ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Local Administrator Accounts Security

    IT Discussion
    8
    10
    776
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ElecEng
      last edited by

      On the various server VM's the customer wants a local admin account in addition to the domain admin account.

      For security though should we disable the administrator account and create a different named local account with admin privileges instead?

      Are we gaining a lot of security by doing this?

      Thinking of using LAPS for these also.

      M scottalanmillerS ObsolesceO PhlipElderP 4 Replies Last reply Reply Quote 0
      • gjacobseG
        gjacobse
        last edited by

        I believe, as a general rule you want to disable any account that is Admin or Administrator. They are to easy to attack.

        Can you have Administrative accounts? yes - just don't use Admin or Administrator, anything but. In my current environment, it's still not advised, but they use First(initial)admin (ie: GAdmin). Again, I wouldn't use anything with Admin in it.

        Something better was what the State used was (code)-UserName; in their case it was EAS-UserName, whereas UserName was the normal 'user' account. No, don't know what EAS stands for,.. maybe something along the lines of Elevated Administrative Security (shrug)...

        And local accounts can be forgotten about which causes a different set of issues.

        E 1 Reply Last reply Reply Quote 0
        • DashrenderD
          Dashrender
          last edited by

          In Windows the original Administrator account is apparently a pretty special account (so I've read).

          To that end, the advice I've seen is to rename that Admin account to something else. The bad thing about that - if it still holds true - the Administrators account always has the same SAM, so not sure how helpful this is.

          1 Reply Last reply Reply Quote 1
          • M
            marcinozga @ElecEng
            last edited by

            @eleceng said in Local Administrator Accounts Security:

            On the various server VM's the customer wants a local admin account in addition to the domain admin account.

            For security though should we disable the administrator account and create a different named local account with admin privileges instead?

            Are we gaining a lot of security by doing this?

            Thinking of using LAPS for these also.

            Security through obscurity. Yeah, no. You're better off implementing some form of 2FA.

            scottalanmillerS 1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller @ElecEng
              last edited by

              @eleceng said in Local Administrator Accounts Security:

              For security though should we disable the administrator account and create a different named local account with admin privileges instead?

              Not a bad idea. Good way to go.

              1 Reply Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @marcinozga
                last edited by

                @marcinozga said in Local Administrator Accounts Security:

                @eleceng said in Local Administrator Accounts Security:

                On the various server VM's the customer wants a local admin account in addition to the domain admin account.

                For security though should we disable the administrator account and create a different named local account with admin privileges instead?

                Are we gaining a lot of security by doing this?

                Thinking of using LAPS for these also.

                Security through obscurity. Yeah, no. You're better off implementing some form of 2FA.

                For sure 2FA goes much farther.

                1 Reply Last reply Reply Quote 1
                • ObsolesceO
                  Obsolesce @ElecEng
                  last edited by Obsolesce

                  @eleceng said in Local Administrator Accounts Security:

                  should we disable the administrator account and create a different named local account with admin privileges instead

                  @eleceng said in Local Administrator Accounts Security:

                  Are we gaining a lot of security by doing this?

                  Not likely, the fact the VM is joined to an on-prem AD domain means that it's very likely you've technically already lost any and all security to the device/VM.

                  The only gain here is that you're preventing some random person who's trying to authenticate to the system as a the local Administrator from automatically knowing which username to log in with at that moment. But that is such a small aspect to the actual security of the system you can basically say that no, you are not technically gaining any security by doing that.

                  1 Reply Last reply Reply Quote 0
                  • PhlipElderP
                    PhlipElder @ElecEng
                    last edited by

                    @eleceng said in Local Administrator Accounts Security:

                    On the various server VM's the customer wants a local admin account in addition to the domain admin account.

                    For security though should we disable the administrator account and create a different named local account with admin privileges instead?

                    Are we gaining a lot of security by doing this?

                    Thinking of using LAPS for these also.

                    Yup. Use LAPS. It's excellent.

                    1 Reply Last reply Reply Quote 0
                    • E
                      ElecEng @gjacobse
                      last edited by

                      @gjacobse we did similar at a previous job. But we used ADM.

                      dbeatoD 1 Reply Last reply Reply Quote 0
                      • dbeatoD
                        dbeato @ElecEng
                        last edited by

                        @eleceng Just make sure that you have an account that is not the built-in Administrator user as the only Domain admin and the GPO Policy applied only to certain OUs and not the domain root. Otherwise you will have a problem in your hands.

                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post