To begin with a domain local group can be a member of another domain local group within the same domain.
Active directory security groups nesting.
Recommended best practice for active directory groups nesting strategy.
As the table above illustrates a group can be a member of another group.
Nesting can be limited by the scopes of the groups in play.
In addition local users and computers can also be members of this group.
If this is for public folders forget it they must be distribution groups as far as i am aware.
Add accounts to a global group add the global group to a universal group add the universal group to a domain local group apply permissions for the domain local group to a resource.
Adding distribution groups in nesting scenarios.
It pro rick vanover explains the cons and limited pros of this practice.
Nesting helps you better manage and administer your environment based on business roles functions and management rules.
Domain local global and universal.
This can look like in the illustration below.
For administrators who work with active directory there is an opinion on whether or not to nest global security groups.
Short answer no but there are limitations.
Universal groups light blue.
This process is called nesting.
Select azure active directory and then select groups.
Nesting of domain local groups.
A universal group can be a member of a universal group or a domain local group a global group can be a member of any type of group if it s another global it must be from the same domain.
Active directory nested groups best practices.
Active directory security groups best practices in addition to group nesting management tips there are also many things to keep in mind when it comes to managing your security groups.
Trying to set up nesting groups in active directory can quickly become a challenge especially if you don t have a solid blueprint in place.
To add a group as a member of another group sign in to the azure portal using a global administrator account for the directory.
It s important to regularly take stock of which employees have access and permission to which resources.