Limiting exposure of Domain Service Accounts

Ensure that an NT domain-level service account is not allowed interactive logon with this tip.



This tip was submitted to the searchSecurity Tip Exchange by user Gord Taylor. Let other users know how useful it is by rating the tip below.

If you want to ensure that an NT domain-level service account is not allowed interactive logon, replace your default login script with LOGOFF.EXE - available in the NT Resource Kit - and ensure that the LOGOFF.EXE file is replicated to all domain controllers. By using the /F and /N parameters, as soon as someone attempts to interactively log on with this account, they will immediately be logged off.

While this isn't 100% fool-proof, it sure fools most people.


This was first published in November 2001

Dig Deeper

PRO+

Content

Find more PRO+ content and other member only offers, here.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close