M
mschunk
I want to lock down AD, really hard...and delegate authority to a
select few OU's that contain most of the users/computers/groups. (I'm
growing leery of using the term "delegate authority" now that I'm
understanding more about controlling security to AD objects by hand.)
What is the "godly" group/account?
1) Administrator
2) Administrators
3) Enterprise Admins
4) Domain Admins
I'm starting to think the only correct answer is #2. The "Built-in"
Administrators group.
I just learned that #1 is wrong. By "default" the (local)
Administrator on the DC is a member of #'s 2,3, and 4 above...and it
does not HAVE to be that way.
Enterprise Admins, and domain Admins...seams to have full control only
because they are member of #2.
Can anyone confirm this?
Next question...the SYSTEM account.
it looks like the NT "SYSTEM" account is getting full control, by
default, of every single object created. But this permission is being
applied explicitly to every single object...not by inheritance.
This bothers me! To me, this means that ANY code that is executed in
the context of the SYSTEM account has full control of active directory.
Many services running on the DC fall into this category. Or am I
mistaken, and the "local system" account so many services are running
under actually something different?
Is there a better newsgroup for security-specific issues w/ AD?
Thank you for your time.
select few OU's that contain most of the users/computers/groups. (I'm
growing leery of using the term "delegate authority" now that I'm
understanding more about controlling security to AD objects by hand.)
What is the "godly" group/account?
1) Administrator
2) Administrators
3) Enterprise Admins
4) Domain Admins
I'm starting to think the only correct answer is #2. The "Built-in"
Administrators group.
I just learned that #1 is wrong. By "default" the (local)
Administrator on the DC is a member of #'s 2,3, and 4 above...and it
does not HAVE to be that way.
Enterprise Admins, and domain Admins...seams to have full control only
because they are member of #2.
Can anyone confirm this?
Next question...the SYSTEM account.
it looks like the NT "SYSTEM" account is getting full control, by
default, of every single object created. But this permission is being
applied explicitly to every single object...not by inheritance.
This bothers me! To me, this means that ANY code that is executed in
the context of the SYSTEM account has full control of active directory.
Many services running on the DC fall into this category. Or am I
mistaken, and the "local system" account so many services are running
under actually something different?
Is there a better newsgroup for security-specific issues w/ AD?
Thank you for your time.