Limiting exposure of Domain Service Accounts

Ensure that an NT domain-level service account is not allowed interactive logon with this tip.



This tip was submitted to the searchSecurity Tip Exchange by user Gord Taylor. Let other users know how useful it is by rating the tip below.

If you want to ensure that an NT domain-level service account is not allowed interactive logon, replace your default login script with LOGOFF.EXE - available in the NT Resource Kit - and ensure that the LOGOFF.EXE file is replicated to all domain controllers. By using the /F and /N parameters, as soon as someone attempts to interactively log on with this account, they will immediately be logged off.

While this isn't 100% fool-proof, it sure fools most people.


This was first published in November 2001

Dig deeper on Active Directory and LDAP Security

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close