Solved

changing the Administrator password

Posted on 2004-04-26
4
836 Views
Last Modified: 2013-12-04
I have observed that in a standard installation of XP(SP1) or Win2K(SP4) *any* user belonging to the "administrator"-group can change without any problm the password of the master-user "Administrator".
Is it possible to protect the password of the user "Administrator" against such changings?

nmm
0
Comment
Question by:nmm
4 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 150 total points
ID: 10923809
Not really... that's why there are best practices... but even with those being followed, it's still a trust issue. M$ Network Admin's face this when ever a new person joins their group, how long do you wait to give them full domain access? While you can't pevent it's changing, you may be able to log who changed it. The event log folder can also have pemissions set so that only "system" and "admin1" can delete the logs. That way there is accountability, but no real prevention. This is a something common to most OS's. The admin accounts are supposed to be the trusted accounts, if you are unsure, then you shouldn't give them access. There used to be a utility to lock the administrator account out, but M$ saw that this was the double-edged sword, and pulled it. The local administrator accounts can never be locked out, unless you could find that tool "admnlock
http://support.microsoft.com/default.aspx?scid=kb;en-us;q281140&sd=tech (still they can reset the password just as before, if they are admins)

If you tried to guess passwords using terminal services, you'd also Never Be Locked out, even if the failed attempts were exceeded- TS thinks of all accounts as Local, even if they are domain accounts. you will be disconnected from TS once you've guessed wrong a few times, but you can keep at it forever! But the user your trying to guess' passwrod would of had to log-on to that server first. Despite the patch for 2000, this still works on XPpro...
http://support.microsoft.com/default.aspx?scid=kb;EN-US;274372
-rich

0
 
LVL 41

Assisted Solution

by:graye
graye earned 50 total points
ID: 10924159
On the other hand... that means you can just have any one of those folks in the Administrators group run an application that puts the Admin password back to the way you want it.  We actually put a program like that in our login batch file periodically to clean up the mess the users make.

The program is called "RePass"... and is availabe as VB.Net source code at http://www.dpw.hood.army.mil/ftp/RePass
0
 

Author Comment

by:nmm
ID: 10926750
Thanks for that information!

If I am in the admin-group than it is possible to change the passwords of any other users in the admin-groupand than i am the only one, who can acess the system with admin-rights.
If I have admin-rights, so it should also possible to disable "repass".

And the idea to protect the log from changing will also not work: if I can change the password of admin1, than after doing that, I can login as admin1 and than I can erase the traces in any log i want.

What is the sense of "admnlock", if they
still "can reset the password just as before, if they are admins"?


-nmm
0
 
LVL 24

Expert Comment

by:SunBow
ID: 10929000
Admins can change passwords, it is their inherent right of control.

Admins as the most trusted of the tech staff, with all the keys at their disposal.

All admins must trust each othe, it is the nature of position, just as mgmt must trust them.

If one admin is not trusted by the others, it is past time for a reorg to change access rights to reflect trustability.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question