Solved

Login to computer through Admin Priviligies

Posted on 2016-11-08
9
101 Views
Last Modified: 2016-11-13
Hi all,
Just wanted a bit more insight on what are good and bads about logging into your work computer through admin privileges? means I know Admin account has lot of security privileges which can be exploited but is it really a big threat? I though having an Administrator user account (local/domain) is much bigger threat then this.
the reason to login to work computer with admin privileges is because to run applications like sccm, sql, sharepoint etc....
0
Comment
Question by:Leo
9 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 250 total points
ID: 41879984
Please read my article https://www.experts-exchange.com/articles/24599/Free-yourself-of-your-administrative-account.html where I show a way out of this dilemma.
And please explain "I though having an Administrator user account (local/domain) is much bigger threat then this." - I don't understand what "this" should mean as "this" should be the same.
0
 
LVL 8

Author Comment

by:Leo
ID: 41880001
Thanks for that article, now if I want to run a security audit across the network, is there a tool which can be used?
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41880006
What should that audit find out exactly?
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 8

Author Comment

by:Leo
ID: 41880012
Security holes in infrastructure , people who are using admin accounts to log on to there computers, any batch scripts which are running, service accounts whose passwords haven't been changed and general overall security health of infrastructure.
thanks.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41880026
Sorry, but this is really a totally different question, in fact, a set of questions. Please start new threads.
0
 
LVL 69

Expert Comment

by:Qlemo
ID: 41880050
Even if you leave attacks aside, you need to consider accidental actions like changing/deleting important files from protected areas. As non-admin you at least need another confirmation. On the other side, if you get conifrmation prompts for almost every action you have to take, they are useless ;-).
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41880053
"As non-admin you at least need another confirmation" - as admin, too, at least when UAC is at default level.
0
 
LVL 17

Assisted Solution

by:Mike T
Mike T earned 250 total points
ID: 41881918
Hi,

Short answer is that you need to ban logging in as the following on workstations:

domain admin
local admin

Users need restricted accounts. Power users need power accounts. No-one but no-one needs to be domain admin and logon to a workstation. Ever.
Even on servers limit it to a handful of trusted, authorised and competent (ideally certified) people. If they are not certified, go on training and get it. There's no excuse.

Always go for "least privilege" which means give people only enough permissions to do the things they are meant to be allowed and no more.

As for SCCM, well it does the permissions for you. You still don't need to logon as admin to make it work. In fact it's not going to help at all because it uses Local System which beats even domain admin anyway.

As for an auditing tool, create a new question and I'll try and remember what I've used in the past.

Mike
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41881923
@Leo
I see you didn't ask any related questions, yet. You should. The additional questions reach far beyond this one.
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Customized VNC 1 36
Wireshark Network Packet Analysis of PS4 7 28
Cisco ASA blocks some https sites. 27 42
O365 Getting Spoofed from Another Country 4 23
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question