Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Log On As A Batch Job Service Security

Posted on 2012-03-26
3
747 Views
Last Modified: 2012-06-22
Can someone please tell me if Backup Operators and PerfMon Users groups actually need to be given this right?  We follow DISA Stigs and this was a finding.  We need to know if they can be removed safely and if not, sound justification.  Thanks in advance.
0
Comment
Question by:BrianRB
  • 2
3 Comments
 
LVL 39

Accepted Solution

by:
Adam Brown earned 500 total points
ID: 37768172
They can be removed unless those accounts are operating scheduled batch jobs for running backups or performance monitoring. If you're not, you can remove that right.

On the other hand, if you have scheduled backups that are running with the credentials of users in those groups or performing scheduled perfmon tasks doing the same, you would either modify those tasks to run under the system account, or note on the findings that you have system processes running that require those permissions because they are running under accounts that require those permissions. Another option is to note which accounts need this permission and grant it to them specifically or with a custom group and remove the default groups from that right.

Also, if you're not even *using* those groups (no users in either group), you can tell the auditors that those groups aren't in use and leave it at that. Having worked as a a DIACAP auditor I can tell you with complete confidence that the vast majority of DIACAP auditors don't know their own nose from a hole in the ground and don't check the configurations to make sure that a finding really is a finding. Sometimes you have to smack them with a rolled up newspaper and show them why the problem isn't a problem.
0
 
LVL 2

Author Closing Comment

by:BrianRB
ID: 37771538
Excellent info, thank you so much.
0
 
LVL 2

Author Comment

by:BrianRB
ID: 37771545
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This script can help you clean up your user profile database by comparing profiles to Active Directory users in a particular OU, and removing the profiles that don't match.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question