D
David M. Streb, MCSE
Here's a question I've never really investigated until recently; I'm hoping
I'm missing something...
Administrator Account: We regularly rename and place strong passwords onto
this account. This account is limited to the most trusted employee of the
company and never to the normal "administrator" of the network.
Domain Admins: This is the regular, day-to-day account we assign to the
full-time administrator.
Problem: Members of the "Domain Admins" group are permitted to rename,
reset, and change the "Administrator" account, as well as change group
membership for both the "Administrators" and the "Domain Admins" members. In
other words, a lower, less-trusted administrator is free to whatever he
feels to the most trusted account--it doesn't make sense.
We've tried removing the "Domain Admins" group from the "Administrators"
group, which then prevents "log on locally" rights. When we assign these
rights to the "Domain Admins" group, they can perform all actions just as if
they still belonged to the "Administrators" group. We tried adjusting the
ACLs and DACLs with no success; the "Domain Admin" can simply reverse the
process and eventually add themselves back to the "Administrators Group". We
tried limiting the group membership with "Restricted Groups" in group
policies, which work, but does not prevent the domain admin from changing
the "Administrators" password...once that's accomplished, he can log on as
the "Administrator" and reset his permissions.
The only resolution we have been able to come up with are delegated
"Organizational Units", but that limits the "Domain Admin" from performing
his duties.
Any ideas?
--
David M. Streb, MCSE
Microsoft Certified Partner
Specializing in Exchange
and FrontPage Hosting
http://www.exiis.net
Dave at exiis dot net
I'm missing something...
Administrator Account: We regularly rename and place strong passwords onto
this account. This account is limited to the most trusted employee of the
company and never to the normal "administrator" of the network.
Domain Admins: This is the regular, day-to-day account we assign to the
full-time administrator.
Problem: Members of the "Domain Admins" group are permitted to rename,
reset, and change the "Administrator" account, as well as change group
membership for both the "Administrators" and the "Domain Admins" members. In
other words, a lower, less-trusted administrator is free to whatever he
feels to the most trusted account--it doesn't make sense.
We've tried removing the "Domain Admins" group from the "Administrators"
group, which then prevents "log on locally" rights. When we assign these
rights to the "Domain Admins" group, they can perform all actions just as if
they still belonged to the "Administrators" group. We tried adjusting the
ACLs and DACLs with no success; the "Domain Admin" can simply reverse the
process and eventually add themselves back to the "Administrators Group". We
tried limiting the group membership with "Restricted Groups" in group
policies, which work, but does not prevent the domain admin from changing
the "Administrators" password...once that's accomplished, he can log on as
the "Administrator" and reset his permissions.
The only resolution we have been able to come up with are delegated
"Organizational Units", but that limits the "Domain Admin" from performing
his duties.
Any ideas?
--
David M. Streb, MCSE
Microsoft Certified Partner
Specializing in Exchange
and FrontPage Hosting
http://www.exiis.net
Dave at exiis dot net