Определение местоположения сервисов, работающих как учетная запись Пользователя Active Directory

Учетная запись "Сетевой службы" не имеет полномочий администраторского уровня по умолчанию; это - то, для чего "Локальная Система" учетная запись. "Сетевая служба" была представлена, наряду с "Локальной службой", точно поэтому: имейте сервисные учетные записи без полных административных привилегий в системе.

1
задан 21 January 2013 в 16:10
3 ответа

Scan the Security event log on every computer looking for a logon of that user account.

1
ответ дан 3 December 2019 в 21:37

Perhaps the easiest way is to enable successful login auditing on your domain controllers, then search through the logs for the user you're looking for.

Couple side notes:

  • Service accounts should have some sort of logical structure to their name. Microsoft recommends the format Vendor$Product$Server. So if you have Acme's FooBar running on Server01, then the service account name should be Acme$FooBar$Server01.
  • You should keep track of all your service accounts, and where they are used. This can easily be a simple spreadsheet (Google Docs, LibreOffice, whatever are all free). At a minimum it should keep track of the account names, intended use, last password change, and the servers/services that use them.
  • Passwords should be incredibly long an complex, I use a KeePass to generate 32 letter "goop". This way the password doesn't need to be changed as often. Changing passwords guards against a few things, none of which should readily apply to a service account with a good password.
  • You should review your business practices on a regular basis to ensure they aren't causing more trouble than they're worth. Practices should be justified, most of which are easy.

Terminology:

  • A "service account" is any user account, could be the "Administrator" account or any other, which is being used by an process that automatically logs in (most commonly services running on server, hence the name).
  • Active Directory is the system that keeps the user accounts, including passwords. It does not run as a user, the accounts are not used "within" it. The accounts are used by other programs.
  • Windows has no "root" account. There is a "Administrator" account that was setup when AD was first configured, but it's not special in the way that "root" is special on *nix environments. This "Administrator" account can be completely replaced with relative easy in Windows.
1
ответ дан 3 December 2019 в 21:37

Вы просматриваете журналы для пользователя (как упомянуто) или, альтернативно, вы просто меняете пароль и смотрите, что ломается. Легче / быстрее искать ошибки аудита и блокировки учетных записей, чем успешные входы в систему, и есть некоторые инструменты MS, которые вы можете использовать для отслеживания блокировок учетных записей при загрузке .

0
ответ дан 3 December 2019 в 21:37

Теги

Похожие вопросы