How to Prevent Standard Users from Joining Computers to an Active Directory Domain

preview_player
Показать описание
Learn how to block standard users from joining workstations or servers to an active directory domain. In this example, I show you how to create a security group, delegate permissions to that group so that they can create computer objects within an active directory, update the default domain controller group policy to only allow domain admins and the newly created security group to add devices to the domain, and reduce the number of devices a user account can add to the domain from 10 to 0 using ADSI edit.

Рекомендации по теме
Комментарии
Автор

Sometimes it's the smallest/quickest of config changes (like this one) that get overlooked.. This one change will harden your active directory and reduces the attack surface. Well done! 👏

jmesweeney
Автор

So glad I found your channel. I love the way you deliver content. So useful!!! Great work!

curtpainter
Автор

Well I never, thought a standard user can join a PC to a domain (Thought only domain admins can). Many thanks for this great well explained video.

IrlymMylros
Автор

I was just searching for this last night because I found a couple computers that were azure ad joined instead of hybrid joined. While this won't help with Azure I do want to implement this in our on prem. Thanks for this video. Any chance you can create a video to do the same thing in Azure? I'm assuming it's pretty easy but never hurts to have a video. Thanks for this video.

nottad
Автор

Hi Danny, how are you doing? I wanted to ask you what the ideal option is when creating GPO Policies. Should we create one policy and add all the settings into it, or should we make individual policies for the different settings? Please consider that the company size is medium, with an average of 200 employees. Thanks.

abdeenmostafa
Автор

Hi Danny, do you have any videos on setting up/configuring/best practices for Hyper-V server cluster for failover purposes?

syncj