We do something similar.  Add the desired account(s) do a group, use a GPO to 
make that group local admin.  You can restrict the scope of the GPO by either 
security group or individual machines, whichever you prefer, but I'd create 
both  SpecialTaskUsers and SpecialTaskComputers groups.  Use the Computers 
group to scope the GPO and add the Users group in the GPO.

--
There are 10 kinds of people in the world...
         those who understand binary and those who don't.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Dave Lum
Sent: Thursday, November 06, 2014 11:36 AM
To: [email protected]
Subject: [NTSysADM] Local admin account

I have an AD service account I want to make local admin on just 5 SQL servers. 
Should I create an AD group for it and stick this one account in it then add 
this group to local admins on those five machines? If I do that should I create 
a GPO to add the group to the local admins on those servers?

* I don't expect this group membership to change
* I don't expect this server list to change anytime soon (>1yr)

The current framework is that I have the account created and the AD description 
is "Used for the <blah blah blah> service on <Server1>. Also, see notes under 
telephones tab"
In the Telephones notes tab I list out the servers the account is local admin on

We don't currently use any products other than Outlook where non-admins can see 
AD account attributes, but it still feels like a poor way to document where 
this account is local admin.

I do prefer being able to look in AD to see where accounts have access, be it 
NTFS or being local admin on specific servers - I don't want to have to query 
each system itself to know what's local admin on it or not...

Comments?






Reply via email to