In my opinion: yes and yes.  I just don't like adding user accounts, I prefer 
to use groups.  Also helps with RBAC.

Thanks


Webster


> -----Original Message-----
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Dave Lum
> Sent: Thursday, November 06, 2014 10:36 AM
> To: [email protected]
> Subject: [NTSysADM] Local admin account
> 
> I have an AD service account I want to make local admin on just 5 SQL
> servers. Should I create an AD group for it and stick this one account in it
> then add this group to local admins on those five machines? If I do that
> should I create a GPO to add the group to the local admins on those servers?
> 
> * I don't expect this group membership to change
> * I don't expect this server list to change anytime soon (>1yr)
> 
> The current framework is that I have the account created and the AD
> description is "Used for the <blah blah blah> service on <Server1>. Also, see
> notes under telephones tab"
> In the Telephones notes tab I list out the servers the account is local admin
> on
> 
> We don't currently use any products other than Outlook where non-admins
> can see AD account attributes, but it still feels like a poor way to document
> where this account is local admin.
> 
> I do prefer being able to look in AD to see where accounts have access, be it
> NTFS or being local admin on specific servers - I don't want to have to query
> each system itself to know what's local admin on it or not...
> 
> Comments?
> 
> 
> 



Reply via email to