Android Spyware Overview A suspected pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with advanced Android spyware. The operation is associated with the activity cluster codenamed OilAlpha. It

Read More »
WME Cybersecurity Briefings No. 019
Cyber Security

WME Security Briefing 23 July 2024

Samba File Shares Targeted by DarkGate Malware in Recent Cyber Offensive Overview Recent investigations by Palo Alto Networks uncover a brief but significant cyberattack campaign utilizing DarkGate malware. This malicious software exploited Samba file shares to

Read More »
WME Cybersecurity Briefings No. 018
Cyber Security

WME Security Briefing 15 July 2024

OVHcloud Mitigates Record-Breaking 840 Million PPS DDoS Attack Overview In April 2024, OVHcloud, a top French cloud computing firm, successfully stopped a massive DDoS attack. The attack hit a record-breaking rate of 840 million packets per second

Read More »
E-Commerce Security - Solutions for Online Retailers
Azure

E-commerce Security – Solutions for Online Retailers

Today’s hyper-charged e-commerce landscape demands top-notch cybersecurity measures. Cybersecurity for this bustling sector isn’t just about ticking a technical box; it’s the cornerstone of building trust. As businesses and consumers flock to the online space, the

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=