History, and come to find out the old team lead had used that group for file access somewhere. Thanks for the link, I'm going to download that so I can defend my position if it comes to that.
From: [email protected] [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Tuesday, June 28, 2016 3:04 PM To: [email protected] Subject: [NTSysADM] RE: Enterprise Admin best practice What's the blowback? There are very few things that require that level of permission. But there are a few. See Appendices B - H in this whitepaper: https://technet.microsoft.com/en-us/library/dn487446.aspx From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Heaton, Joseph@Wildlife Sent: Tuesday, June 28, 2016 5:49 PM To: 'NT System Admin Issues Discussion list' Subject: [NTSysADM] Enterprise Admin best practice I remember hearing, I believe on this list, that the best practice for the Enterprise Admin role was to only have a service account in that role, with a very complex password, that is written down and locked in a file cabinet. I've just implemented that, but now I'm getting blowback. Does anyone have anything in writing that talks about this process, and that yes, this is best practice? Thanks, Joe Heaton

