Login to computer through Admin Priviligies

Posted on 2016-11-08
Last Modified: 2016-11-13
Hi all,
Just wanted a bit more insight on what are good and bads about logging into your work computer through admin privileges? means I know Admin account has lot of security privileges which can be exploited but is it really a big threat? I though having an Administrator user account (local/domain) is much bigger threat then this.
the reason to login to work computer with admin privileges is because to run applications like sccm, sql, sharepoint etc....
Question by:Leo
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 54

Accepted Solution

McKnife earned 250 total points
ID: 41879984
Please read my article where I show a way out of this dilemma.
And please explain "I though having an Administrator user account (local/domain) is much bigger threat then this." - I don't understand what "this" should mean as "this" should be the same.

Author Comment

ID: 41880001
Thanks for that article, now if I want to run a security audit across the network, is there a tool which can be used?
LVL 54

Expert Comment

ID: 41880006
What should that audit find out exactly?
Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.


Author Comment

ID: 41880012
Security holes in infrastructure , people who are using admin accounts to log on to there computers, any batch scripts which are running, service accounts whose passwords haven't been changed and general overall security health of infrastructure.
LVL 54

Expert Comment

ID: 41880026
Sorry, but this is really a totally different question, in fact, a set of questions. Please start new threads.
LVL 69

Expert Comment

ID: 41880050
Even if you leave attacks aside, you need to consider accidental actions like changing/deleting important files from protected areas. As non-admin you at least need another confirmation. On the other side, if you get conifrmation prompts for almost every action you have to take, they are useless ;-).
LVL 54

Expert Comment

ID: 41880053
"As non-admin you at least need another confirmation" - as admin, too, at least when UAC is at default level.
LVL 17

Assisted Solution

by:Mike T
Mike T earned 250 total points
ID: 41881918

Short answer is that you need to ban logging in as the following on workstations:

domain admin
local admin

Users need restricted accounts. Power users need power accounts. No-one but no-one needs to be domain admin and logon to a workstation. Ever.
Even on servers limit it to a handful of trusted, authorised and competent (ideally certified) people. If they are not certified, go on training and get it. There's no excuse.

Always go for "least privilege" which means give people only enough permissions to do the things they are meant to be allowed and no more.

As for SCCM, well it does the permissions for you. You still don't need to logon as admin to make it work. In fact it's not going to help at all because it uses Local System which beats even domain admin anyway.

As for an auditing tool, create a new question and I'll try and remember what I've used in the past.

LVL 54

Expert Comment

ID: 41881923
I see you didn't ask any related questions, yet. You should. The additional questions reach far beyond this one.

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question