That would actually sound like a reason to make it happen instead of a reason 
to avoid it.  Seems like any files legitimately restricted to that group 
shouldn't be accessed by anyone likely to bark about the change.

(removing glasses with strange pale reddish tint)

--
There are 10 kinds of people in the world...
         those who understand binary and those who don't.

From: [email protected] [mailto:[email protected]] On 
Behalf Of Heaton, Joseph@Wildlife
Sent: Tuesday, June 28, 2016 6:28 PM
To: [email protected]
Subject: [NTSysADM] RE: Enterprise Admin best practice

History, and come to find out the old team lead had used that group for file 
access somewhere.  Thanks for the link, I'm going to download that so I can 
defend my position if it comes to that.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Tuesday, June 28, 2016 3:04 PM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: Enterprise Admin best practice

What's the blowback?

There are very few things that require that level of permission. But there are 
a few.

See Appendices B - H in this whitepaper:

https://technet.microsoft.com/en-us/library/dn487446.aspx


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Heaton, Joseph@Wildlife
Sent: Tuesday, June 28, 2016 5:49 PM
To: 'NT System Admin Issues Discussion list'
Subject: [NTSysADM] Enterprise Admin best practice

I remember hearing, I believe on this list, that the best practice for the 
Enterprise Admin role was to only have a service account in that role, with a 
very complex password, that is written down and locked in a file cabinet.  I've 
just implemented that, but now I'm getting blowback.  Does anyone have anything 
in writing that talks about this process, and that yes, this is best practice?

Thanks,

Joe Heaton

Reply via email to