Solved

Controlling IT staff with Administrative access

Posted on 2004-09-30
6
223 Views
Last Modified: 2013-12-04
Our IT department has four staff, all have admin access to the servers.

Recently, a staff member put a user in the admin group, when confronted he denied doing it.... because the servers are always logged on as admin there is no way to trace it back.....

Is there a better way to controll access to servers via the admin user

Thanks
0
Comment
Question by:n_athen
  • 2
6 Comments
 
LVL 4

Expert Comment

by:novacopy
ID: 12191579
i would change the admin password and not tell them. then set a screensaver to have a password so whenever they need access they will have to use their own login info to unlock the server and log off the last user. maybe you should look at putting a "key logger" on the server so you can have everything that was done monitored.
0
 
LVL 4

Expert Comment

by:novacopy
ID: 12191582
not the best advise but just a suggestion
0
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 250 total points
ID: 12191809
Some things can be nearly impossible to trace.  Look into enabling auditing on the servers (not necessarily file auditing, but auditing of users' use of security privilages).  In addition, create admin accounts for each user that needs admin access.  For example, in my last corporate position I setup the 10 people who needed admin access with accounts such as jbadmin and mkadmin (initials-admin).  You could also just create accounts such as jsmith-adm.  Their regular accounts get no special privilages, and the only admin account they know is the adm/admin account assigned to them.  Then you have to make sure everyone starts taking responsibility by logging off the servers when they are done - and locking the screens if they step away for a few minutes.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now