http://nakedsecurity.sophos.com/2013/10/04/adobe-owns-up-to-getting-pwned-login-and-credit-card-data-probably-stolen-all-passwords-reset/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=93ed7d3d97-naked%252Bsecurity&utm_term=0_31623bb782-93ed7d3d97-454838729
Z Edward E. Ziots, CISSP, CISA, Security +, Network + Security Engineer Lifespan Organization [email protected]<mailto:[email protected]> Work:401-255-2497 This electronic message and any attachments may be privileged and confidential and protected from disclosure. If you are reading this message, but are not the intended recipient, nor an employee or agent responsible for delivering this message to the intended recipient, you are hereby notified that you are strictly prohibited from copying, printing, forwarding or otherwise disseminating this communication. If you have received this communication in error, please immediately notify the sender by replying to the message. Then, delete the message from your computer. Thank you. [Description: Description: Lifespan] From: [email protected] [mailto:[email protected]] On Behalf Of Webster Sent: Friday, October 04, 2013 8:13 AM To: [email protected] Subject: [NTSysADM] RE: Account Utility Very few (of the sites I go to) ever look at the privileged accounts. The last assessment I did had over 100 DA accounts and almost as many EA and SA accounts. The majority of their service accounts were in all three groups!!! Until I ran MBS’ script, they had no idea how many local SQL Server and SQL Express installs had been done using the domain’s SQL Service account and that account was a member of all three privileged groups. Webster From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Free, Bob Sent: Thursday, October 03, 2013 11:52 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility The first two I get, the third is really hard to comprehend. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Webster Sent: Thursday, October 03, 2013 8:09 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility MBS’ script works like a charm. I have used it when doing assessments for AD migrations. I have NEVER seen an IT org that knew every service account used, where they were used or how many of those service accounts had domain admins privileges. Webster From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Thursday, October 03, 2013 11:00 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: Account Utility http://theessentialexchange.com/blogs/michael/archive/2008/02/29/finding-services-using-non-system-accounts-with-powershell.aspx From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Steve Norton Sent: Thursday, October 3, 2013 8:10 AM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] Account Utility A long time ago I used a utility that showed me what account services were running under on all my servers. My environment is Windows 2003 and 2008 R2. Ideally this would be a utility that I can run from a Windows 7 workstation against servers. Suggestions appreciated. ________________________________ PG&E is committed to protecting our customers' privacy. To learn more, please visit http://www.pge.com/about/company/privacy/customer/ ________________________________
<<inline: image001.jpg>>

