I do this so our NOC can patch/reboot and the GPO setting I use is “allow system shutdown” and that GPO does nothing else. Also, you’ll want to add BUILTIN\Administrators and Domain Admins to that GPO or else ONLY the group specified in the GPO can reboot the system. Don’t ask how I know :).
Dave From: [email protected] [mailto:[email protected]] On Behalf Of Michael Leone Sent: Friday, January 20, 2017 9:43 AM To: [email protected] Subject: [NTSysADM] Adding *only* reboot right for domain user to a local host, remotely ... (I really wish my boss wouldn't ask about this type of stuff at noon on a Friday, when I have to leave by 4PM ...) Anyway, what he wants to do: he wants our techs to be able to use a domain account, log into domain member servers, run Windows Update, *and* then be able to tell it to reboot. And he does NOT want to add this domain account to local Administrators group. (don't ask, it's a long story) I *think* I can do this with a GPO ---------------- Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Right Assignment > Force shutdown from a remote system Simply add account(s) in question to this policy and they will be able to reboot servers remotely. ---------------- Problem is, I haven't tested this yet, and he (ideally) wants this in place so the techs can install windows updates on Sunday. And no way do I want to roll this out to all production servers, without testing it first (which I don't have time to do, before I have to leave today) Is this the best way to give a domain user only the right to reboot a server, without giving them any other rights? (I have a GPO that assigns WSUS settings via OU and group membership; I could either add it to that one, or make a new, and assign it to that same OU and group membership)

