User Account Management 240624 122444
User Account Management 240624 122444
User Account Management 240624 122444
At this stage, it is important to get familiar with some of the management tools an administrator
is likely to come across in the execution of their daily tasks.
Active Directory Users and Computers – This tool is typically used daily to manage Active
directory objects such as users, groups, computers and OUs. Users with expired passwords or
locked accounts are common in network set ups and this tool will help you reset their accounts
and get them back up and running.
Active Directory Sites and Services – This tool is used to manage sites, network topology,
replication and related services.
Active Directory Domains and Trusts – Useful tool for managing trust relationships and forest
functional level.
Active Directory Schema – This tool is not installed by default and used to manage the schema.
Command Line Tools – A collection of tools used for basic scripting and command line
management.
The arrival of Windows Server 2012 R2 saw some additional tools added by Microsoft to further
extend the functionality and management of the operating system.
Before we begin to create users on our server, some steps are required as by default the tools are
not readily in view. Click start to access the menu and right click on Active Directory Users and
Computers. This will become your most frequently used tool so it is advisable to pin it to your
task bar. Below the menu will be pull up options where you can choose to pin this tool for easy
access.
Here, you would see the domain you created along with a few other tools such as Builtin,
Computers, Domain Controllers, ForeignSecurityPrincipals, Managed Service Accounts and
Users which are extremely vital to administering resources on your server.
Right clicking on the Users tab on the left will drop down a menu, from which you can select
New > User to display the object screen as above. You will discover later as we explore servers
further, you can copy an existing user account to inherit permissions from the account such as
access to certain security groups.
Click next to choose a secure password for the user and notice the tick options; ‘User must
change password on next logon’, ‘User cannot change password’, ‘Password never
expires’ and ‘Account disabled’.
Now that we have a new user created, let’s take a closer look at the user object itself to get
familiar with some of the properties. Right Click the user we just created, and select Properties as
shown below.
1. General Tab: More information about the new user such as first and last name, contact details
and email address created on your Exchange server can be found here.
2. Address Tab: Further information about the new user such street number, post code and
country can be populated in this tab. Third party applications like Exclaimer could leverage this
for managing company signatures, something we shall learn about in advanced future lessons.
3. Member Of Tab: This tab reveals vital information about the security groups the user belongs
to. Notice you have the ability to add and remove groups specific to each user, to control the
resources they have access to in your server environment.
4. Organization Tab: You can further define your new user in this tab with job title, department
and company they work for. Click Apply for any changes made to take effect.
5. Account Tab: Administrators will find themselves in this tab a lot. User accounts can be
unlocked, password policy changes and account expiry dates can be set in this interface. User
logon domain and names when a client forgets their credentials are also present in this tab.
6. Logon Hours: Administrators may sometimes wish to set up a time frame during the week
when users can access the server. In the Account tab, Click Logon Hours to display the day days
and times when a user can be permitted or denied logon for security reasons.
7. Logon To: Another important and useful security feature is the ability to lock down the
workstations from which a user is allowed to access the server. Click Logon To in the Accounts
tab to add/remove computers designated for a particular user to logon, trying to access resources
from unassigned workstation will see the user authentication denied.
User Account Administrative Tasks
Server administrators in active environments will frequently get user related queries when there
is a problem accessing an account. Below, we’ll discuss some of the commonly known requests
and how to administer those tasks.
1. Copying An Existing User: This feature comes in handy when you have a new employee
starting at a department with existing users and resource permissions already assigned. Right
Click the user and select Copy from the menu to display the user object as below.
Populate the fields with your new user credentials including a strong password. Note that all
policies from the existing user will be inherited by the new user.
Double check the summary to ensure the existing user has been copied and click Finish.
You can confirm the new account has been created when you check the Member Of properties.
2. Resetting User Account Password: This task will most likely be the most requested task
from users to their administrators. Passwords may be set to expire after a period of time or users
may no longer be able to access their emails with the passwords they already have. In Active
Directory services, locate the user and Right Click on their object > Select Reset Password >
Type in new password > Apply.
3. Disabling An Active User Account: In the event an employee leaves the company,
administrators usually get a request from managers to delete the user account.
Bearing in mind that every active directory object carries a unique identifier, it is best practice to
disable the account, preventing the user from ever logging on until you are 100% sure the users’
email account for example will no longer be needed.
Right Click on the user in question and select Disable Account. You will be prompted to disable
the account and proceed with your action. Notice state of the object when disabled with
downward arrow.
You can always re-enable the account again by right clicking and selecting Enable Account
Creating Management Accounts for Protected Accounts and Groups in Active Directory
One of the challenges in implementing an Active Directory model that does not rely on
permanent membership in highly privileged groups is that there must be a mechanism to
populate these groups when temporary membership in the groups is required. Some privileged
identity management solutions require that the software’s service accounts are granted
permanent membership in groups such as DA or Administrators in each domain in the forest.
However, it is technically not necessary for Privileged Identity Management (PIM) solutions to
run their services in such highly privileged contexts.
This appendix provides information that you can use for natively implemented or third-party
PIM solutions to create accounts that have limited privileges and can be stringently controlled,
but can be used to populate privileged groups in Active Directory when temporary elevation is
required. If you are implementing PIM as a native solution, these accounts may be used by
administrative staff to perform the temporary group population, and if you’re implementing PIM
via third-party software, you might be able to adapt these accounts to function as service
accounts.
Note
The procedures described in this appendix provide one approach to the management of highly
privileged groups in Active Directory. You can adapt these procedures to suit your needs, add
additional restrictions, or omit some of the restrictions that are described here.
Creating Management Accounts for Protected Accounts and Groups in Active Directory
Creating accounts that can be used to manage the membership of privileged groups without
requiring the management accounts to be granted excessive rights and permissions consists of
four general activities that are described in the step-by-step instructions that follow:
1. First, you should create a group that will manage the accounts, because these accounts
should be managed by a limited set of trusted users. If you do not already have an OU
structure that accommodates segregating privileged and protected accounts and systems
from the general population in the domain, you should create one. Although specific
instructions are not provided in this appendix, screenshots show an example of such an OU
hierarchy.
2. Create the management accounts. These accounts should be created as “regular” user
accounts and granted no user rights beyond those that are already granted to users by
default.
3. Implement restrictions on the management accounts that make them usable only for the
specialized purpose for which they were created, in addition to controlling who can enable
and use the accounts (the group you created in the first step).
4. Configure permissions on the AdminSDHolder object in each domain to allow the
management accounts to change the membership of the privileged groups in the domain.
You should thoroughly test all of these procedures and modify them as needed for your
environment before implementing them in a production environment. You should also verify that
all settings work as expected (some testing procedures are provided in this appendix), and you
should test a disaster recovery scenario in which the management accounts are not available to
be used to populate protected groups for recovery purposes. For more information about backing
up and restoring Active Directory.
Note
By implementing the steps described in this appendix, you will create accounts that will be able
to manage the membership of all protected groups in each domain, not only the highest-privilege
Active Directory groups like EAs, DAs and BAs. For more information about protected groups
in Active Directory.
Management accounts should have their passwords reset at each use and should be disabled
when activities requiring them are complete. Although you might also consider implementing
smart card logon requirements for these accounts, it is an optional configuration and these
instructions assume that the management accounts will be configured with a user name and long,
complex password as minimum controls. In this step, you will create a group that has
permissions to reset password on the management accounts and to enable and disable the
accounts.
To create a group to enable and disable management accounts, perform the following steps:
1. In the OU structure where you will be housing the management accounts, right-click the
OU where you want to create the group, click New and click Group.
2. In the New Object – Group dialog box, enter a name for the group. If you plan to use this
group to “activate” all management accounts in your forest, make it a universal security
group. If you have a single-domain forest or if you plan to create a group in each domain,
you can create a global security group. Click OK to create the group.
3. Right-click the group you just created, click Properties, and click the Object tab. In the
group’s Object property dialog box, select Protect object from accidental deletion,
which will not only prevent otherwise-authorized users from deleting the group, but also
from moving it to another OU unless the attribute is first deselected.
Note
If you have already configured permissions on the group’s parent OUs to restrict
administration to a limited set of users, you may not need to perform the following steps.
They are provided here so that even if you have not yet implemented limited administrative
control over the OU structure in which you’ve created this group, you can secure the group
against modification by unauthorized users.
4. Click the Members tab, and add the accounts for members of your team who will be
responsible for enabling management accounts or populating protected groups when
necessary.
5. If you have not already done so, in the Active Directory Users and Computers console,
click View and select Advanced Features. Right-click the group you just created,
click Properties, and click the Security tab. On the Security tab, click Advanced.
6. In the Advanced Security Settings for [Group] dialog box, click Disable Inheritance.
When prompted, click Convert inherited permissions into explicit permissions on this
object, and click OK to return to the group’s Security dialog box.
7. On the Security tab, remove groups that should not be permitted to access this group. For
example, if you do not want Authenticated Users to be able to read the group’s name and
general properties, you can remove that ACE. You can also remove ACEs, such as those for
account operators and pre-Windows 2000 Server compatible access. You should, however,
leave a minimum set of object permissions in place. Leave the following ACEs intact:
o SELF
o SYSTEM
o Domain Admins
o Enterprise Admins
o Administrators
o Windows Authorization Access Group (if applicable)
o ENTERPRISE DOMAIN CONTROLLERS
Although it may seem counterintuitive to allow the highest privileged groups in Active
Directory to manage this group, your goal in implementing these settings is not to prevent
members of those groups from making authorized changes. Rather, the goal is to ensure that
when you have occasion to require very high levels of privilege, authorized changes will
succeed. It is for this reason that changing default privileged group nesting, rights, and
permissions are discouraged throughout this document. By leaving default structures intact
and emptying the membership of the highest privilege groups in the directory, you can
create a more secure environment that still functions as expected.
Note
If you have not already configured audit policies for the objects in the OU structure where
you created this group, you should configure auditing to log changes this group.
8. You have completed configuration of the group that will be used to “check out”
management accounts when they are needed and “check in” the accounts when their
activities have been completed.
Note
The steps in this document assume that you have not yet implemented role-based access controls
and privileged identity management for Active Directory. Therefore, some procedures must be
performed by a user whose account is a member of the Domain Admins group for the domain in
question.
When you are using an account with DA privileges, you can log on to a domain controller to
perform the configuration activities. Steps that do not require DA privileges can be performed by
less-privileged accounts that are logged on to administrative workstations. Screen shots that
show dialog boxes bordered in the lighter blue color represent activities that can be performed on
a domain controller. Screen shots that show dialog boxes in the darker blue color represent
activities that can be performed on administrative workstations with accounts that have limited
privileges.
1. Log on to a domain controller with an account that is a member of the domain’s DA group.
2. Launch Active Directory Users and Computers and navigate to the OU where you will be
creating the management account.
3. Right-click the OU and click New and click User.
4. In the New Object – User dialog box, enter your desired naming information for the
account and click Next.
5. Log on to a domain controller with an account that is a member of the domain’s DA group.
6. Launch Active Directory Users and Computers and navigate to the OU where you will be
creating the management account.
7. Right-click the OU and click New and click User.
8. In the New Object – User dialog box, enter your desired naming information for the
account and click Next.
9. Provide an initial password for the user account, clear User must change password at next
logon, select User cannot change password and Account is disabled, and click Next.
10. Verify that the account details are correct and click Finish.
11. Right-click the user object you just created and click Properties.
12. Click the Account tab.
13. In the Account Options field, select the Account is sensitive and cannot be
delegated flag, select the This account supports Kerberos AES 128 bit
encryption and/or the This account supports Kerberos AES 256 encryption flag, and
click OK.
Note
Because this account, like other accounts, will have a limited, but powerful function, the
account should only be used on secure administrative hosts. For all secure administrative
hosts in your environment, you should consider implementing the Group Policy
setting Network Security: Configure Encryption types allowed for Kerberos to allow
only the most secure encryption types you can implement for secure hosts.
Although implementing more secure encryption types for the hosts does not mitigate
credential theft attacks, the appropriate use and configuration of the secure hosts does.
Setting stronger encryption types for hosts that are only used by privileged accounts simply
reduces the overall attack surface of the computers.
For more information about configuring encryption types on systems and accounts,
see Windows Configurations for Kerberos Supported Encryption Type.
Note These settings are supported only on computers running Windows Server 2012,
Windows Server 2008 R2, Windows 8, or Windows 7.
14. On the Object tab, select Protect object from accidental deletion. This will not only
prevent the object from being deleted (even by authorized users), but will prevent it from
being moved to a different OU in your AD DS hierarchy, unless the check box is first
cleared by a user with permission to change the attribute.
Every object in Active Directory should have a designated IT owner and a designated
business owner, as described in Planning for Compromise. If you are tracking ownership
of AD DS objects in Active Directory (as opposed to an external database), you should
enter appropriate ownership information in this object’s properties.
In this case, the business owner is most likely an IT division, andthere is no prohibition on
business owners also being IT owners. The point of establishing ownership of objects is to
allow you to identify contacts when changes need to be made to the objects, perhaps years
from their initial creation.
It is unlikely that this account will be used to log on to read-only domain controllers
(RODCs) in your environment. However, should circumstance ever require the account to
log on to an RODC, you should add this account to the Denied RODC Password
Replication Group so that its password is not cached on the RODC.
Although the account’s password should be reset after each use and the account should be
disabled, implementing this setting does not have a deleterious effect on the account, and it
might help in situations in which an administrator forgets to reset the account’s password
and disable it.
27. In the Permission Entry for [Account] dialog box, click Select a principal and add the
group you created in the previous procedure. Scroll to the bottom of the dialog box and
click Clear all to remove all default permissions.
28. Scroll to the top of the Permission Entry dialog box. Ensure that the Type drop-down list
is set to Allow, and in the Applies to drop-down list, select This object only.
29. In the Permissions field, select Read all properties, Read permissions, and Reset
password.
30. In the Properties field, select Read userAccountControl and Write userAccountControl.
31. Click OK, OK again in the Advanced Security Settings dialog box.
Note
32. In the Group or user names field of the Security tab, remove any groups that should not
be permitted to access or manage the account. Do not remove any groups that have been
configured with Deny ACEs, such as the Everyone group and the SELF computed account
(that ACE was set when the user cannot change password flag was enabled during
creation of the account. Also do not remove the group you just added, the SYSTEM
account, or groups such as EA, DA, BA, or the Windows Authorization Access Group.
33. Click Advanced and verify that the Advanced Security Settings dialog box looks similar to
the following screenshot.
34. Click OK, and OK again to close the account’s property dialog box.
35. Setup of the first management account is now complete. You will test the account in a later
procedure.
You can create additional management accounts by repeating the previous steps, by copying the
account you just created, or by creating a script to create accounts with your desired
configuration settings. Note, however, that if you copy the account you just created, many of the
customized settings and ACLs will not be copied to the new account and you will have to repeat
most of the configuration steps.
You can instead create a group to which you delegate rights to populate and unpopulate
protected groups, but you will need to secure the group and the accounts you place in it. Because
there should be very few accounts in your directory that are granted the ability to manage the
membership of protected groups, creating individual accounts might be the simplest approach.
Regardless of how you choose to create a group into which you place the management accounts,
you should ensure that each account is secured as described earlier. You should also consider
implementing GPO restrictions similar to those described in : Securing Built-In Administrator
Accounts in Active Directory.
You should configure auditing on the account to log, at minimum, all writes to the account. This
will allow you to not only identify successful enabling of the account and resetting of its
password during authorized uses, but to also identify attempts by unauthorized users to
manipulate the account. Failed writes on the account should be captured in your Security
Information and Event Monitoring (SIEM) system (if applicable), and should trigger alerts that
provide notification to the staff responsible for investigating potential compromises.
SIEM solutions take event information from involved security sources (for example, event logs,
application data, network streams, antimalware products, and intrusion detection sources), collate
the data, and try to make intelligent views and proactive actions. There are many commercial
SIEM solutions, and many enterprises create private implementations. A well designed and
appropriately implemented SIEM can significantly enhance security monitoring and incident
response capabilities. However, capabilities and accuracy vary tremendously between solutions.
SIEMs are beyond the scope of this paper, but the specific event recommendations contained
should be considered by any SIEM implementer.
For more information about recommended audit configuration settings for domain controllers,
see Monitoring Active Directory for Signs of Compromise. Domain controller-specific
configuration settings are provided in Monitoring Active Directory for Signs of Compromise.
In this procedure, you will configure permissions on the domain’s AdminSDHolder object to
allow the newly created management accounts to modify the membership of protected groups in
the domain. This procedure cannot be performed via a graphical user interface (GUI).
the ACL on a domain’s AdminSDHolder object is effectively “copied” to protected objects when
the SDProp task runs. Protected groups and accounts do not inherit their permissions from the
AdminSDHolder object; their permissions are explicitly set to match those on the
AdminSDHolder object. Therefore, when you modify permissions on the AdminSDHolder
object, you must modify them for attributes that are appropriate to the type of the protected
object you are targeting.
In this case, you will be granting the newly created management accounts to allow them to read
and write the members attribute on group objects. However, the AdminSDHolder object is not a
group object and group attributes are not exposed in the graphical ACL editor. It is for this
reason that you will implement the permissions changes via the Dsacls command-line utility. To
grant the (disabled) management accounts permissions to modify the membership of protected
groups, perform the following steps:
1. Log on to a domain controller, preferably the domain controller holding the PDC Emulator
(PDCE) role, with the credentials of a user account that has been made a member of the DA
group in the domain.
2. Open an elevated command prompt by right-clicking Command Prompt and click Run as
administrator.
3. When prompted to approve the elevation, click Yes.
Note
For more information about elevation and user account control (UAC) in Windows,
see UAC Processes and Interactions on the TechNet website.
For more information about use of Dsacls, type Dsacls without any parameters at a
command prompt.
If you have created multiple management accounts for the domain, you should run the
Dsacls command for each account. When you have completed the ACL configuration on the
AdminSDHolder object, you should force SDProp to run, or wait until its scheduled run
completes. For information about forcing SDProp to run.
When SDProp has run, you can verify that the changes you made to the AdminSDHolder
object have been applied to protected groups in the domain. You cannot verify this by
viewing the ACL on the AdminSDHolder object for the reasons previously described, but
you can verify that the permissions have been applied by viewing the ACLs on protected
groups.
5. In Active Directory Users and Computers, verify that you have enabled Advanced
Features. To do so, click View, locate the Domain Admins group, right-click the group
and click Properties.
6. Click the Security tab and click Advanced to open the Advanced Security Settings for
Domain Admins dialog box.
7. Select Allow ACE for the management account and click Edit. Verify that the account
has been granted only Read Members and Write Members permissions on the DA group,
and click OK.
8. Click OK in the Advanced Security Settings dialog box, and click OK again to close the
property dialog box for the DA group.
9. You can repeat the previous steps for other protected groups in the domain; the permissions
should be the same for all protected groups. You have now completed creation and
configuration of the management accounts for the protected groups in this domain.
Note
Any account that has permission to write membership of a group in Active Directory can
also add itself to the group. This behavior is by design and cannot be disabled. For this
reason, you should always keep management accounts disabled when not in use, and should
closely monitor the accounts when they’re disabled and when they’re in use.
Now that you have created and configured management accounts that can modify the
membership of protected groups in the domain (which includes the most highly privileged EA,
DA, and BA groups), you should verify that the accounts and their management group have been
created properly. Verification consists of these general tasks:
1. Test the group that can enable and disable management accounts to verify that members of
the group can enable and disable the accounts and reset their passwords, but cannot perform
other administrative activities on the management accounts.
2. Test the management accounts to verify that they can add and remove members to protected
groups in the domain, but cannot change any other properties of protected accounts and
groups.
Test the Group that Will Enable and Disable Management Accounts
1. To test enabling a management account and resetting its password, log on to a secure
administrative workstation with an account that is a member of the group you created
in Creating a Group to Enable and Disable Management Accounts.
2. Open Active Directory Users and Computers, right-click the management account, and
click Enable Account.
3. A dialog box should display, confirming that the account has been enabled.
4. Next, reset the password on the management account. To do so, right-click the account
again and click Reset Password.
5. Type a new password for the account in the New password and Confirm password fields,
and click OK.
6. A dialog box should appear, confirming that the password for the account has been reset.
7. Now attempt to modify additional properties of the management account. Right-click the
account and click Properties, and click the Remote control tab.
8. Select Enable remote control and click Apply. The operation should fail and an Access
Denied error message should display.
9. Click the Account tab for the account and attempt to change the account’s name, logon
hours, or logon workstations. All should fail, and account options that are not controlled by
the userAccountControl attribute should be grayed out and unavailable for modification.
10. Attempt to add the management group to a protected group such as the DA group. When
you click OK, a message should appear, informing you that you do not have permissions to
modify the group.
11. Perform additional tests as required to verify that you cannot configure anything on the
management account except userAccountControl settings and password resets.
Note
Now that you have enabled one or more accounts that can change the membership of protected
groups, you can test the accounts to ensure that they can modify protected group membership,
but cannot perform other modifications on protected accounts and groups.
2. Launch Active Directory Users and Computers and locate the Domain Admins group.
3. Right-click the Domain Admins group and click Properties.
4. In the Domain Admins Properties, click the Members tab and click Add. Enter the name
of an account that will be given temporary Domain Admins privileges and click Check
Names. When the name of the account is underlined, click OK to return to
the Members tab.
5. On the Members tab for the Domain Admins Properties dialog box, click Apply. After
clicking Apply, the account should stay a member of the DA group and you should receive
no error messages.
6. Click the Managed By tab in the Domain Admins Properties dialog box and verify that
you cannot enter text in any fields and all buttons are grayed out.
7. Click the General tab in the Domain Admins Properties dialog box and verify that you
cannot modify any of the information about that tab.
8. Repeat these steps for additional protected groups as needed. When you have finished, log
on to a secure administrative host with an account that is a member of the group you created
to enable and disable the management accounts. Then reset the password on the
management account you just tested and disable the account. You have completed setup of
the management accounts and the group that will be responsible for enabling and disabling
the accounts.
In Active Directory Domain Services,…there are many different types of objects that
you…would be responsible for managing.…One of those types of objects is the computer
object.…Now a computer, similar to a user account,…is a security principle.…In other words we
talked about the user account…being the interface between Active Directory…and a physical
person, you know, an actual human being,…well the computer account is the interface
between…Active Directory and actual physical computer.…
Now to demonstrate a little bit about computer objects…I want to jump into one of my domain
controllers,…so I'm going to go over to DC1.…Here in the server manager in DC1, let's go
up…to the tools menu, and I'm going to jump down…to Active Directory users and
computers,…here in Active Directory users and computers…you'll see I have my domain, and if
I expand that,…there are a couple of containers that, by default,…automatically get computer
accounts.…One container would be the computers container,…that seems fairly obvious, and if I
click on it,…
How to Create Computer Objects in Active Directory for Windows Server 2016
In this lesson, you will learn what computer objects are in Windows Server 2016 Active
Directory. You will also learn how to create computer objects using the Active Directory Users
and Computers (ADUC) interface. Other options for creating computer objects such as Active
Directory Administrative Center (ADAC), PowerShell and Dsadd will also be discussed.
Once ADUC is opened, expand the domain. Computer objects can be created within
the Computers container or within an organizational unit. For this example, we are going to
create a computer named EXAMPLE01 within the computers container. To start, select
the Computers container in the left pane. Right-click and select New and then Computer from
the menu as shown below.
Once the New Computer dialog is displayed as shown below, input the computer
name EXAMPLE01. The name entered here is used to authenticate the computer's access to
domain resources and must match the name provided during Windows Setup. The Computer
name (pre-Windows 2000) property will auto-populate to match. This field is used to refer to a
domain configuration property called 'samAccountName'. The samAccountName is a Security
Account Manager name that is used for backward compatibility with older operating systems. In
most situations, these names will match.
It is a best practice to create a naming standard for computer objects so they are unique &
distinguishable from each other, for example named by their location within the building or for
which employee group (e.g. HR) the computers are assigned to.
In the User or group field, change the group that the computer should be a part of. This is done
by clicking the Change... button and then searching for the user or group to give access to the
computer. This user or group will be allowed to join the computer to the domain, even if they
wouldn't be able to otherwise. In most situations, computer objects should be a part of
the Domain Computers group, but other users and groups can be selected per any conditional
access requirements. Once finished, click OK.
************************************************************************