Yes I really do have scripts like that. Most aren't dangerous as 90% of my scripts just gather info. Most of the work of a DA is figuring things out, very little should be actually changing things. The ones that do change things could be dangerous but I try hard to make sure they aren't... Also my scripts intended to be seen by others are not bad to read, even non-perl folks can generally understand them with a few exceptions (the main one that comes to mind is a monitoring script which supports plugging in new monitoring components).
 
Unfortunately most all of my scripts were written under contract for someone or another and I don't have the rights to release them. The member script is something I have been wanting to convert to an exe for quite a while, I just haven't had time and when you do things for free, you tend to work on the things you would like to, not necessarily what others would want you to work on. :) I have already written a script that can pull all of the membership of a group pretty easily so I know it can be done, no challenge there anymore... Now the stuff in admod I am working on, now that is some new cool stuff that no one does so there is a ton of challenge there. :)
 
--
O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm 
 
 


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Deji Akomolafe
Sent: Friday, June 23, 2006 7:30 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

Don't dare him. He does have really dangerous[1] and completely incomprehensible[2] scripts. Really.
 
[1] Still trying to figure out which is more dangerous - joe's scripts or ~Eric's DIT :)
[2] Mostly because Perl is Greek to me.
 

Sincerely,
   _____                               
  (, /  |  /)               /)     /)  
    /---| (/_  ______   ___// _   //  _
 ) /    |_/(__(_) // (_(_)(/_(_(_/(__(/_
(_/                             /)     
                               (/      
Microsoft MVP - Directory Services
www.readymaids.com - we know IT
www.akomolafe.com 
-5.75, -3.23
Do you now realize that Today is the Tomorrow you were worried about Yesterday? -anon


From: Myrick, Todd (NIH/CC/DCRI) [E]
Sent: Fri 6/23/2006 3:07 PM
To: [email protected]; [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

Okay, now that is a script I would like to see :)
 
Todd

________________________________

From: joe [mailto:[EMAIL PROTECTED]
Sent: Fri 6/23/2006 5:46 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"


Hi Deji.
 
The misunderstanding here seems to be that I walked in and was suddenly empowered to make those changes at the widget factory. That so rarely happens it isn't worth mentioning. In actual fact, I looked at the existing mess and started working out what needed to be done to correct it and then started working towards that goal convincing whomever I could that it was the way that we needed to go if we actually wanted a secure/stable environment. You were there, you recall how I took DA away right? I first argued that it was dangerous for that many people to have it and then started pointing out various issues that could be caused by people having those rights and possible issues that could come up that we have been lucky not to see until I got enough management to go, yeah that makes sense even if I had to make someone look silly in the process. Then I dropped most of the DAs and the loudest folks got dropped to Account/Server Ops with all of them claiming they would never be able to do their job. Stability increased overnight. The next step was to remove the account/server op rights by showing it really wasn't needed and again could cause issues that didn't need to exist and then eventually, bam those were gone too. From what I have seen, most people on the inside aren't even trying to lock the environment down, they start with a "I will never get that done" attitude and so they never start. They are standing around hoping someone above will get a clue all of a sudden and just tell them to clean up, that isn't going to happen. The upper folks aren't thinking about your daily ops. They don't know what is dangerous unless they are told by the experts. I think some folks also don't want to bring it up as they aren't sure they would be the ones keeping the rights themselves. Me, I don't look at DA rights and think cool, I think pain in the ass.
 
As for consulting, as you know, that is a completely different ball of wax. Just the same, I don't let that stop me from telling customers that they are doing things in very insecure ways and for the most part, they listen and start correcting it. You don't say, oh wow, that is bad you shouldn't do it because x and y best practice says you shouldn't. I rarely utter the word best practice because they are all generally debatable depending on the environment. Instead I will say, hi Mr. manager, did you know that you have junior admins who can read your mail whenever they like or check out their performance reviews you are working on when they like or knock the environment down to its knees if they make simple mistakes?[1]
 
There are those times where folks don't want to listen at all and I just document what I told them and continue on doing what I am there to do. The next time I get called in to deal with something if it was something I forecast would happen I kindly point that out. Once that happens once or twice even the folks who brushed me off previously start realizing that hey, maybe there is something to this. Certainly they don't like hearing nor having their management hearing that what happened could have been avoided had they listened to the person they paid to come in and make recommendations.
 
If an environment is running perfectly stable and efficiently, there is no reason to change. I can count on 0 hands the number of business environments I have personally seen that I would say fit that criteria. That is why people are asking folks to come in and help them change. Do them a favor and tell them what they need to hear, not just what you think they want to hear and want to tell them for fear of them getting mad. 
 
If you are brought in to design something for someone, it is your job to try and design the best thing you feel you can for them. If they argue the design, try to understand what they are saying because you could be missing a huge point. But if it is simply this is because it is the way we have always done it and they feel that they know everything that is good and right, why did they bring you in at all? You bring in outsiders to help you do something different and see the environment in a different way than everyone else inside sees it.
 
  joe
 
 
 
[1]  One company I wrote a script that chased through and found everyone who had admin rights on any DCs in any domain in the forest and printed that out and said, here are the people who can blow up your entire AD with a simple mistake. Then the output from another script dumped everyone who could escalate themselves to administrators on DCs without physical access to the DCs and printed that out and said here are the people who with minimal hacking attempts can escalate themselves to administrators and blow up your entire AD. The first listing was almost 1000 users, the second listing was over 1000. They started cleaning up. It wasn't an immediate kick everyone out, but that got the point across such that they felt, hey maybe this isn't going to take care of itself. 
 
--
O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm 
 
 


________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Deji Akomolafe
Sent: Friday, June 23, 2006 3:18 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"


joe, joe, joe......
 
One of these days, you'll learn that you go to war with the army you have <fill in the rest>.....
 
You see, some of us take security as seriously as you do. Most of us, unfortunately, have come to the realization that there are more powerful and better-armed design and operational considerations that go into how a specific environment is operated. These considerations are, more often than not, more compelling and powerful than "best practices". It is an illusion to think that you can walk into any environment and show them the evils of EA/DA privileges, then mandate that the client yank those privileges from people, and have the client say "Yes, Sir! Doing so right now!". Much as you'd like to see IT infrastructure operated in secured fashion in conformance to "Best Practices" or any of the other prescriptive guidance out there, you will be disappointed that, more often than, your wish will not come true. There are so many competing influences and interests, and your opinion will just be one of them.
 
As Todd was saying, the admin does not get to make decisions. Sad, but true. Admins make recommendations that are, in their views, in the best interest of the infrastructure. Operational, political, budgetary, technological, philosophical, environmental, governmental, legal and many other factors combine and conspire to defeat or whittle down such proposals, and there is nothing the admin can do about it. Of course, the admin could quit. But, then how many times would the admin quit before (s)he realizes that it's a battle field out there and quitting is an exercise in futility?
 
Your present employer is in the business of designing and implementing solutions to meet clients' requirements. If you get put on a project and you went ahead and write up all these fancy industry-standard-ITIL-MOF-MSF-Best-Practices-compliant design plans, present it to the client and the client comes back to you and say "all well and good, but this is NOT  how we operate. HERE is how we operate, now please design something around our operational posture", what would you do? Tell the client to blow you? Tell the client "No, you don't understand. This is THE best/optimal way to do what you are about to do. Follow my script, or else you'll be sorry later"? What if you presented all the ramifications and implications of any other design options and make them look REALLY bad, yet the client refuses to see it your way? Because your way doesn't fit into their way? Would you up and quit?
 
I am not saying your idea is not admirable or good. I'm just saying that the way you were able to drive and influence decisions at Widget is not realistically the way most admins are able to do things. Most are more constrained than you were at Widget. And, if I were a betting man, I'd wager that you are now more constrained in your new world than you were in the previous world.
 

Sincerely, 
   _____                                
  (, /  |  /)               /)     /)   
    /---| (/_  ______   ___// _   //  _ 
 ) /    |_/(__(_) // (_(_)(/_(_(_/(__(/_
(_/                             /)      
                               (/       
Microsoft MVP - Directory Services
www.readymaids.com <http://www.readymaids.com>  - we know IT
www.akomolafe.com <http://www.akomolafe.com>  
-5.75, -3.23
Do you now realize that Today is the Tomorrow you were worried about Yesterday? -anon

________________________________

From: joe
Sent: Fri 6/23/2006 11:15 AM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"


I read the below and thought... 
 
Yes Mr. President, until something bad happens there is no reason to take that nuclear device away from the students. They don't meet any of our terrorist criteria so there is only minimal concern. If they cause damage, we will know better for next time...
 
Do not wait for technical solutions for policy problems. You will wait a long time. If I received a dollar for every time I was told someone couldn't do their job in some new way I proposed they do it I would be retired. Not once have I run into a case where someone couldn't do their job after the change and usually, they had better clue what they were doing too because they tried to figure out what they couldn't do with whatever I was taking away so they could prove they needed it.
 
This isn't anything new anywhere by any shot. People don't like to lose power unless they actually understand with great power comes great responsibility. If I walk into your network to check things out for you, I want a normal ID with Exchange view, no more. People are usually surprised and are like, don't you want Enterprise Admin... My response is "What and be able to be blamed the moment something blows up, NFW." Anytime something gets screwed up in a forest because of a change, the first people to look to blame are anyone with EA or DA, the next ones are anyone who can elevate to those levels.
 
When I was at the Widget company, I once opened up ADUC (yeah it was a weird day...) and low and behold I see an object where an object shouldn't be and the first words out of my mouth were to shout across the room... Vern, you aren't supposed to use your Domain Admin ID[1]. Vern said something like... I knew I shouldn't have done that. He was trying to help someone out. Perfect reason why he actually shouldn't have had a DA ID. :) EAs and DAs shouldn't be "helping people out", they should follow very strict processes and procedures that are thought up and agreed upon in advance. While there are times you may have to fly by the seat of your pants to figure things out, it should be a very odd case and should be done by the most senior tech who is responsible for coming up with the processes in the first place. Does this piss people off... yes, quite often. However, the role of the DA/EA is not to make individual people happy, it is to keep the overall AD and security safe and stable. Intelligent management understands that and should be happy to hear an EA/DA say no to some stupid request they make because that is why they pay them.
 
  joe
 
 
 
[1] Vern was my manager, we had 3 engineers with EA/DA and Vern was the manager. He had an ID because he was always the backup to the team in case we were all hit by a bus or couldn't otherwise respond to a page. Unlike most CIO's, he was a techie and could fix things if required and also he used his ID to do things that we all as a team said was stupid to do but someone from above absolutely ordered it to be done. Basically if something stupid was required to be done, he rather do it himself as the manager than force an engineer to do it.
 
 
 
--
O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm 
 
 

________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CC/DCRI) [E]
Sent: Friday, June 23, 2006 12:57 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"



I guess my point of view is this.  I do what is equitable for the situation, and try to maintain the peace as best as possible.  I myself use dual credentials, encourage others to do it as well, but I also understand that "people do what works", and CYA with a message to my direct reports about concerns I have.  So until a situation arises that warrants a change in practice that I can champion, I patiently wait, and hope for no major disaster.  Now I will say, when we came across this issue, we were able to make a stronger case to remove collaboration credentials from protected groups, still there was a lot of resistance from admins to change the way they went about their work.  This has changed with more people becoming security aware, and the organizations going through security audits, etc.  

 

I am not disagreeing that multiple credentials are not a best practice, but until MS sneaks a few more of these tweaks into their system, we will deal bad administration practices for quite some time.  And getting people to do what is "Best" can put into a lot of "Political, Emotional, and Geopolitical" battles unless you have solid backing.

 

Todd

 

 

________________________________

From: joe [mailto:[EMAIL PROTECTED] 
Sent: Friday, June 23, 2006 12:13 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

 

Yeah, like rename Domain Admins to "Unimportant People" and create a new group called Domain Admins and put the CIO in it. There is no excuse for a CIO to be in Domain Admins unless the company is under 5 people.

 

The only people who should be in domain admins are the people you expect to fix everything when the world hits the floor. If someone isn't in that category, they don't get rights to modify everything because it just puts them in a position to cause work for someone else. 

 

I would tell that to the CIO of any company. If the CIO wants, he can hold the envelope that has the password for the builtin Admin account, that password should be like 250 characters so he/she isn't interested in actually trying to use it.

 

--

O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm 

 

 

 

________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CC/DCRI) [E]
Sent: Friday, June 23, 2006 11:01 AM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

Only Sith deal in absolutes... :P

 

When you have a CIO that likes to be in the Domain Admins group, you sometimes have to pick your battles.

 

Todd

 

________________________________

From: joe [mailto:[EMAIL PROTECTED] 
Sent: Friday, June 23, 2006 10:18 AM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

 

There is no debate on admins having multiple creds, one for admin work and one for normal work. Just do it. :)

 

To put it nicely, if a company doesn't do this, they are just being silly[1]. 

 

I am trying to figure out if there is ever a valid reason I think that an admin should have a single ID in a company. I can't come up with one.

 

   joe

 

 

 

[1] Instead of silly think of mean words used to describe really silly people.

 

--

O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm 

 

 

 

________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Myrick, Todd (NIH/CC/DCRI) [E]
Sent: Friday, June 23, 2006 6:50 AM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

One more thing to add to this from my experience. 

 

I think we had situations arise where someone was trying to pragmatically modify or read attributes on accounts in the protected groups and was not able to due to their membership within a protected group.  This of course started the hot debate on admins having multiple credentials, one for administrative duties, the other for collaborative and identity purposes.

 

Todd

 

________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
Sent: Thursday, June 22, 2006 9:34 PM
To: [email protected]
Subject: RE: [ActiveDir] AD Security permission continues to be "auto-removed"

 

I have a 2-part discussion of this behavior starting here: http://www.akomolafe.com/JustSaying/tabid/193/EntryID/19/Default.aspx

 

It's a bit headache-inducing, but at least you will get the benefit of knowing that it is "by design"

 

HTH


Sincerely, 
   _____                                
  (, /  |  /)               /)     /)   
    /---| (/_  ______   ___// _   //  _ 
 ) /    |_/(__(_) // (_(_)(/_(_(_/(__(/_
(_/                             /)      
                               (/       
Microsoft MVP - Directory Services
www.readymaids.com <http://www.readymaids.com/>  - we know IT
www.akomolafe.com <http://www.akomolafe.com/> 
Do you now realize that Today is the Tomorrow you were worried about Yesterday? -anon

 

 

________________________________

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of J B
Sent: Thursday, June 22, 2006 5:08 PM
To: [email protected]
Subject: [ActiveDir] AD Security permission continues to be "auto-removed"

We have some users that have mobile devices that connect to Exchange.  The 3rd party application uses a dedicated account to send mail from the devices.  This account needs to have "Send As..." permissions on each of the user accounts' security settings.  We have set it in all users (about two dozen) but one user in particular has a problem.  We set the permission and give it "Send As..." rights (just like all the others - no different), but usually within an hour, the newly added permission is gone - not just the "Send As" setting, but the whole account name is gone from this user's security settings as if we never added it in the first place.  We have five DC's and I have tried adding it from each DC with the same results.  I am baffled by this.  Does anyone have any suggestions?

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.activedir.org/ml/threads.aspx

Reply via email to