--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/8eff29d1-a19d-4b58-913b-608bba7ad861n%40googlegroups.com.
I’ll add what I can, but I totally realize that one size does not fit all, so this is just what works for us, and we’re a much larger tech team of 25+ people. As with all things this is a continual process and we’ve layered things on over time, as when I was first here, everyone was an admin on their own workstation (unless it was Win95/98 with no real permissions 😉 ) with a single account and a shared tech account being used, so it has taken time to get even to where we are now. We each have:
- a regular account (non-admin, day to day for e-mail, file access, & other job-related tasks) that we sign in with.
- a domain-level tech level account that may be delegated computer account and/or user account (by group for each) permissions, depending on a person’s role. This delegation does not extend to server/service/admin accounts. Ie, one of our tech accounts cannot change the password using ADU&C for another tech account, a domain admin would have to do this. These are delegated admin rights on computers in all site ous as well, but we don’t restrict logon local as our techs need to be able to use these for things like one-off print driver installations (and other items where they may not have a run-as option).
- if someone requires domain admin access, they also have a separate domain admin account for use on servers only.
Due to our continued growth, we’re now building an account level in between tech and domain admin as well for people who need some server admin access on those specific systems. We also have a special type of support account for certain staff at each of our school sites that has delegated admin rights on all computers in that ou structure but not delegated any special permissions in AD. I use Restricted Groups in group policies to enforce where admin rights are applied (using groups, so that people can be added/removed as needed and rights are updated automatically shortly after imaging).
There’s a lot more I won’t list here but from having done something similar and from the list you sent below, the a few things I can think of to check access to are:
Other workstation management tools with AD integration like MECM (if you have it)
Print management (if your techs help to update or clear queues)
Access to file shares where you may store central software/driver repositories
Remote access support tools
Also, this sort of stuff is where using groups really shines because it makes it much easier when onboarding new staff to just drop their accounts in the right groups and they are up and running, so hopefully you’re doing that!
Having had to figure out the AD Delegation stuff on my own over time, I wrote myself a reference document of all the bits to do and have pasted some of that here. Some of these may not apply to your scenario but hopefully it helps in figuring out what may be needed:
Full delegated list for techs working with computer accounts:
Read all properties Descendant Computer Objects
Write all properties Descendant Computer Objects (again, our techs add/remove AD groups & update descriptions, you may not need this)
Delete Descendant Computer Objects
Change Password Descendant Computer Objects
Reset Password Descendant Computer Objects
Create Computer Objects This Obj & all Descend obj
Delete Computer Objects This Obj & all Descend obj
Read Logon Workstations Descendant User Objects (this and the next are because our field techs do not otherwise have delegated permissions for user accounts per the next section, but need to be able to set the logon restrictions list for a limited list of “generic” logons. If you don’t use this feature you don’t need it, look at any user account in ADU&C and it’s the “account” tab, “Log on to” list).
Write Logon Workstations Descendant User Objects
Full delegated list for tech staff working with user accounts:
Reset Password Descendant User Objects
Read Account Restrictions Descendant User Objects
Write Account Restrictions Descendant User Objects
Read lockoutTime Descendant User Objects
Write lockoutTime Descendant User Objects
Read pwdLastSet Descendant User Objects
Write pwdLastSet Descendant User Objects
Write Members Descendant Group Objects
Read all Properties Descendant Group Objects (default read access)
Note this does not allow all properties to be changed and the people who do that here otherwise have server-level access (and it’s not something I’ve had to do before, but may get to figure out soon for that new role). This delegation is for updating user group memberships, resetting passwords, and unlocking accounts, you may be looking for the equivalent of “write all properties” instead.
Hopefully something here helps!
-Bonnie
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Henry Awad
Sent: Friday, June 10, 2022 8:03 AM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Admin accounts restructure
*** Use caution responding to or opening attachments and links in this email. It is not from Mukilteo SD.***
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CAGaCHK4cnoohODna52PoYv3dEmSm5XNz1pSLwMZuT3O9eVGSMA%40mail.gmail.com.
“Any way to get PowerShell to give me a CSV with all accounts with any permissions above domain user?”
What about a powershell query like:
Get-ADUser -SearchBase "ou=users,dc=acme,dc=foo" -Filter * -Properties * | select samaccountname,memberof | Export-Csv users.csv
--
John Wright
IT Support Specialist
1800 Old Bluegrass Avenue, Louisville, KY 40215
Please submit IT requests to Hazelwoo...@bluegrass.org
24 Hour Helpline 1.800.928.8000
CONFIDENTIALITY NOTICE: This message contains confidential information and is intended only for the individual(s) addressed in the message. If you are not the named addressee, you should not disseminate, distribute, or copy this e-mail. If you are not the intended recipient, you are notified that disclosing, distributing, or copying this e-mail is strictly prohibited.
From: 'Gabriel Clifton' via ntsysadmin <ntsys...@googlegroups.com>
Sent: Friday, June 10, 2022 10:52 AM
To: ntsysadmin <ntsys...@googlegroups.com>
Subject: [ntsysadmin] Admin accounts restructure
This message is from an external sender. |
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/ntsysadmin/8eff29d1-a19d-4b58-913b-608bba7ad861n%40googlegroups.com.
[CAUTION] Do not click on links or open attachments unless you recognize the sender and know the content is safe. |
Sorry about that. I somehow missed that they were delegated. FWIW, it looks like he might be able to replay the SAM names from the powershell query and feed it to dsrevoke. NB: I haven’t used this tool myself. Just wanted to pass it on in case it was helpful.
Viewing delegated permissions: https://social.technet.microsoft.com/wiki/contents/articles/6477.active-directory-how-to-view-or-delete-delegated-permissions.aspx
Download Dsrevoke: https://www.microsoft.com/en-us/download/details.aspx?DisplayLang=en&id=19288
--
John Wright
IT Support Specialist
1800 Old Bluegrass Avenue, Louisville, KY 40215
Please submit IT requests to Hazelwoo...@bluegrass.org
24 Hour Helpline 1.800.928.8000
CONFIDENTIALITY NOTICE: This message contains confidential information and is intended only for the individual(s) addressed in the message. If you are not the named addressee, you should not disseminate, distribute, or copy this e-mail. If you are not the intended recipient, you are notified that disclosing, distributing, or copying this e-mail is strictly prohibited.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/OFA5B6B4B2.0929C339-ON8525885D.0059D2A6-8525885D.005AE109%40nycm.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/OFFA0C726F.974A9191-ON8525885D.0061D095-8525885D.006210F3%40nycm.com.
--
You received this message because you are subscribed to the Google Groups
"ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send
an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/OFFA0C726F.974A9191-ON8525885D.0061D095-8525885D.006210F3%40nycm.com.
The devil is in the details.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Kurt Buff
Sent: Friday, June 10, 2022 2:26 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] Admin accounts restructure
Perhaps better stated as "Containers cannot have group policies assigned to them". Because they can't, though objects residing in the containers do get GPOs applied from up the hierarchy. Can't block GP inheritance on a container either.
Kurt
Join us on Facebook at
***CONFIDENTIALITY NOTICE***
This email and any attachments to it are confidential and intended solely for the individual or entity to whom it is addressed. Any unauthorized review, use, disclosure or distribution is prohibited. If you have received this email in error, please contact the sender by reply email and destroy all copies of the original message.
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/OFFA0C726F.974A9191-ON8525885D.0061D095-8525885D.006210F3%40nycm.com.
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce7sWSmWnStv5e_Vyniu7hcXbTnBJTaWbbVv-ZN1TU9L3Q%40mail.gmail.com.
How is everyone handling the M365/Azure world and the need for MS accounts when separating everything?
If your regular account doesn’t have more than user rights to your subscription/tenant, are you having to burn another license for an admin email that does?
BRIAN ILLNER |
Senior Systems Administrator
864.250.9227 Office
864.679.2537 Fax
Canal Insurance Company
400 East Stone Avenue
Greenville, SC 29601
WARNING: As the information in this transmittal (including attachments, if any) may contain confidential, proprietary, or business trade secret information, it should only be reviewed by those who are the intended recipients. Unless you are an intended recipient, any review, use, disclosure, distribution or copying of this transmittal (or any attachments) is strictly prohibited. If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal. While Canal believes this transmittal to be free of virus or other defect, it is the responsibility of the recipient to ensure that it is virus free and no responsibility is accepted by Canal (or its subsidiaries and affiliates) for any loss or damage arising therefrom.
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of Michael B. Smith
Sent: Friday, June 10, 2022 2:45 PM
To: ntsys...@googlegroups.com
Subject: RE: [ntsysadmin] Admin accounts restructure
CAUTION: This message was sent from outside of Canal Insurance. Please do not click links or open attachments unless you recognize the source of this email and know the content is safe. Please report all suspicious emails to "inf...@canal-ins.com" as an attachment.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/1bb90547ce5343a89cc54f80406db29f%40smithcons.com.
Currently the way we handle it at our org is we’re create a unlicensed o365 account to be our global admin account. With a similar name to our daily driver production email with a suffix or prefix “GA”. We
‘ll then have a tenant level mail routing rule to handle any mail going to the global admin account to route to our daily driver o365 account, that way we don’t have to license it with exchange online.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/BN6PR13MB2913DCE073EFD018E5650C09C5AA9%40BN6PR13MB2913.namprd13.prod.outlook.com.