Service accounts adding to Local admin group

Hello Everyone,
What are the risks with adding SharePoint service application service accounts to local admin group.
I see in many Microsoft blogs not to use farm account to create service application and better to use dedicated service account but i didn't see any articles why we shouldn't add dedicated service accounts to local admin group
I am facing some GPO issue and one my friend suggested to add service accounts to add local administrator group to fix this issue but i am not sure what the risks behind it. 
Please let me know if you aware of risks.
Thanks S

The basic is that it increases your attack surface. If the service (and this goes for any application regardless of vendor or platform) has elevated access to the underlying system (e.g. Local Administrator, SYSTEM, root, and so forth) and that service is
compromised, there is the possibility that the entire server would be compromised.
Clearly, this is not a good situation.
Having said that, there are two scenarios where a service account in SharePoint must be a Local Administrator:
If you're running the Claims to Windows Token Service (C2WTS) as a Domain User. This account requires Local Admin.
If you're provisioning the User Profile Sync Service, the Farm Administrator account must be a Local Administrator during the provisioning process (reason being is that it makes calls to the SAM).
Trevor Seward
Follow or contact me at...
&nbsp&nbsp
This post is my own opinion and does not necessarily reflect the opinion or view of Microsoft, its employees, or other MVPs.

Similar Messages

  • Is it recommended practice to add SCCM service accounts to the Domain Admins group?

    I am working with an external consultant that is recommending that all of the SCCM service accounts be added to the Domain Admins group.  I am not the SCCM engineer, I am the AD guy, this is the reason I am questioning this methodology.  I have
    read several articles that seem to provide the appropriate configuration options for all of the SCCM accounts so I see no need to allow these accounts to have Domain Admin level access to the environment.  I don't see a reason for ANY of the service accounts
    to have Domain Admin, let alone all of them.  I have referenced several TechNet articles but there does not seem to be definitive guidance around this.  Could anyone assist with settling this?  Thanks in advance.

    No, there's absolutely no reason for the service accounts to be domain admins.
    All of the required service accounts used in a SCCM environment can be given the proper permissions given their purpose.
    Example: Join Domain Account can be given the permissions to join computer objects in the very specific OU in AD, and nothing else.
    Network Access Account only need read access to your distribution points.
    Client Push Account needs local administrative permissions on your clients.
    What i'm trying to say is. None of any of the service accounts needs to be domain admin. Hope that helps.
    Martin Bengtsson | www.imab.dk

  • Cant add Windows accounts to staff or admin group

    cant add Windows accounts to staff or admin group
    I have one Mac pro workstation on a all windows network, its added to the domain. i can give network users administrative permissions on the pc by selecting allow user to administer this computer in the accounts in system preferences but they dont have file permissions unless i add them explicitly on the file or folder. i'm new with macs and not sure on what to do.

    > local users (Not domain Users) to this Group and then nest this Group
    > into the Local Admin Group Built-in into Windows 8
    You cannot nest local groups.
    Greetings/Grüße,
    Martin
    Mal ein
    gutes Buch über GPOs lesen?
    Good or bad GPOs? - my blog…
    And if IT bothers me -
    coke bottle design refreshment (-:

  • DPM 2012 still requires put end users into local admin groups for the purpose of end user data recovery?

    On client computers that are protected by DPM 2010 and prior versions, you had to put the end users account in the local administrators group. If you did not add the end user account to the local administrators group you would get this error after opening
    the recovery tab in the DPM client: “DPM found no recovery points which you are authorized to restore on the specified DPM server. You can restore only those recovery points for which you were an administrator at the time the
    backup was taken. To restore other recovery points, contact your DPM administrator, or attempt to restore from another DPM.”  This is not ideal on many networks because the end users are not allowed to have local administrator access.
    Ths fix to this was included in hotfix 2465832 found here: http://support.microsoft.com/kb/2465832.
    This hotfix (a hotfix rollup package for DPM 2010) resolves other issues with DPM 2010 as well. You can find the full list of what this hotfix corrects on that link.
    One would think this issue should have been resolved in DPM 2012, however I am encountering the same exact issue, had to include end-users into the workstation local admin group before they can search for recovery points on the DPM server. This is not acceptable
    practice.
    Is there a new hotfix for the same issue on DPM 2012? I am hesitated to apply KB2465832 since it also includes many other fixes for DPM 2010, which may not appicable for version 2012.
    Please help.
    Thanks,

    This is a hands off solution to allow all users that use a machine to be able to restore their own files.
    1) Make these two cmd files and save them in c:\temp
    2) Using windows scheduler – schedule addperms.cmd to run daily – any new users that log onto the machine will automatically be able to restore their own files.
    <addperms.cmd>
    Cmd.exe /v /c c:\temp\addreg.cmd
    <addreg.cmd>
    set users=
    echo Windows Registry Editor Version 5.00>c:\temp\perms.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection]>>c:\temp\perms.reg
    FOR /F "Tokens=*" %%n IN ('dir c:\users\*. /b') do set users=!users!%Userdomain%\\%%n,
    echo "ClientOwners"=^"%users%%Userdomain%\\bogususer^">>c:\temp\perms.reg
    REG IMPORT c:\temp\perms.reg
    Del c:\temp\perms.reg
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT] This
    posting is provided "AS IS" with no warranties, and confers no rights.
    That's a good one! Thanks for that.
    I've been scripting on KIX for some time, so here is mine, hope it helps to someone... (it's probably not the best, but it works)
    ========================================================================
    $RC=setoption("WOW64AlternateRegView","on") 
    $DPMkey = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection"
    $uservariable = "%userdomain%\%username%"
    If KeyExist ($DPMkey)
    $Userstring=ReadValue($DPMkey, "ClientOwners")
    If $Userstring == ""
    WriteValue($DPMkey,"ClientOwners", $uservariable, "REG_MULTI_SZ")
    ? "Key created"
    else
    If not instr($Userstring,$uservariable)
    $Userstring = "$Userstring,$uservariable"
    WriteValue($DPMkey,"ClientOwners", $Userstring, "REG_MULTI_SZ")
    EndIf
    Endif
    EndIf
    ==========================================================================
    The problem actually is that you still need to use an admin account to write on the registry, so ensure you configure it properly on the schedule task.
    In case you use a service account on the schedule task... the "$uservariable" will get populated with that account. As a work around to this... I changed it for the following line:
    =========================================================
    $uservariable = ReadValue("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI", "LastLoggedOnSAMUser")
    =========================================================
    The only problem with that, is that key gets created/updated only if user gets logged phisically on that PC, but will not work for anyone connecting through RDP.

  • Is it possible to disallow RDP for one member of local admins group?

    Hello:
    I have an application server which has a service account that is in the local admins group. Is it possible to disallow only that particular service account from being able to RDP into the server? Server is Windows Server 2003 SP2. Basically, I'm trying to
    bypass this: Members of the local Administrators group can connect even if they are not listed. I understand that anyone using the service account could undo any restrictions I make, so what I'm trying to do would just be
    a deterrent. I cannot disable RDP altogether since our regular sys admins need to be able to RDP into the server. Thank you.

    What if you specified the user and denied them rights to RDP to the server.  A deny overrides every other permission, and if you can do this, then only that one user would not be able to RDP into the server, but other admins would be able to. 

  • Local admin vs user placed in local admin group

    what are the differences between the built-in and the user placed in the admin local group
    .  I noticed when installing Cisco's AnyConnect 3.x client as a user who has been elevated to the local admin group  that when the install is complete the settings only apply to the specific user used during the install as opposed to when the built-in
    admin (I am aware of the option for this) ...my question is  are there any window applications that require well known security identifiers (sid).
    or
    simply put what are the differences between the built-in and the user placed in the admin local group..I experienced differences and wanted to know where I can get more information

    Hi,
    Their are some subtle differences. The built-in administrator account SID is well known forprogramming logic by 3rd parties.
    For the built-in admin, UAC is disabled by default. That means that the built-in admin never requires elevation. But, as we all know, UAC can be turned off by the user so even when an admin user launches a program, he will be elevated automatically.
    The built-in admin account cant be deleted (though it can be disabled).
    Karen Hu
    TechNet Community Support

  • Can not add Domain User to Local Admin Group Win8.1

    Hello, 
    I am trying to add a domain user to the local admin account on a Win8.1 Enterprise computer. When I click the check name button it asks me to enter network credentials even though I am signed in to the computer with a domain admin account. When I try to
    type in any of my domain admin accounts it says "The Username or Password is incorrect". Even though I used that same account to login with. I can successfully ping all 3 of my DCs from the computer and have tried putting my second DC as the primary
    DNS and my third DC as the primary DC and same problem. I have checked for Active Directory errors on the DC and everything says it is running fine on the DC in server manager. I have this problem on multiple computers. Some of the computers it will work on
    but 90% of them it won't allow me to add the local user to the local admin group. 
    DCs are running Win Server 2008 R2 Enterprise. 
    Any help would be greatly appreciated. 
    Thank You

    I would suggest you to use Restricted Group(via GPO) to add domain users/group to a local admins group 
    1)Create a new group in Active Driectory
    Create a new group in Active Driectory that you wish to add to every workstations local administrator group. DO NOT add any users to this group at this time.
    2.
    Create a new GPO
    Create a new group policy object and link it to the desired OU. Make sure that the GPO you are using covers the OU that the WORKSTATIONS you are wanting to give users local administrative rights over.
    3.
    Edit the newly created GPO
    Navigate within the newly created GPO to Computer Configuration -> Policies -> Windows Settings -> Security Settings --> Restricted Groups
    4.
    Add your new Active Directory group to the Restricted Group
    Right-click the Restricted Groups folder and select "Add Group" to add your new Active Directory group to the Restricted Group. In the Group field, type the name of the newly created Active Directory group and click "OK"
    5.
    Add the Restricted Group to the local administrator group
    In the Restricted Group Properties windows click "Add" under the section titled "This group is a member of:" Type "Administrators" (without the quotes and yes it is plural), in the Group Membership window and click "OK"
    6.
    Wait for GPO updates to apply to the workstations
    Once your users receive their updated group policy settings every workstation within the OU you specified will have your new Active Directory group as a member of the local administrators group. If you need to force the GPO update on a specific workstation,
    run "gpupdate /force" in a command window on that workstation.
    7.
    Add a user or group of users to the Active Directory Restricted Group
    When you are ready, or in a position where you need to provide local workstation admin rights you can simply add the users or group of users to the Active Directory group that you created for use with Restricted Groups within your Active Directory Management
    Console.

  • Wmi script to find out the time when the user was added to local administration group

    Hi Friends,
    i need a script/query based on wmi/wql that find out the time when the user was added to local administration group on this computer
    Regards
    Tanoj
    OSLM ENGINEER - SCCM 2007 & 2012

    WMI does not keep security information.
    Unless you have enabled auditing, this information is not retained in any way.
    If auditing is enabled, you can write a powershell script to look for the specific event in the eventlog. More specifically, you should look for all security events with id 4732 containing the group.
    this one command does the trick
    get-eventlog -logname security -instanceid 4732 -message *administrators*
    https://technet.microsoft.com/en-us/library/dd772663(v=ws.10).aspx
    MCP/MCSA/MCTS/MCITP

  • List users in local admin group on all workstations

    Hi, I created a script that is supposed to query workstations and list all users in the local admin group. I originally used "test-connection" for logging purposes but it caused an issues when the computer responded but dns was incorrect for
    that pc so i would get a false list of local admin members on that workstation. I changed to a wmi query instead and queried the system name using that so If the system name matched the workstation name being queried then write it is supposed to write to a
    csv. For some reason, when i use $wmi.name as the variable, it does not work. What am i missing?
        $CurrentDate = Get-Date
        $CurrentDate = $CurrentDate.ToString('MM-dd-yyyy_hh-mm-ss')
        import-module activedirectory
         $servers= get-content "C:\Scripts\AD Audits\Local Admin\workstations.txt"
         $output = "c:\temp\local admin audit $CurrentDate.csv"
         $results = @()
         $servers | ForEach-Object{
        $wmi = gwmi win32_ComputerSystem -ComputerName $_ -ErrorAction SilentlyContinue
        $connected = Test-Connection $_ -Count 1 -Quiet -ErrorAction SilentlyContinue
        $state = if($wmi.name -eq '$_') {"$_ Verified"} else {"$_ did not respond"}
        $state | Out-File -Append "c:\temp\LocalAdmin log $CurrentDate.txt"
        $group =[ADSI]"WinNT://$_/Administrators,group"
        $members = $group.Members() | ForEach-Object {$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_,   $null) }
        if($wmi)
           New-Object PSObject -Property @{
               DistinguishedName = (Get-ADComputer $_).DistinguishedName
               Server = $_
               Members = $members -join ";"
        } | Export-Csv $Output -NoTypeInformation

    I agree use GP it is more reliable and easier to manage.
    For the sake of demonstration of how this can be don here is how most of us would be likely todo this or a very close variation.
    There is no issue with using Test-Connection and DNS.  AD/DNS cannot have the wrong names or your domain would crash.  Using Get-AdCOmputer instead of a file eliminates stale information.
    $csvfile="c:\temp\local admin audit $([DateTime]::Now.ToString('MM-dd-yyyy_hh-mm-ss')).csv"
    import-module activedirectory
    #adjust Filter as needed
    $adfilter='OperatingSystem -like "Windows 7*" -or OperatingSystem -like "Windows XP*"'
    Get-AdComputer -Filter $adfilter |
    ForEach-Object{
    $props=@{
    Server=$_.Name
    IsAlive=$false
    DistinguishedName=$_.DistinguishedName
    Members=$null
    if(Test-Connection $_.Name -Count 1 -Quiet){
    $props.IsAlive=$true
    $group =[ADSI]"WinNT://$($_.Name)/Administrators,group"
    $members=$group.Members() |
    ForEach-Object{
    $_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)
    $props.Members=$members -join ";"
    New-Object PSObject -Property $props
    } |
    Export-Csv $csvfile -NoTypeInformation
    Use GP and you won't have to be bothered with all of these techy details that usually require a Network Admin to sort out.
    ¯\_(ツ)_/¯

  • Powershell add group to local admin group

    how do I remotely use powershell to add a domain group to the local admin group on a machine?
    thanks

    When using above, I got:
    [DBG]: PS C:\>> $remoteComputer = 'xxx.xxx.xxx.xxx'
    [DBG]: PS C:\>> $groupname = 'Admin-Group'
    [DBG]: PS C:\>> $fqdn = 'subdomain.domain.com'
    [DBG]: PS C:\>> ([ADSI]"WinNT://$remoteComputer/Administrators,group").Add("WinNT://$fqdn/$groupName"):
    Exception calling "Add" with "1" argument(s): "Access is denied.
    At line:1 char:1
    + ([ADSI]"WinNT://$remoteComputer/Administrators,group").Add("WinNT://$fqdn/$group ...
    + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo : NotSpecified: (:) [], MethodInvocationException
    + FullyQualifiedErrorId : CatchFromBaseAdapterMethodInvokeTI
    I am wondering how $remoteComputer authenticate?

  • Need to Query Local Admin Group

    I wrote (copied) some PowerShell code that will add a Domain User to the Local Admin Group using ADSI.  
    $GuestPC = "WinNT://DOMAIN/UserName,user"
    $AdminGroup = [ADSI]("WinNT://"+$env:COMPUTERNAME+"/administrators,group")
    $AdminGroup.add($GuestPC)
    I want to add an If - Else statement to check if the Domain User is already in the Administrators group.  
    I found this code:
    $members = @($AdminGroup.psbase.Invoke("Members"))
    $members | foreach {$_.GetType().InvokeMember("Name", 'GetProperty', $null, $_, $null)}
    This code actually lists the members of the Administrators Group.  Maybe its early or I did not get enough sleep, but I cannot figure out how to just query the Administators group for $GuestPC and if it is there don't do anything, but if it is not there
    add it using the above code.  
    Something easy for someone out there I hope?
    Matt
    Matt Dillon

    Finally found the answer on Google.  Just need to add -cnotcontains "GuestPC" in side a If-Then
    Matt Dillon

  • Add Local Users to the Local Admin Group

    I am looking either via GPO or Third Party Tool.  I would like to add 6 Users to the Local Admin Groups on all the computers running Windows 7/8.  I want to Create a Group called "OUR Local Admins" and add these 6 local users (Not domain
    Users) to this Group and then nest this Group into the Local Admin Group Built-in into Windows 8
    Thank u

    > local users (Not domain Users) to this Group and then nest this Group
    > into the Local Admin Group Built-in into Windows 8
    You cannot nest local groups.
    Greetings/Grüße,
    Martin
    Mal ein
    gutes Buch über GPOs lesen?
    Good or bad GPOs? - my blog…
    And if IT bothers me -
    coke bottle design refreshment (-:

  • Adding a domain user to Local Admin Groups using MDT 2012

    I don't know if this will help anyone, but it did me after weeks of searching.  If you are trying to add a domain user or domain groups to the local administrators group using MDT, simply go to the cs.ini and add "SkipAdminAccounts=No". 
    But the administrators accounts page will only appear if you choose to join a domain. 

    Correct, if you were to go into the %DeployRoot%\Scripts\DeployWiz_Definition_ENU.xml file you would see the entry for the DeployWiz_AdminAccounts.xml page as follows:
    <Pane id="AdministratorAccounts" reference="DeployWiz_AdminAccounts.xml">
    <Condition><![CDATA[ UCase(Property("SkipAdminAccounts")) = "NO" and UCase(Property("DeploymentType"))<>"REPLACE" and Property("DeploymentType")<>"CUSTOM" and Property("JoinDomain") <> "" ]]></Condition>
    </Pane>
    Most Wizard Pages are displayed by default, and you can turn them off by using the SkipXxxXxxxxx Page variable to hide them during wizard execution. This page is different, since it was added for MDT 2012, the MDT team decided to leave it *OFF* by default,
    instead you must explicitly turn off the SkipAdminAccounts variable by setting it to "NO".
    Additionally, you would not need to display this page if you were running a Refresh or a Custom Task Sequence.
    Finally, this page does not actually *create* accounts, instead it just adds pre-existing user accounts and adds them to the local Administrators group. This scenario is only valid when you are joining the machine to a domain, so you must Join to the Domain.
    If you are interested in adding other local users to the Administrators Group, you should write a script to create the account(s) and add them to the local group. Windows 8.1 has some *gotchas* that have to do with Microsoft Accounts, but that's a different
    Story :^).
    Keith Garner - keithga.wordpress.com

  • Com.apple.Server.Accounts error 2 - Local Network Group problem

    I am lost :-)
    just to specify, this is not a production server, it is just a learning platform for me.
    I did a format and start over my server configuration
    in order
    DNS
    DHCP
    Open Directory
    Profile Manager
    User and group
    File Sharing
    very basic config.
    Somewhere during user and group something happen
    I did create a new Local Network Group and 2 Local Network User, me and a Directory admin
    but now, when I create a group, it seem I can only create local group
    and I can't edit Local Network Group
    Local Group -> no problem
    I can edit Local Group. I can add member
    or I can go to a member and add it to a Local Group even if the user is a Local Network User
    it work
    Local Network Group -> does not work
    I can't edit Local Network Group, can't add member
    if i go the same Local Network user I added to local group and try to add it to a Local Network group, I get this error
    com.apple.Server.Accounts error 2
    I dont know where I went wrong :-)
    any idea
    Thank you

    I just reformat and restart the configuration :-(   but I might have the same problem again, so i hope to understand why it happened.
    I had the problem on both the server and a client machine.
    Part of the Local Network User and Groups were greyed out, so I could not edit them
    My airport setting for DNS was set to my server, so the client automatically got the local ip of the server for DNS.
    On the server, initially, the formatting DNS IP was so to my airport, then I changed it to the DNS of my Internet provider. 
    but for the self ip 127.0.0.1 i did saw it there at the begining but maybe when did change later it might have been affected.
    I did changed the System Preferences>Network setting to a fix IP even if my airport was set as the DHCP with a fix IP for the Mac Mini.
    I remember not seeing a DNS in that page. I will check for that now that I am about to start again.
    and also, I tried to change the DHCP to be from given from the Mac Mini (like I read in the book) but when I did a
    ipconfig getpacket en0
    it was still showing the airport as the DHCP server
    I will not set it this time.
    Thank you
    I will come back later with some update
    Thank you

  • SQL server 2012 does not see local disks other than C being started under domain account (which is local admin on the server)

    Hi all. We have a SQL Server 2012 installed to a fresh Windows Server 2012 Server. There is a service account domain\rusystem01 created to run SQL services. It is added as a Local administrator on this server.
    The issue is that SQL Server does not see any local drives (other than C drive) on the server if we run it from this domain service account (for example, we cannot move any databases to any other drives or setup backup).
    It works fine (and other drives ARE available) if SQL Services are started from Network service account or Local service account (which is not recommended by Microsoft). But does not work from domain account.
    Any ideas how to fix this?
    MCP

    >Any ideas how to fix this?
    Apply NTFS ACLs for the folders (and perhaps volumes*) for SQL Server.  Use the Per-Service SID, rather than the Service Account for the ACLs so they survive changing the service account. 
    The per-service SID is "NT Service\MSSQLSERVER" for a default instance and "NT Service\MSSQL$InstanceName" for a named instance.
    *Volume ACLs are set in Disk Management.
    David
    David http://blogs.msdn.com/b/dbrowne/
    David, would you please clarify what do you propose? I open D: volume on the Disk management and grant NT Service\MSSQL$DEV account with Full control permissions. Restarted SQL - no effect. Still only C: is visible for SQL.
    MCP

Maybe you are looking for

  • How to browse the directories on deployed war-files?

    Ciao! When I deploy a war-file on tomcat I can browse the directories e.g. I would like to see all the files in the jsp folder. Is it possible to get this under weblogic? Thanks and Nice greetings! Ciao

  • Mail in 10.4.6

    upgraded from 10.3.9 to 10.4 and then to 10.4.6 (repairing permissions etc as I went). Mail seems more sluggish in 10.4.6; i tried sending anemail with a large attachment (7.6Mb), but after 8 minutes gave up and sent it using my older powerMac 7300 a

  • Option-close-all-windows causes Finder crash in 10.7.x

    Ever since I installed Lion last year on another iMac, and now on my current iMac, whenever I hold down option and click the red close button on a Finder window to close all open windows, the Finder crashes. It doesn't happen every single time, but e

  • First PKGBUILD for review

    Hello, since this is the first package I've created, I thought it would be best to have it reviewed before submitting it to the AUR. Thank you! PKGBUILD: # Maintainer: Jeremey Hustman <jeremeyhustman at gmail daught com> pkgname=cflint-git _gitname=C

  • JScript error in Window script block for SharePoint web part

    I am getting a runtime JScript error while trying to execute my web part. I assume that this error may be occuring because I am trying to assign a Javascript function to a SPMenuField.NavigateUrlFormat property. I have tried modifying the AllowedProt