Solved

Hidden Admin and ARD

Posted on 2014-10-21
3
275 Views
Last Modified: 2014-10-21
Recently I have shifted gear from a windows dominated network with Mac and Ubuntu scattered about to a full Mac network. The network I am in is on it's way to being scalable and decently manageable however it needs some TLC and much attention.

My project now is teach myself ARD (Apple Remote Desktop) to take full advantage of the environment.  Currently there are some computers added that I can access and other that I cannot. So, I am starting over.

I have created a Apple Script that configures a Hidden Admin Account successfully however I cannot connect to a remote computer with the credentials. I have logged in with that user and can su'ed to it in terminal. I was wondering if there is something that I am doing wrong or should I enable kickstart and added that was. This is one of the computers that I couldn't connect to and had to delete from ARD in order to attempt to re add.

Anyone know best practices when it comes to this? This environment was originally setup by a retired consultant that knew about it and comfortable on Mac's but didn't take full advantage of anything.
0
Comment
Question by:Kevin Portell
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
sinfocomar earned 500 total points
ID: 40395274
Please use this script. Yours might not be as thorough.

http://marckerr.com/?p=95

More importantly I strongly suggest you heed to the advice at the very top:

"Not giving the user admin privileges really doesn’t protect from an ARD hack or someone with the password to that user because the ARD agent on the client machine will run remote commands as root. It would prevent a “Screen Sharing” user from doing anything as an admin."
0
 

Author Closing Comment

by:Kevin Portell
ID: 40395472
This was very helpful!
0
 
LVL 11

Expert Comment

by:sinfocomar
ID: 40395482
Thx for the points!
0

Featured Post

Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question