I would always add the user to an AD group and add the group to
Administrators, as you said.  But since it's only 5 machines, as opposed
to a whole OU of machines, it doesn't seem like it's worth using a GPO
that will need to have security filtering maintained.

If enforcement of either the Administrators groups or the AD group is
needed, this type of Restricted Group doesn't really provide that.  (This
is sometimes called a "reverse restricted group" because instead of
restricting the users who are in a group, you are designating a group that
must be a member of another group.)


-----Original Message-----
From: [email protected]
[mailto:[email protected]] On Behalf Of Dave Lum
Sent: Thursday, November 6, 2014 11:36 AM
To: [email protected]
Subject: [NTSysADM] Local admin account

I have an AD service account I want to make local admin on just 5 SQL
servers. Should I create an AD group for it and stick this one account in
it then add this group to local admins on those five machines? If I do
that should I create a GPO to add the group to the local admins on those
servers?

* I don't expect this group membership to change
* I don't expect this server list to change anytime soon (>1yr)

The current framework is that I have the account created and the AD
description is "Used for the <blah blah blah> service on <Server1>. Also,
see notes under telephones tab"
In the Telephones notes tab I list out the servers the account is local
admin on

We don't currently use any products other than Outlook where non-admins
can see AD account attributes, but it still feels like a poor way to
document where this account is local admin.

I do prefer being able to look in AD to see where accounts have access, be
it NTFS or being local admin on specific servers - I don't want to have to
query each system itself to know what's local admin on it or not...

Comments?


Reply via email to