I found I can get around no access to drives by going to 
\\127.0.0.1\c$<file:///\\127.0.0.1\c$> or whatever drive.


Webster

From: [email protected] [mailto:[email protected]] On 
Behalf Of Charles F Sullivan
Sent: Wednesday, March 30, 2016 2:19 PM
To: [email protected]
Subject: RE: [NTSysADM] Local Administrative Privileges

We have a similar situation. The alternate accounts we created are domain 
accounts. If you don’t use domain accounts, it will be more work because you’ll 
need to configure local Group Policy on every machine and hope that there are 
not domain ones that override the settings. Not only that, but they can use 
that admin account to change the local GP settings if they are savvy enough.

These are the measures that I’ve taken:

-          First make certain that UAC is on (default setting should be fine), 
or they won’t even be able to properly elevate

-          Create an admin account for each user and add it to a domain group

-          For the group that you created containing the admin accounts, deny 
logon interactively, over the network and via RDP. (In our case these are 
servers, which are VMs, and the users have no access to the console, so we 
didn’t have to deny logon interactively. I don’t think adding this will cause 
you any problems though.)

-

We found that one user was disabling UAC, adding his regular account to the 
Administrators group, etc. (He couldn’t figure out that we notice and can track 
down these things.) We had to take further action due to that, once we realized 
how untrustworthy at least one of these users could be:



User Account Control

Policy Setting

User Account Control: Admin Approval Mode for the Built-in Administrator 
account:  Disabled

User Account Control: Behavior of the elevation prompt for administrators in 
Admin Approval Mode:  Prompt for consent for non-Windows binaries

User Account Control: Detect application installations and prompt for 
elevation:  Enabled



Hide specified Control Panel items: Enabled

Microsoft.UserAccounts

Microsoft.ActionCenter

Microsoft.DateAndTime

Microsoft.DeviceManager

Microsoft.NetworkAndSharingCenter

Microsoft.System

Microsoft.Troubleshooting

Microsoft.WindowsFirewall

Microsoft.WindowsUpdate



Prevent access to registry editing tools: Enabled

Disable regedit from running silently? Yes



I would have liked to disable the Command Prompt and a few other things, but I 
figured they might be needed. Obviously, an advanced enough user can get around 
just about all of these settings, but it’s been working compared to what we had 
before.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Kish n Kepi
Sent: Wednesday, March 30, 2016 8:21 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] Local Administrative Privileges

Hello All,

I would like to give to my users, who do not have administrative privileges on 
their local Windows boxes, the ability to use other credentials with admin 
privileges so they install.

So, it’s easy enough to create an admin account, however, I’d like to prevent 
people from actually using it to login into windows (thus bypassing my domain 
and its GPOs) and prevent creating a local profile (sort of like /sbin/nologin  
in /etc/passwd). Like this, I can restrict the use of the admin account to its 
intended purpose – allowing them to install, but making them jump through a 
hoop.

Or is there a better way to lock down users but still allow them to install?

Kish N Kepi


Reply via email to