Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

What is the best practice for assigning IT support roles Active Directory administration rights without giving away the "keys to the kingdom"?

Posted on 2011-03-15
2
Medium Priority
?
737 Views
Last Modified: 2012-05-11
Within our 2003 domain I have several IT support specialists that currently have additional domain admin logins. I would like to assign them only the roles they need rather than full domain admin level access. My questions are.
- Friom a security standpoint, what is the best practice?
- Am I limited to the "built in" groups only or can you create your own roles groups?
- Would I benefit from modifying the default domain group policy or using group policy's?
0
Comment
Question by:jffisher
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 12

Expert Comment

by:Navdeep
ID: 35138679
Hi,

You can use delegation on OUs to manage but Junior IT Staff. You can Delegate to Groups [domain local/global groups] based on your requirements and then make users the member of those groups.
So simply adding and removing the users from the groups, you can control permissions to them

For more detailed understanding and how to set up please go through this guide

Best Practices for Delegating Active Directory Administration
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=631747a3-79e1-48fa-9730-dae7c0a1d6d3
0
 
LVL 12

Accepted Solution

by:
Navdeep earned 2000 total points
ID: 35138778
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question