How to grant specific permissions to domain user accounts without adding them to Domain Admins group

OK, I am sure this has been addressed before, but I am in a hurry and cannot find anything on it.

Can anyone direct me to links or explain how I can give domain user accounts the necessary rights to add/remove computer objects from the domain and other rights that they may need to perform MS updates and install applications, like Flash Player, Adobe Reader, etc. without them being part of the Domain Admins group?  Which is what they are right now.  Or is it just too much hassle to manage and just leave them as Domain Admins?

Hopefully that was clear.

Thanks in advance.
rsnellmanIT ManagerAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Add the user to the domain-level Administrators group.  This will allow the user to apply patches, updates, apps, etc., but not give any rights within AD.
Steven CarnahanNetwork ManagerCommented:
By default Windows is set to allow anyone to add up to 10 computers to the domain. To be able to install applications on the local PC you could add them to the local admin group on the PC's. This will give them full admin rights on the PC without giving them domain rights to the servers. It depends on the amount of security you wish to maintain over the local PC's.
Mike KlineCommented:
The built-in administrators group will give them rights in AD and that group replicates.  The difference is that domain admins are in the local admin group of every machine by default.

What I'd do is create a new group and add that group to the local admin on machines using restricted groups

You can also delegate rights in AD or use other builtin groups like account operators.

What you are doing and trying to reduce domain admins is a good thing


Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

rsnellmanIT ManagerAuthor Commented:
I am not sure I follow you.  Isn't the domain level administrators group the same thing as the Domain Admin group?  I mean especially if the domain administrator group is a member of the Domain Admins group, which it is.

I have setup a policy to add them to the local admin group on the PC's, so that is good to go.  However, I am concerned about them running into issues with trying to add computers to the domain and removing them when needed.

I am trying to do this in a way that doesn't interfere with their normal everyday tasks.
Steven CarnahanNetwork ManagerCommented:
In our organization we have created a group called "special admins" that we add to the local administrators group through GPO. Individuals placed in that group have full admin rights to any system they log onto without giving them domain admin rights. We use this mainly for laptops.

You may want to look at:
No, Domain Admins and the built-in Administrators group are separate groups.  We use this group to grant select individuals the ability to patch Domain Controllers.  However, after reading Mike's comment I realized that this group will most likely not provide the solution to your original question.  

As mentioned above, a better solution would be to create a new AD group, script it or use a GPO to drop it into the local Administrators group on PC's and servers, and then delegate the AD rights needed.
rsnellmanIT ManagerAuthor Commented:
OK, that all makes sense, but I guess I am trying to figure out what AD rights are needed to delegate for these special admin groups so they can add to/remove from computers from the domain.

Any ideas or links to assist will be greatly appreciated.
Steven CarnahanNetwork ManagerCommented:
Open the Active Directory Users and Computers snap-in.

Right-click the container under which you want the computers added, and press Delegate Control.

Press Next.

Press Add.

After adding all the users and/or groups, press Next.

Select Create custom task to delegate and press Next.

Select Only the following objects in the folder, check Computer objects, check the Create selected objects in this folder box, and press Next.

Check the Create all child object box and press Next.

Click Finish
rsnellmanIT ManagerAuthor Commented:
Thanks pony10us.  And this will cover them being able to add and remove computers from the domain?  Nice.

Thanks again.
Steven CarnahanNetwork ManagerCommented:
You need to do that at the OU you want them to be able to add the computer too.  Look through the options in case I missed any.
rsnellmanIT ManagerAuthor Commented:
Wait, what about computers already added to the domain.  Would I need to do the root of the domain to delegate rights to be able to remove the computers (computer objects) from the domain?  Or would have to do that to each and every OU for this special admin group?
Steven CarnahanNetwork ManagerCommented:
You can do that at the root of the domain.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.