ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    New to Windows Active Directory and Group Security Management

    IT Discussion
    windows active directory
    8
    13
    592
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @srdennis
      last edited by

      @srdennis I edited the title to reflect the question topic about users and permissions rather than about networking.

      1 Reply Last reply Reply Quote 1
      • CloudKnightC
        CloudKnight
        last edited by

        Using a local Administrator account is better than using a Domain Account on all workstations. You can add a GPO that will push a Local Administrator account to all machines using Restricted Groups. It's advised not keep using the domain account for privilege escalation for installing applications etc.

        DashrenderD 1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender @CloudKnight
          last edited by

          @StuartJordan said in New to Windows Active Directory and Group Security Management:

          Using a local Administrator account is better than using a Domain Account on all workstations. You can add a GPO that will push a Local Administrator account to all machines using Restricted Groups. It's advised not keep using the domain account for privilege escalation for installing applications etc.

          It is? since when? And the reasoning?

          Now granted, if your have a larger org, it's not uncommon to have a domain level account that would have workstation admin rights, but I don't see the harm in using a Domain Admin account for installing apps, unless that account somehow gets attached to the app - that could be bad.

          CloudKnightC 1 Reply Last reply Reply Quote 0
          • CloudKnightC
            CloudKnight @Dashrender
            last edited by

            @Dashrender Imagine using this Domain Admin account on workstations constantly. Imagine a 0 day RAT tool or Key Logger is on one of these machines. At least if it's just a local admin account they cannot do as much damage.

            GreyG 1 Reply Last reply Reply Quote 0
            • GreyG
              Grey @CloudKnight
              last edited by

              @StuartJordan said in New to Windows Active Directory and Group Security Management:

              @Dashrender Imagine using this Domain Admin account on workstations constantly. Imagine a 0 day RAT tool or Key Logger is on one of these machines. At least if it's just a local admin account they cannot do as much damage.

              Imagine a competent sysadmin that keeps that shit off the network.

              In practice, you'll never see a team using a local admin account, especially if it's pushed through gpo. BTW, that's a huge security flaw unless you're using MS LAPS. Your helpdesk team is more likely to use a superuser account, either shared or individually assigned, to handle elevated requests or work on 'what needs to be done.' The local administrator account should be disabled. See https://social.technet.microsoft.com/wiki/contents/articles/13217.best-practices-and-tricks-to-protect-local-admin-passwords-at-a-large-scale.aspx

              @srdennis said in New to Windows Active Directory and Group Security Management:

              We have a windows 2019 server domain controller that our client computers use for user credentials. When I set up a new client computer, I create a local administrator account. I then join the computer with the domain and log in with a domain user administrator account.

              Good so far. This verifies that your new box is domain joined. Don't forget to go to ADUC and move the system to a valid container.

              If I need to make changes to the computer (say to change the UAC, change certain options, etc), I cannot use the domain administrator account and need to switch to the local user administrator account.

              Is this how it is suppose to work? If not, where should I look to change settings so that the domain administrator account can make changes on the client computer?

              This sounds wonky. You should be fine to login to the system and make alterations if your AD is default settings. I would probably look at your group policy and see if any items were altered (FTLOG don't only alter the default domain policy, and then, only adjust the password settings if needed).

              CloudKnightC 1 Reply Last reply Reply Quote 0
              • CloudKnightC
                CloudKnight @Grey
                last edited by

                @Grey said in New to Windows Active Directory and Group Security Management:

                Imagine a competent sysadmin that keeps that shit off the network.

                Well you know that not everyone is a competent sysadmin though and things can happen. If you can reduce risk then why the hell not.

                Local acount would be using MS LAPS to make secure password and turn on for password expiry. My main point though was not using any Domain Admin account for escalation.

                ObsolesceO 1 Reply Last reply Reply Quote 0
                • ObsolesceO
                  Obsolesce @CloudKnight
                  last edited by

                  @StuartJordan said in New to Windows Active Directory and Group Security Management:

                  @Grey said in New to Windows Active Directory and Group Security Management:

                  Imagine a competent sysadmin that keeps that shit off the network.

                  Well you know that not everyone is a competent sysadmin though and things can happen. If you can reduce risk then why the hell not.

                  Local acount would be using MS LAPS to make secure password and turn on for password expiry. My main point though was not using any Domain Admin account for escalation.

                  I'm glad there is no local admin or local administrators here on user devices. None of that stuff to worry about!

                  1 Reply Last reply Reply Quote 0
                  • IRJI
                    IRJ
                    last edited by IRJ

                    Make an AD group called workstation_admins and add that group to local administrators account on each desktop. This group does not need any AD rights and nobody's account should be in there except for IT admin accounts. Even those IT admin accounts should not be used on local desktops to login on a regular basis. Only when elevation is actually needed, and even then you should use run as.

                    black3dynamiteB DashrenderD 2 Replies Last reply Reply Quote 1
                    • black3dynamiteB
                      black3dynamite @IRJ
                      last edited by

                      @IRJ said in New to Windows Active Directory and Group Security Management:

                      Make an AD group called workstation_admins and add that group to local administrators account on each desktop. This group does not need any AD rights and nobody's account should be in there except for IT admin accounts. Even those IT admin accounts should not be used on local desktops to login on a regular basis. Only when elevation is actually needed, and even then you should use run as.

                      Here's a good example.
                      http://www.yster.org/role-based-access-control/

                      Create the Permission groups
                      10f60cde-c746-40ff-88fe-42c9e60aa449-image.png

                      Assign the relevant permissions/rights to the Permission groups
                      aca01d11-fd9d-4bcd-abb2-6f161481f111-image.png

                      1 Reply Last reply Reply Quote 1
                      • DashrenderD
                        Dashrender @IRJ
                        last edited by

                        @IRJ said in New to Windows Active Directory and Group Security Management:

                        Make an AD group called workstation_admins and add that group to local administrators account on each desktop. This group does not need any AD rights and nobody's account should be in there except for IT admin accounts. Even those IT admin accounts should not be used on local desktops to login on a regular basis. Only when elevation is actually needed, and even then you should use run as.

                        I do this - Those who need it have a workstation admin account and a local non admin normal account.

                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post