Disallow group policy actions on local computer joined to domain

Assuming we have a domain user acccount and the account is part of local Administrators group, post joining a Windows 7 Ent desktop to a 2003 domain, there is a need to accomplish the following:

- Disallow creation / addition of any other service or individual domain users / groups via Domain Admins and related group policies settings within AD.

Can this be accomplished using local windows firewall or group security policy settings to override domain administered policies ?
Who is Participating?
Krzysztof PytkoConnect With a Mentor Senior Active Directory EngineerCommented:
OK, now it's much more clear for me :)

So, you can go with Group Policy Preferences (GPP) to manage that who can be a local administrator's group member

or go with the old path for 2003/XP with GPO and resticted groups

One of the above methods allow for that and no one would be able to add new local admins because GPO will overwrite that.

Is this user account a member of the local administrators on the Windows 7 box?  If so, the account only has broad privileges on the local windows 7 machine.
Krzysztof PytkoSenior Active Directory EngineerCommented:
I'm not sure if I understood you correctly but if this is regular user in the domain and only local administrator on your Windows 7 machine then this is not possible by deafult. Regular users cannot create/change/delete anything in a domain when they have no delegated rights for that.

User added into local administrators may only create local group/users on that Windows 7 machine only. And it is not possible to limit that user to not create local users/groups because he/she is a local administrator :) So, the only one option is to remove it from local administrators group

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

fahimAuthor Commented:
BT: Yes, the user account is a member of local admin on Win 7 box. The account should have broad previleges on local Win 7 machine and that's not an issue. The issue is, no one else should be able to add himself/ herself into the local admin group, not even those who have domain admin rights as the machine is part of and attached to domain. How can this user prevent domain admins from giving themelves or other domain users, elevated previleges on this machine.

iSeik: As related previously as an answer to BT's query, the need is to stop everyone across the IT system admins to do anything on this Win7 laptop without it's owners knowledge / explicit approval while keeping him attached to domain.

Basically, there is a laptop holding confidential info, that needs to be attached to domain but restricted from making changes applicable via domain wide group policy and even out of bounds from domain admins.

Local admin rights to be retained by machine owner who is also a domain user but added into local admin group and that's fine.
Detlef001Connect With a Mentor Commented:
Hey founded two links for you ..

Please refer the following.



In the long run, I don't think you can do what you are looking for.  You can use the group policy to manage the membership of the local admin, but the domain admins have the ability to alter group policy.  The group policy solution works if you are keeping honest people honest.
McKnifeConnect With a Mentor Commented:
So you are not trusting your administrators when it comes to this machine/its contents? Then don't make it accessible to them, as simple as that - don't join it. Being on the domain will enable them to undo each and any protective setting. If however you decide to keep it joined and to modify the machine so that they cannot undo your measures, it will not be usable on the domain any more, no longer administrable due to these serious modifications. I am sure about this as I have seen this very type of question many times before.
fahimAuthor Commented:
Detlef: Your links seems promising, especially first one. The other one talks about certain scripts which probably are available only to university's staff members.

BT: I guessed that but thought there still maybe a way out hence I asked.

Mcknife: Disconnecting from domain is an option but I wouldn't want the user to loose out on his ability to print to domain authenticated printers and the user is a frequent traveller. Also, DHCP is AD integrated and the user doesn't get a valid IP that allows him into the right subnet and access email servers, AV servers etc., unless authenticated to domain.

iSeik: Will test the links out, can you re-confirm if your solution cannot be overidden by domain admins?
Krzysztof PytkoSenior Active Directory EngineerCommented:
No, it can be. Domain Admins is one of the most powerful groups in the domain. They will always be able to modify GPO

I would consider AD RMS if you have confidential data on that notebook and provide certificate only to those people who need an access to read/modify documents. Only in this case Domain Admins will not be able to do anything with data

If you main concern in the long run is monitor who, what and when changes are made in AD, the I suggest to invest in a enterprise wide monitor solution like Quest Change Auditor for Active Directory. When you it at my company and it is a "priceless" tool...

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.