IT people tend to do a lot of testing on their machines which often involves 
disabling AV.

A few years ago I got infected through a zero day bug in Firefox, I visited a 
well known blog and a cmd prompt flashed up and disappeared very quickly but I 
knew what had happened. I was using Symantec at the time and Symantec didn't 
detect the Trojan but it did detect and block the other viruses that the Trojan 
tried to download.
So I was infected with one virus but not all the other viruses - if I had been 
logged on as a domain admin then that one virus could have infected other 
machines including servers and if they didn't have AV they would have 
downloaded and run all the other viruses as well.

I've encountered quite a few environments where some old server in a back room 
somewhere is infected and attacking the rest of the network even though no-one 
ever logs on to it.

Regards,

Phil Garven
________________________________
From: Crawford, Scott [mailto:[email protected]]
Sent: Thursday, May 27, 2010 5:38 PM
To: NT System Admin Issues
Subject: RE: What's your requirement to allow a user DA?

Not to nitpick, but I want to nit pick :)

RE: "But no one uses the internet on the exchange server so we don't have AV on 
it"

How is this relevant? If the AV on the workstation the DA is logged into didn't 
catch the virus, why would the save AV software on the Exchange server catch 
it? Or, are you suggesting that different AV be installed on various servers?

From: Phil Garven [mailto:[email protected]]
Sent: Thursday, May 27, 2010 4:06 PM
To: NT System Admin Issues
Subject: RE: What's your requirement to allow a user DA?

+1 on separate accounts for admins

Log on with a user account (maybe a local admin) and use "run as" to run your 
admin programs as your domain admin or equivalent account.

If you log on as a domain admin and get a virus (happens to the best of us) 
then that virus is running as a domain admin and sending itself to your 
exchange server and remotely executing. "But no one uses the internet on the 
exchange server so we don't have AV on it"

Regards,

Phil Garven
Sunbelt Software
________________________________
From: Free, Bob [mailto:[email protected]]
Sent: Thursday, May 27, 2010 4:43 PM
To: NT System Admin Issues
Subject: RE: What's your requirement to allow a user DA?

2-3 is max for any environment IMO. Everything else should be dome with 
delegations. They must be your most proficient admins, not any old new hire.

Check out some of joe Richard's rants about it, he ran a multi-nationl Global 5 
firm with 3 EA /DA level admins who were, as he put it, all close enough to 
smack each other. (+ 1 manager who had the keys in a break glass/locked safe 
scenario)

Personally, I am a fan of 3 accounts per admin for those enterprise level 
admins, 1 uberadminID (DA/EA), 1 regular adminID with appropriate delegations 
like all administrators should have and the usual day-to-day userID

From: David Lum [mailto:[email protected]]
Sent: Thursday, May 27, 2010 11:39 AM
To: NT System Admin Issues
Subject: What's your requirement to allow a user DA?

What are your guy's prerequisites on someone having a Domain Admin account - 
assume a medium or large company and 4-5+ Systems Engineers. Previously here 
they've just had every new SE hire be domain admin, I'm thinking it's time to 
change that practice but I'll need some ammo and a plan before I have any hope 
of changing this.

My thinking is along the line of "need to know what's going in this AD 
structure" as well as being proficient in all things AD, etc.

Thoughts comments? I'm thinking there should only be 2-3 DA accounts max per 
domain max.
David Lum // SYSTEMS ENGINEER
NORTHWEST EVALUATION ASSOCIATION
(Desk) 971.222.1025 // (Cell) 503.267.9764









...









~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to