Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Delete user account that can be logged on to locally giving admin rights

Posted on 2008-10-23
3
Medium Priority
?
197 Views
Last Modified: 2013-12-04
Hi Y'all,
On the network I look after, a lot of PCs have been identified as having a user account that can be logged on to locally giving full admin access to the machine thus bypassing all security measures in place.
I can get rid of this by logging on to the machine as an administrator and deleting the admin rights from the user. This solves the problem but with 600 PCs on the newtork, can anyone point me at a quick solution/script etc that will do the biz?
Ta.
0
Comment
Question by:prytaneion
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 2

Accepted Solution

by:
armynt4 earned 2000 total points
ID: 22789870
I don't have the script handy... BUT... if you are running a Windows Server 2000 + domain...you could create a logon script that would delete the local account or change rights to the account when the computer or user logs onto the domain.  Just add it to the domain users via a GPO.  Let this run on the network for at least a week.  You can then run MSBA from microsoft.com to get reports on all machines and their respective accounts/rights, local and otherwise.

Probably the easiest way to do it.
0
 
LVL 38

Expert Comment

by:Shift-3
ID: 22789894
0
 

Author Closing Comment

by:prytaneion
ID: 31509380
Hi Armyn,
Thanks for the tip - looks good to me. Have accepted your solution but would appreciate the script if you could spare me the time. I've not dabbled too much with this!
Best regards,
Alan.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question