Currently, I have a work laptop, that I log into with my user credentials, and don’t do any admin work directly from this machine. I have a VMWare virtual machine that I RDP to, and log into using my admin credentials, and that is where I do all my admin work. Other admins in my department have virtual workstations, where all their admin tools are installed, but they log into them with user credentials and Run As for anything needed elevation. I know neither of these is the pie in the sky, best practices method. Used to be, Microsoft recommended Privileged Access Workstations (PAWs), and now they recommend secure admin workstations (SAW), which is a separate, hardware machine that’s locked down. I’m also seeing Secure Administrative Hosts, which can be dedicated workstations, or a member server running Remote Desktop Gateway, or a hyper-v that provides a unique virtual for each admin (like what we use now, but ours probably aren’t locked down at all..) We don’t have smart cards, but we do do MFA for our O365 and Azure work. I’m just wondering if we need to totally revamp how we do things, or if I, or the other admins, are on the right track already.
Any broad advice/tips?
Thanks,
Joe Heaton
Managed Services and Operational Support Unit
Information Technology Operations Branch
Data and Technology Division
CA Department of Fish and Wildlife
1700 9th Street, 3rd Floor
Sacramento, CA 95811
Phone: 916-902-9116
Book time with Heaton, Joseph@Wildlife
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/SJ0PR09MB66863D66DCCECF33832EE319AA0EA%40SJ0PR09MB6686.namprd09.prod.outlook.com.
Kurt, thank you for the response. I brought up some of the article to the other domain admins, and there are things coming down the pipe, such as Zero Trust, etc. The approach he was looking at was possibly setting up a locked down VDI pool, with all of the admin tools installed, to which we would still log in with our user credentials, and use Run As… I mentioned your concern with Run As, but they were saying that since the VDI would be a “trusted machine” it would be ok.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Kurt Buff
Sent: Wednesday, September 10, 2025 12:07 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Secure administration environments
WARNING: This message is from an external source. Verify the sender and exercise caution when clicking links or opening attachments.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce6k6-q-ymcp4JpRvEWK1kMFZWj1Ogg-CpWd_3ayD7MKAQ%40mail.gmail.com.
In that kind of arrangement, how would we ensure that techs actually use the VMs for non-admin work? I’m asking because, in a manner of speaking, I can lead them to water but I can’t make them drink.
Also, are you talking about VMs running locally or VDI or something else?
I’m interested in doing something along these lines but need a clear, fairly easy-to-implement plan before I push it. FWIW, in a former job, we simply had two physical workstations for this.
--
John Wright
IT Support Specialist
1800 Old Bluegrass Avenue, Louisville, KY 40215
Please submit IT requests to Hazelwoo...@bluegrass.org
24 Hour Helpline 1.800.928.8000
CONFIDENTIALITY NOTICE: This message contains confidential information and is intended only for the individual(s) addressed in the message. If you are not the named addressee, you should not disseminate, distribute, or copy this e-mail. If you are not the intended recipient, you are notified that disclosing, distributing, or copying this e-mail is strictly prohibited.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Kurt Buff
Sent: Wednesday, September 10, 2025 3:07 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Secure administration environments
EXTERNAL EMAIL - This email was sent by a person from outside your organization. Exercise caution when clicking links, opening attachments or taking further action, before validating its authenticity. |
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce6k6-q-ymcp4JpRvEWK1kMFZWj1Ogg-CpWd_3ayD7MKAQ%40mail.gmail.com.
Thanks. I’ll test that arrangement and see if I can sell management. I’m not the first to bring this up so there’s always a chance.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce6aY%2Bzn31xZOi3F5%3DCEkG6V_nXsdSO-%2BDjaSe9p-z-eyw%40mail.gmail.com.
So… on your physical laptop, where you’re doing admin “stuff”, do you log into it with your admin account? On this device, according to the article, you want to limit internet access, and all of that, but on the virtual on the same physical device, you allow internet, right?
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Kurt Buff
Sent: Thursday, September 11, 2025 12:16 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Secure administration environments
WARNING: This message is from an external source. Verify the sender and exercise caution when clicking links or opening attachments.
Use GPOs to revoke the ability to log into the VM with privileged accounts, excepting the LAPS admin account, which is only local anyway. Et voila!
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce6aY%2Bzn31xZOi3F5%3DCEkG6V_nXsdSO-%2BDjaSe9p-z-eyw%40mail.gmail.com.
As always, it depends on you risk profile and other measures you implemented (network zoning/segmentation, forest separation, XDR, etc.)
The best one is dedicated admin workstations, without any "VMs" for unpriveleged stuff, etc. on that one. Admin is admin. As a possibility, remote desktop elsewhere/Citrix/VDI for unprivileged tasks. But never locally.
Using a "remote desktop" system with MFA, where you can elevate is another option. If anybody catches your credentials (keylogger) on your base workstation, MFA will protect you.
Other possibility is remote desktop without MFA, which is still better than running stuff locally (cached credentials).
Sign in as admin on your laptop and then use a VM for "non privileged stuff" is something I don't like. Credentials are cached on the laptop, it is difficult to keep correctly managed a VM. It is easy to use NAT and impersonate the IP of your base system, vm escape possibilities, etc. and double licensing of almost everything (OS, antivirus, etc.).
What I would never use is VDI VMs. If they are ephemeral, they are the best friend for hackers: No traces. Furthermore, if your VDI infra doesn't work, how are you going to fix it if your admin VDI pool is offline?
Best regards
Seve
Von: 'Heaton, Joseph@Wildlife' via ntsysadmin <ntsys...@googlegroups.com>
Gesendet: Donnerstag, 11. September 2025 19:31
An: ntsys...@googlegroups.com
Betreff: RE: [ntsysadmin] Secure administration environments
-!-!-!- EXTERNAL EMAIL -!-!-!- This email originated from outside of SKAN. Do not click links or open attachments unless you recognize the sender and know the content is safe
Good points, and I will definitely share that last with the supervisor that’s thinking about the VDI pool approach. I do still have questions, though:
If you’re not logging into the admin workstation with your admin credentials, you still have a situation where you have to Run As to elevate to use your admin tools, correct? But I thought that was a no-no…
For instance, if I wanted to run ADAC on the machine I’m logged into. If I’m logged in as my user account, I have to Run As and put in my admin credentials to run ADAC and do whatever needs to be done. Whereas if I log into the computer with an admin account, I don’t.
Now, I will say, that in our last security audit, they didn’t use user credentials at all to do what they did and gain the domain. There were certificate templates that they said allowed them to enroll a certificate as another user, and then elevation happened after that.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/DBBP189MB1340D5F3EEF446D9E61606608308A%40DBBP189MB1340.EURP189.PROD.OUTLOOK.COM.
Locksmith is da bomb. Using it and cleaning up ADCS deployments has made me a fair bit of money the last few years.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce62zr1348%2BDo4r%3DkgqVv74YK-eBDw6KMEHDZ2S1WOfQvw%40mail.gmail.com.
As I said, it depends on the measures in place. Security is not only passwords. Think about the Swiss-Cheese risk model and the typical security vs usability trade-offs.
It is a misconception that the most powerful user is the domain/enterprise administrator. The most powerful users in your organization are these three groups: the backup administrator, the vSphere/Hypervisor administrator and the PKI administrator.
PKIs are tricky. Don't think on your Windows CA only. You may have other "CAs" elsewhere (Netscaler, MDM solutions, etc.) which may be issuing certificates on behalf of users.
.
To view this discussion visit https://groups.google.com/d/msgid/ntsysadmin/SJ0PR09MB6686C96A4498904A1DACB996AA14A%40SJ0PR09MB6686.namprd09.prod.outlook.com.