Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to restrict service account login to just the computers contained in 1 OU without specifying all the computers it can login to (in the properties of the service account)?

Posted on 2008-10-20
7
Medium Priority
?
911 Views
Last Modified: 2009-12-16
I would like a new service account we have to ONLY be able to login to computers contained in a specific OU.  This OU has many computer accounts contained in sub OU's so I do not want to list each computer in the service accounts' properties (under the "Log On To..." button).  
Is this possible via GPO? or some other solution?
0
Comment
Question by:TaraC
  • 4
  • 3
7 Comments
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22759845
yeah create a OU, link it to the OU with the setting "Log on locally"  for service accounts only
0
 

Author Comment

by:TaraC
ID: 22759868
Sorry... I know to do that, but how do I stop that service account from logging in anywhere else in the domain?  this one service accounts' login permission should be restricted to just this OU structure.
Thank you,
0
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22759959
1.you can better do it by defining the " Deny logon locally" on a group policy and link it in the domain level.
2. Block the inheritance on the OU which you want to allow this service account to login.
3.Create a GP on this OU, define "allow logon locally" and enforce it
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 

Author Comment

by:TaraC
ID: 22760324
Thank you, I was thinking the same but was hoping for a better solution besides Blocking Inheritance.  There are lots of things we apply at the domain level and I'd rather just keep inheritance applied.
0
 

Author Comment

by:TaraC
ID: 22762270
Any other solutions to this problem?  
Thanks,
0
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 750 total points
ID: 22762419
Ok...

1.Create the policy you want to apply and define the settings "deny log on locally" for service account.
2. Go to the properties for the policy (right click on the policy name and select properties) and select the Security tab.
3.Remove the Apply Group Policy right for Authenticated Users.
4 Next click Add and select the service account
5.Give it Read and Apply Group Policy permissions.
6. Now link it on the domain level and do not enfore
7.Create a new policy with "allow log on locally" on your desire OU and no need to block inheritance here
8.Now enforce this policy

****************Please test this in your test lab before applying it in production server**************
Also ref this posts

http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/2003_Server/Q_22071448.html
http://www.experts-exchange.com/OS/Miscellaneous/Q_20830383.html
0
 

Author Comment

by:TaraC
ID: 22770945
This is a good solution ... BUT  (always a but).... doing it this way, I would now need to define all possible users that would login to the computers in that desired OU.  I'm checking now to see if an existing list of users is defined anyway
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Know the reasons and solutions to move/import EDB to New Exchange Server. Also, find out how to recover an Exchange .edb file and to restore the file back.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question