mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 20:03:40 +00:00
Merge branch 'main' into v-tappelgate-CI-164475
This commit is contained in:
@ -10,7 +10,7 @@ ms.collection:
|
||||
- highpri
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 02/28/2019
|
||||
ms.date: 06/17/2022
|
||||
---
|
||||
|
||||
# Local Accounts
|
||||
@ -21,13 +21,13 @@ ms.date: 02/28/2019
|
||||
- Windows Server 2019
|
||||
- Windows Server 2016
|
||||
|
||||
This reference topic for IT professionals describes the default local user accounts for servers, including how to manage these built-in accounts on a member or standalone server.
|
||||
This reference article for IT professionals describes the default local user accounts for servers, including how to manage these built-in accounts on a member or standalone server.
|
||||
|
||||
## <a href="" id="about-local-user-accounts-"></a>About local user accounts
|
||||
|
||||
Local user accounts are stored locally on the server. These accounts can be assigned rights and permissions on a particular server, but on that server only. Local user accounts are security principals that are used to secure and manage access to the resources on a standalone or member server for services or users.
|
||||
|
||||
This topic describes the following:
|
||||
This article describes the following:
|
||||
|
||||
- [Default local user accounts](#sec-default-accounts)
|
||||
|
||||
@ -57,9 +57,9 @@ For information about security principals, see [Security Principals](security-pr
|
||||
|
||||
The default local user accounts are built-in accounts that are created automatically when you install Windows.
|
||||
|
||||
After Windows is installed, the default local user accounts cannot be removed or deleted. In addition, default local user accounts do not provide access to network resources.
|
||||
After Windows is installed, the default local user accounts can't be removed or deleted. In addition, default local user accounts don't provide access to network resources.
|
||||
|
||||
Default local user accounts are used to manage access to the local server’s resources based on the rights and permissions that are assigned to the account. The default local user accounts, and the local user accounts that you create, are located in the Users folder. The Users folder is located in the Local Users and Groups folder in the local Computer Management Microsoft Management Console (MMC). Computer Management is a collection of administrative tools that you can use to manage a single local or remote computer. For more information, see [How to manage local accounts](#sec-manage-accounts) later in this topic.
|
||||
Default local user accounts are used to manage access to the local server’s resources based on the rights and permissions that are assigned to the account. The default local user accounts, and the local user accounts that you create, are located in the Users folder. The Users folder is located in the Local Users and Groups folder in the local Computer Management Microsoft Management Console (MMC). Computer Management is a collection of administrative tools that you can use to manage a single local or remote computer. For more information, see [How to manage local accounts](#sec-manage-accounts) later in this article.
|
||||
|
||||
Default local user accounts are described in the following sections.
|
||||
|
||||
@ -69,23 +69,23 @@ The default local Administrator account is a user account for the system adminis
|
||||
|
||||
The Administrator account has full control of the files, directories, services, and other resources on the local computer. The Administrator account can create other local users, assign user rights, and assign permissions. The Administrator account can take control of local resources at any time simply by changing the user rights and permissions.
|
||||
|
||||
The default Administrator account cannot be deleted or locked out, but it can be renamed or disabled.
|
||||
The default Administrator account can't be deleted or locked out, but it can be renamed or disabled.
|
||||
|
||||
From Windows 10, Windows 11 and Windows Server 2016, Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group. Members of the Administrators groups can run apps with elevated permissions without using the **Run as Administrator** option. Fast User Switching is more secure than using Runas or different-user elevation.
|
||||
|
||||
**Account group membership**
|
||||
|
||||
By default, the Administrator account is installed as a member of the Administrators group on the server. It is a best practice to limit the number of users in the Administrators group because members of the Administrators group on a local server have Full Control permissions on that computer.
|
||||
By default, the Administrator account is installed as a member of the Administrators group on the server. It's a best practice to limit the number of users in the Administrators group because members of the Administrators group on a local server have Full Control permissions on that computer.
|
||||
|
||||
The Administrator account cannot be deleted or removed from the Administrators group, but it can be renamed.
|
||||
The Administrator account can't be deleted or removed from the Administrators group, but it can be renamed.
|
||||
|
||||
**Security considerations**
|
||||
|
||||
Because the Administrator account is known to exist on many versions of the Windows operating system, it is a best practice to disable the Administrator account when possible to make it more difficult for malicious users to gain access to the server or client computer.
|
||||
Because the Administrator account is known to exist on many versions of the Windows operating system, it's a best practice to disable the Administrator account when possible to make it more difficult for malicious users to gain access to the server or client computer.
|
||||
|
||||
You can rename the Administrator account. However, a renamed Administrator account continues to use the same automatically assigned security identifier (SID), which can be discovered by malicious users. For more information about how to rename or disable a user account, see [Disable or activate a local user account](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732112(v=ws.11)) and [Rename a local user account](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc725595(v=ws.11)).
|
||||
|
||||
As a security best practice, use your local (non-Administrator) account to sign in and then use **Run as administrator** to accomplish tasks that require a higher level of rights than a standard user account. Do not use the Administrator account to sign in to your computer unless it is entirely necessary. For more information, see [Run a program with administrative credentials](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732200(v=ws.11)).
|
||||
As a security best practice, use your local (non-Administrator) account to sign in and then use **Run as administrator** to accomplish tasks that require a higher level of rights than a standard user account. Don't use the Administrator account to sign in to your computer unless it's entirely necessary. For more information, see [Run a program with administrative credentials](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc732200(v=ws.11)).
|
||||
|
||||
In comparison, on the Windows client operating system, a user with a local user account that has Administrator rights is considered the system administrator of the client computer. The first local user account that is created during installation is placed in the local Administrators group. However, when multiple users run as local administrators, the IT staff has no control over these users or their client computers.
|
||||
|
||||
@ -99,7 +99,7 @@ In this case, Group Policy can be used to enable secure settings that can contro
|
||||
|
||||
### <a href="" id="sec-guest"></a>Guest account
|
||||
|
||||
The Guest account is disabled by default on installation. The Guest account lets occasional or one-time users, who do not have an account on the computer, temporarily sign in to the local server or client computer with limited user rights. By default, the Guest account has a blank password. Because the Guest account can provide anonymous access, it is a security risk. For this reason, it is a best practice to leave the Guest account disabled, unless its use is entirely necessary.
|
||||
The Guest account is disabled by default on installation. The Guest account lets occasional or one-time users, who don't have an account on the computer, temporarily sign in to the local server or client computer with limited user rights. By default, the Guest account has a blank password. Because the Guest account can provide anonymous access, it's a security risk. For this reason, it's a best practice to leave the Guest account disabled, unless its use is entirely necessary.
|
||||
|
||||
**Account group membership**
|
||||
|
||||
@ -107,26 +107,26 @@ By default, the Guest account is the only member of the default Guests group (SI
|
||||
|
||||
**Security considerations**
|
||||
|
||||
When enabling the Guest account, only grant limited rights and permissions. For security reasons, the Guest account should not be used over the network and made accessible to other computers.
|
||||
When enabling the Guest account, only grant limited rights and permissions. For security reasons, the Guest account shouldn't be used over the network and made accessible to other computers.
|
||||
|
||||
In addition, the guest user in the Guest account should not be able to view the event logs. After the Guest account is enabled, it is a best practice to monitor the Guest account frequently to ensure that other users cannot use services and other resources, such as resources that were unintentionally left available by a previous user.
|
||||
In addition, the guest user in the Guest account shouldn't be able to view the event logs. After the Guest account is enabled, it's a best practice to monitor the Guest account frequently to ensure that other users can't use services and other resources. This includes resources that were unintentionally left available by a previous user.
|
||||
|
||||
## <a href="" id="sec-helpassistant"></a>HelpAssistant account (installed with a Remote Assistance session)
|
||||
|
||||
|
||||
The HelpAssistant account is a default local account that is enabled when a Remote Assistance session is run. This account is automatically disabled when no Remote Assistance requests are pending.
|
||||
|
||||
HelpAssistant is the primary account that is used to establish a Remote Assistance session. The Remote Assistance session is used to connect to another computer running the Windows operating system, and it is initiated by invitation. For solicited remote assistance, a user sends an invitation from their computer, through e-mail or as a file, to a person who can provide assistance. After the user’s invitation for a Remote Assistance session is accepted, the default HelpAssistant account is automatically created to give the person who provides assistance limited access to the computer. The HelpAssistant account is managed by the Remote Desktop Help Session Manager service.
|
||||
HelpAssistant is the primary account that is used to establish a Remote Assistance session. The Remote Assistance session is used to connect to another computer running the Windows operating system, and it's initiated by invitation. For solicited remote assistance, a user sends an invitation from their computer, through e-mail or as a file, to a person who can provide assistance. After the users invitation for a Remote Assistance session is accepted, the default HelpAssistant account is automatically created to give the person who provides assistance limited access to the computer. The HelpAssistant account is managed by the Remote Desktop Help Session Manager service.
|
||||
|
||||
**Security considerations**
|
||||
|
||||
The SIDs that pertain to the default HelpAssistant account include:
|
||||
|
||||
- SID: S-1-5-<domain>-13, display name Terminal Server User. This group includes all users who sign in to a server with Remote Desktop Services enabled. Note that, in Windows Server 2008, Remote Desktop Services are called Terminal Services.
|
||||
- SID: S-1-5-<domain>-13, display name Terminal Server User. This group includes all users who sign in to a server with Remote Desktop Services enabled. Note: In Windows Server 2008, Remote Desktop Services are called Terminal Services.
|
||||
|
||||
- SID: S-1-5-<domain>-14, display name Remote Interactive Logon. This group includes all users who connect to the computer by using a remote desktop connection. This group is a subset of the Interactive group. Access tokens that contain the Remote Interactive Logon SID also contain the Interactive SID.
|
||||
|
||||
For the Windows Server operating system, Remote Assistance is an optional component that is not installed by default. You must install Remote Assistance before it can be used.
|
||||
For the Windows Server operating system, Remote Assistance is an optional component that isn't installed by default. You must install Remote Assistance before it can be used.
|
||||
|
||||
For details about the HelpAssistant account attributes, see the following table.
|
||||
|
||||
@ -140,14 +140,14 @@ For details about the HelpAssistant account attributes, see the following table.
|
||||
|Default members|None|
|
||||
|Default member of|Domain Guests<br/><br/>Guests|
|
||||
|Protected by ADMINSDHOLDER?|No|
|
||||
|Safe to move out of default container?|Can be moved out, but we do not recommend it.|
|
||||
|Safe to move out of default container?|Can be moved out, but we don't recommend it.|
|
||||
|Safe to delegate management of this group to non-Service admins?|No|
|
||||
|
||||
### DefaultAccount
|
||||
|
||||
The DefaultAccount, also known as the Default System Managed Account (DSMA), is a built-in account introduced in Windows 10 version 1607 and Windows Server 2016.
|
||||
The DSMA is a well-known user account type.
|
||||
It is a user neutral account that can be used to run processes that are either multi-user aware or user-agnostic.
|
||||
It's a user neutral account that can be used to run processes that are either multi-user aware or user-agnostic.
|
||||
The DSMA is disabled by default on the desktop SKUs (full windows SKUs) and WS 2016 with the Desktop.
|
||||
|
||||
The DSMA has a well-known RID of 503. The security identifier (SID) of the DSMA will thus have a well-known SID in the following format: S-1-5-21-\<ComputerIdentifier>-503
|
||||
@ -167,24 +167,24 @@ Today, Xbox automatically signs in as Guest account and all apps run in this con
|
||||
All the apps are multi-user-aware and respond to events fired by user manager.
|
||||
The apps run as the Guest account.
|
||||
|
||||
Similarly, Phone auto logs in as a “DefApps” account which is akin to the standard user account in Windows but with a few extra privileges. Brokers, some services and apps run as this account.
|
||||
Similarly, Phone auto logs in as a “DefApps” account, which is akin to the standard user account in Windows but with a few extra privileges. Brokers, some services and apps run as this account.
|
||||
|
||||
In the converged user model, the multi-user-aware apps and multi-user-aware brokers will need to run in a context different from that of the users.
|
||||
For this purpose, the system creates DSMA.
|
||||
|
||||
#### How the DefaultAccount gets created on domain controllers
|
||||
|
||||
If the domain was created with domain controllers that run Windows Server 2016, the DefaultAccount will exist on all domain controllers in the domain.
|
||||
If the domain was created with domain controllers that run an earlier version of Windows Server, the DefaultAccount will be created after the PDC Emulator role is transferred to a domain controller that runs Windows Server 2016. The DefaultAccount will then be replicated to all other domain controllers in the domain.
|
||||
If the domain was created with domain controllers running Windows Server 2016, the DefaultAccount will exist on all domain controllers in the domain.
|
||||
If the domain was created with domain controllers running an earlier version of Windows Server, the DefaultAccount will be created after the PDC Emulator role is transferred to a domain controller that runs Windows Server 2016. The DefaultAccount will then be replicated to all other domain controllers in the domain.
|
||||
|
||||
#### Recommendations for managing the Default Account (DSMA)
|
||||
|
||||
Microsoft does not recommend changing the default configuration, where the account is disabled. There is no security risk with having the account in the disabled state. Changing the default configuration could hinder future scenarios that rely on this account.
|
||||
Microsoft doesn't recommend changing the default configuration, where the account is disabled. There's no security risk with having the account in the disabled state. Changing the default configuration could hinder future scenarios that rely on this account.
|
||||
|
||||
## <a href="" id="sec-localsystem"></a>Default local system accounts
|
||||
|
||||
### SYSTEM
|
||||
The SYSTEM account is used by the operating system and by services that run under Windows. There are many services and processes in the Windows operating system that need the capability to sign in internally, such as during a Windows installation. The SYSTEM account was designed for that purpose, and Windows manages the SYSTEM account’s user rights. It is an internal account that does not show up in User Manager, and it cannot be added to any groups.
|
||||
The SYSTEM account is used by the operating system and by services running under Windows. There are many services and processes in the Windows operating system that need the capability to sign in internally, such as during a Windows installation. The SYSTEM account was designed for that purpose, and Windows manages the SYSTEM account’s user rights. It's an internal account that doesn't show up in User Manager, and it can't be added to any groups.
|
||||
|
||||
On the other hand, the SYSTEM account does appear on an NTFS file system volume in File Manager in the **Permissions** portion of the **Security** menu. By default, the SYSTEM account is granted Full Control permissions to all files on an NTFS volume. Here the SYSTEM account has the same functional rights and permissions as the Administrator account.
|
||||
|
||||
@ -200,22 +200,22 @@ The LOCAL SERVICE account is a predefined local account used by the service cont
|
||||
## <a href="" id="sec-manage-accounts"></a>How to manage local user accounts
|
||||
|
||||
|
||||
The default local user accounts, and the local user accounts that you create, are located in the Users folder. The Users folder is located in Local Users and Groups. For more information about creating and managing local user accounts, see [Manage Local Users](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731899(v=ws.11)).
|
||||
The default local user accounts, and the local user accounts you create, are located in the Users folder. The Users folder is located in Local Users and Groups. For more information about creating and managing local user accounts, see [Manage Local Users](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731899(v=ws.11)).
|
||||
|
||||
You can use Local Users and Groups to assign rights and permissions on the local server, and that server only, to limit the ability of local users and groups to perform certain actions. A right authorizes a user to perform certain actions on a server, such as backing up files and folders or shutting down a server. An access permission is a rule that is associated with an object, usually a file, folder, or printer. It regulates which users can have access to an object on the server and in what manner.
|
||||
You can use Local Users and Groups to assign rights and permissions on only the local server to limit the ability of local users and groups to perform certain actions. A right authorizes a user to perform certain actions on a server, such as backing up files and folders or shutting down a server. An access permission is a rule that is associated with an object, usually a file, folder, or printer. It regulates which users can have access to an object on the server and in what manner.
|
||||
|
||||
You cannot use Local Users and Groups on a domain controller. However, you can use Local Users and Groups on a domain controller to target remote computers that are not domain controllers on the network.
|
||||
You can't use Local Users and Groups on a domain controller. However, you can use Local Users and Groups on a domain controller to target remote computers that aren't domain controllers on the network.
|
||||
|
||||
> [!NOTE]
|
||||
> You use Active Directory Users and Computers to manage users and groups in Active Directory.
|
||||
|
||||
You can also manage local users by using NET.EXE USER and manage local groups by using NET.EXE LOCALGROUP, or by using a variety of PowerShell cmdlets and other scripting technologies.
|
||||
You can also manage local users by using NET.EXE USER and manage local groups by using NET.EXE LOCALGROUP, or by using various PowerShell cmdlets and other scripting technologies.
|
||||
|
||||
### <a href="" id="sec-restrict-protect-accounts"></a>Restrict and protect local accounts with administrative rights
|
||||
|
||||
An administrator can use a number of approaches to prevent malicious users from using stolen credentials, such as a stolen password or password hash, for a local account on one computer from being used to authenticate on another computer with administrative rights; this is also called "lateral movement".
|
||||
An administrator can use many approaches to prevent malicious users from using stolen credentials such as a stolen password or password hash, for a local account on one computer from being used to authenticate on another computer with administrative rights. This is also called "lateral movement".
|
||||
|
||||
The simplest approach is to sign in to your computer with a standard user account, instead of using the Administrator account for tasks, for example, to browse the Internet, send email, or use a word processor. When you want to perform an administrative task, for example, to install a new program or to change a setting that affects other users, you don't have to switch to an Administrator account. You can use User Account Control (UAC) to prompt you for permission or an administrator password before performing the task, as described in the next section.
|
||||
The simplest approach is to sign in to your computer with a standard user account, instead of using the Administrator account for tasks. For example, use a standard account to browse the Internet, send email, or use a word processor. When you want to perform administrative tasks such as installing a new program or changing a setting that affects other users, you don't have to switch to an Administrator account. You can use User Account Control (UAC) to prompt you for permission or an administrator password before performing the task, as described in the next section.
|
||||
|
||||
The other approaches that can be used to restrict and protect user accounts with administrative rights include:
|
||||
|
||||
@ -240,16 +240,18 @@ UAC makes it possible for an account with administrative rights to be treated as
|
||||
|
||||
In addition, UAC can require administrators to specifically approve applications that make system-wide changes before those applications are granted permission to run, even in the administrator's user session.
|
||||
|
||||
For example, a default feature of UAC is shown when a local account signs in from a remote computer by using Network logon (for example, by using NET.EXE USE). In this instance, it is issued a standard user token with no administrative rights, but without the ability to request or receive elevation. Consequently, local accounts that sign in by using Network logon cannot access administrative shares such as C$, or ADMIN$, or perform any remote administration.
|
||||
For example, a default feature of UAC is shown when a local account signs in from a remote computer by using Network logon (for example, by using NET.EXE USE). In this instance, it's issued a standard user token with no administrative rights, but without the ability to request or receive elevation. Consequently, local accounts that sign in by using Network logon can't access administrative shares such as C$, or ADMIN$, or perform any remote administration.
|
||||
|
||||
For more information about UAC, see [User Account Control](/windows/access-protection/user-account-control/user-account-control-overview).
|
||||
|
||||
The following table shows the Group Policy and registry settings that are used to enforce local account restrictions for remote access.
|
||||
|
||||
<!-- MicrosoftDocs/windows-itpro-docs/issues/7146 start line 254-->
|
||||
|
||||
|No.|Setting|Detailed Description|
|
||||
|--- |--- |--- |
|
||||
||Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options|
|
||||
|1|Policy name|[User Account Control: Run all administrators in Admin Approval Mode](/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode)|
|
||||
|1|Policy name|[User Account Control: Admin Approval Mode for the Built-in Administrator account](/windows/security/threat-protection/security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account)|
|
||||
||Policy setting|Enabled|
|
||||
|2|Policy location|Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options|
|
||||
||Policy name|[User Account Control: Run all administrators in Admin Approval Mode](/windows/device-security/security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode)|
|
||||
@ -262,7 +264,6 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
> [!NOTE]
|
||||
> You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates.
|
||||
|
||||
|
||||
#### To enforce local account restrictions for remote access
|
||||
|
||||
1. Start the **Group Policy Management** Console (GPMC).
|
||||
@ -281,7 +282,7 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
|
||||

|
||||
|
||||
6. Ensure that UAC is enabled and that UAC restrictions apply to the default Administrator account by doing the following:
|
||||
6. Ensure that UAC is enabled and that UAC restrictions apply to the default Administrator account by following these steps:
|
||||
|
||||
1. Navigate to the Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\, and > **Security Options**.
|
||||
|
||||
@ -289,7 +290,7 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
|
||||
3. Double-click **User Account Control: Admin Approval Mode for the Built-in Administrator account** > **Enabled** > **OK**.
|
||||
|
||||
7. Ensure that the local account restrictions are applied to network interfaces by doing the following:
|
||||
7. Ensure that the local account restrictions are applied to network interfaces by following these steps:
|
||||
|
||||
1. Navigate to Computer Configuration\\Preferences and Windows Settings, and > **Registry**.
|
||||
|
||||
@ -301,7 +302,7 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
|
||||
4. Ensure that the **Hive** box is set to **HKEY\_LOCAL\_MACHINE**.
|
||||
|
||||
5. Click (**…**), browse to the following location for **Key Path** > **Select** for: **SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System**.
|
||||
5. Select (**…**), browse to the following location for **Key Path** > **Select** for: **SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System**.
|
||||
|
||||
6. In the **Value name** area, type **LocalAccountTokenFilterPolicy**.
|
||||
|
||||
@ -321,7 +322,7 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
|
||||

|
||||
|
||||
3. Select the GPO that you just created, and > **OK**.
|
||||
3. Select the GPO that you created, and > **OK**.
|
||||
|
||||
9. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy.
|
||||
|
||||
@ -331,7 +332,7 @@ The following table shows the Group Policy and registry settings that are used t
|
||||
|
||||
### <a href="" id="sec-deny-network-logon"></a>Deny network logon to all local Administrator accounts
|
||||
|
||||
Denying local accounts the ability to perform network logons can help prevent a local account password hash from being reused in a malicious attack. This procedure helps to prevent lateral movement by ensuring that the credentials for local accounts that are stolen from a compromised operating system cannot be used to compromise additional computers that use the same credentials.
|
||||
Denying local accounts the ability to perform network logons can help prevent a local account password hash from being reused in a malicious attack. This procedure helps to prevent lateral movement by ensuring that stolen credentials for local accounts from a compromised operating system can't be used to compromise other computers that use the same credentials.
|
||||
|
||||
> [!NOTE]
|
||||
> To perform this procedure, you must first identify the name of the local, default Administrator account, which might not be the default user name "Administrator", and any other accounts that are members of the local Administrators group.
|
||||
@ -357,7 +358,7 @@ The following table shows the Group Policy settings that are used to deny networ
|
||||
|
||||
3. In the console tree, right-click **Group Policy Objects**, and > **New**.
|
||||
|
||||
4. In the **New GPO** dialog box, type <**gpo\_name**>, and then > **OK** where *gpo\_name* is the name of the new GPO indicates that it is being used to restrict the local administrative accounts from interactively signing in to the computer.
|
||||
4. In the **New GPO** dialog box, type <**gpo\_name**>, and then > **OK** where *gpo\_name* is the name of the new GPO indicates that it's being used to restrict the local administrative accounts from interactively signing in to the computer.
|
||||
|
||||

|
||||
|
||||
@ -371,15 +372,15 @@ The following table shows the Group Policy settings that are used to deny networ
|
||||
|
||||
2. Double-click **Deny access to this computer from the network**.
|
||||
|
||||
3. Click **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
||||
3. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
||||
|
||||
7. Configure the user rights to deny Remote Desktop (Remote Interactive) logons for administrative local accounts as follows:
|
||||
|
||||
1. Navigate to Computer Configuration\\Policies\\Windows Settings and Local Policies, and then click **User Rights Assignment**.
|
||||
1. Navigate to Computer Configuration\\Policies\\Windows Settings and Local Policies, and then select **User Rights Assignment**.
|
||||
|
||||
2. Double-click **Deny log on through Remote Desktop Services**.
|
||||
|
||||
3. Click **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
||||
3. Select **Add User or Group**, type **Local account and member of Administrators group**, and > **OK**.
|
||||
|
||||
8. Link the GPO to the first **Workstations** OU as follows:
|
||||
|
||||
@ -387,7 +388,7 @@ The following table shows the Group Policy settings that are used to deny networ
|
||||
|
||||
2. Right-click the **Workstations** OU, and > **Link an existing GPO**.
|
||||
|
||||
3. Select the GPO that you just created, and > **OK**.
|
||||
3. Select the GPO that you created, and > **OK**.
|
||||
|
||||
9. Test the functionality of enterprise applications on the workstations in that first OU and resolve any issues caused by the new policy.
|
||||
|
||||
@ -401,9 +402,9 @@ The following table shows the Group Policy settings that are used to deny networ
|
||||
|
||||
### <a href="" id="sec-create-unique-passwords"></a>Create unique passwords for local accounts with administrative rights
|
||||
|
||||
Passwords should be unique per individual account. While this is generally true for individual user accounts, many enterprises have identical passwords for common local accounts, such as the default Administrator account. This also occurs when the same passwords are used for local accounts during operating system deployments.
|
||||
Passwords should be unique per individual account. While it's true for individual user accounts, many enterprises have identical passwords for common local accounts, such as the default Administrator account. This also occurs when the same passwords are used for local accounts during operating system deployments.
|
||||
|
||||
Passwords that are left unchanged or changed synchronously to keep them identical add a significant risk for organizations. Randomizing the passwords mitigates "pass-the-hash" attacks by using different passwords for local accounts, which hampers the ability of malicious users to use password hashes of those accounts to compromise other computers.
|
||||
Passwords that are left unchanged or changed synchronously to keep them identical add a significant risk for organizations. Randomizing the passwords mitigates "pass-the-hash" attacks by using different passwords for local accounts, which hamper the ability of malicious users to use password hashes of those accounts to compromise other computers.
|
||||
|
||||
Passwords can be randomized by:
|
||||
|
||||
|
@ -16,15 +16,15 @@ ms.reviewer:
|
||||
# Special Identities
|
||||
|
||||
**Applies to**
|
||||
- Windows Server 2016 or later
|
||||
|
||||
- Windows Server 2016 or later
|
||||
|
||||
This reference topic for the IT professional describes the special identity groups (which are sometimes referred to as security groups) that are used in Windows access control.
|
||||
|
||||
Special identity groups are similar to Active Directory security groups as listed in the users and built-in containers. Special identity groups can provide an efficient way to assign access to resources in your network. By using special identity groups, you can:
|
||||
|
||||
- Assign user rights to security groups in Active Directory.
|
||||
|
||||
- Assign permissions to security groups for the purpose of accessing resources.
|
||||
- Assign user rights to security groups in Active Directory.
|
||||
- Assign permissions to security groups for the purpose of accessing resources.
|
||||
|
||||
Servers that are running the supported Windows Server operating systems designated in the **Applies To** list at the beginning of this topic include several special identity groups. These special identity groups do not have specific memberships that can be modified, but they can represent different users at different times, depending on the circumstances.
|
||||
|
||||
@ -34,61 +34,47 @@ For information about security groups and group scope, see [Active Directory Sec
|
||||
|
||||
The special identity groups are described in the following tables:
|
||||
|
||||
- [Anonymous Logon](#anonymous-logon)
|
||||
|
||||
- [Authenticated Users](#authenticated-users)
|
||||
|
||||
- [Batch](#batch)
|
||||
|
||||
- [Creator Group](#creator-group)
|
||||
|
||||
- [Creator Owner](#creator-owner)
|
||||
|
||||
- [Dialup](#dialup)
|
||||
|
||||
- [Digest Authentication](#digest-authentication)
|
||||
|
||||
- [Enterprise Domain Controllers](#enterprise-domain-controllers)
|
||||
|
||||
- [Everyone](#everyone)
|
||||
|
||||
- [Interactive](#interactive)
|
||||
|
||||
- [Local Service](#local-service)
|
||||
|
||||
- [LocalSystem](#localsystem)
|
||||
|
||||
- [Network](#network)
|
||||
|
||||
- [Network Service](#network-service)
|
||||
|
||||
- [NTLM Authentication](#ntlm-authentication)
|
||||
|
||||
- [Other Organization](#other-organization)
|
||||
|
||||
- [Principal Self](#principal-self)
|
||||
|
||||
- [Remote Interactive Logon](#remote-interactive-logon)
|
||||
|
||||
- [Restricted](#restricted)
|
||||
|
||||
- [SChannel Authentication](#schannel-authentication)
|
||||
|
||||
- [Service](#service)
|
||||
|
||||
- [Terminal Server User](#terminal-server-user)
|
||||
|
||||
- [This Organization](#this-organization)
|
||||
|
||||
- [Window Manager\\Window Manager Group](#window-managerwindow-manager-group)
|
||||
- [Anonymous Logon](#anonymous-logon)
|
||||
- [Attested Key Property](#attested-key-property)
|
||||
- [Authenticated Users](#authenticated-users)
|
||||
- [Authentication Authority Asserted Identity](#authentication-authority-asserted-identity)
|
||||
- [Batch](#batch)
|
||||
- [Console Logon](#console-logon)
|
||||
- [Creator Group](#creator-group)
|
||||
- [Creator Owner](#creator-owner)
|
||||
- [Dialup](#dialup)
|
||||
- [Digest Authentication](#digest-authentication)
|
||||
- [Enterprise Domain Controllers](#enterprise-domain-controllers)
|
||||
- [Everyone](#everyone)
|
||||
- [Fresh Public Key Identity](#fresh-public-key-identity)
|
||||
- [Interactive](#interactive)
|
||||
- [IUSR](#iusr)
|
||||
- [Key Trust](#key-trust)
|
||||
- [Local Service](#local-service)
|
||||
- [LocalSystem](#localsystem)
|
||||
- [MFA Key Property](#mfa-key-property)
|
||||
- [Network](#network)
|
||||
- [Network Service](#network-service)
|
||||
- [NTLM Authentication](#ntlm-authentication)
|
||||
- [Other Organization](#other-organization)
|
||||
- [Owner Rights](#owner-rights)
|
||||
- [Principal Self](#principal-self)
|
||||
- [Proxy](#proxy)
|
||||
- [Remote Interactive Logon](#remote-interactive-logon)
|
||||
- [Restricted](#restricted)
|
||||
- [SChannel Authentication](#schannel-authentication)
|
||||
- [Service](#service)
|
||||
- [Service Asserted Identity](#service-asserted-identity)
|
||||
- [Terminal Server User](#terminal-server-user)
|
||||
- [This Organization](#this-organization)
|
||||
- [Window Manager\\Window Manager Group](#window-managerwindow-manager-group)
|
||||
|
||||
## Anonymous Logon
|
||||
|
||||
|
||||
Any user who accesses the system through an anonymous logon has the Anonymous Logon identity. This identity allows anonymous access to resources, such as a web page that is published on corporate servers. The Anonymous Logon group is not a member of the Everyone group by default.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-7 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -96,11 +82,10 @@ Any user who accesses the system through an anonymous logon has the Anonymous Lo
|
||||
|
||||
## Attested Key Property
|
||||
|
||||
|
||||
A SID that means the key trust object had the attestation property.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-6 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -108,11 +93,10 @@ A SID that means the key trust object had the attestation property.
|
||||
|
||||
## Authenticated Users
|
||||
|
||||
|
||||
Any user who accesses the system through a sign-in process has the Authenticated Users identity. This identity allows access to shared resources within the domain, such as files in a shared folder that should be accessible to all the workers in the organization. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-11 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -120,11 +104,10 @@ Any user who accesses the system through a sign-in process has the Authenticated
|
||||
|
||||
## Authentication Authority Asserted Identity
|
||||
|
||||
|
||||
A SID that means the client's identity is asserted by an authentication authority based on proof of possession of client credentials.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-1 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -132,11 +115,10 @@ A SID that means the client's identity is asserted by an authentication authorit
|
||||
|
||||
## Batch
|
||||
|
||||
|
||||
Any user or process that accesses the system as a batch job (or through the batch queue) has the Batch identity. This identity allows batch jobs to run scheduled tasks, such as a nightly cleanup job that deletes temporary files. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-3 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -144,11 +126,10 @@ Any user or process that accesses the system as a batch job (or through the batc
|
||||
|
||||
## Console Logon
|
||||
|
||||
|
||||
A group that includes users who are logged on to the physical console. This SID can be used to implement security policies that grant different rights based on whether a user has been granted physical access to the console.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-2-1 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -156,13 +137,12 @@ A group that includes users who are logged on to the physical console. This SID
|
||||
|
||||
## Creator Group
|
||||
|
||||
|
||||
The person who created the file or the directory is a member of this special identity group. Windows Server operating systems use this identity to automatically grant access permissions to the creator of a file or directory.
|
||||
|
||||
A placeholder security identifier (SID) is created in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object’s current owner. The primary group is used only by the Portable Operating System Interface for UNIX (POSIX) subsystem.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-3-1 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -170,11 +150,10 @@ A placeholder security identifier (SID) is created in an inheritable access cont
|
||||
|
||||
## Creator Owner
|
||||
|
||||
|
||||
The person who created the file or the directory is a member of this special identity group. Windows Server operating systems use this identity to automatically grant access permissions to the creator of a file or directory. A placeholder SID is created in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the object’s current owner.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-3-0 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -182,11 +161,10 @@ The person who created the file or the directory is a member of this special ide
|
||||
|
||||
## Dialup
|
||||
|
||||
|
||||
Any user who accesses the system through a dial-up connection has the Dial-Up identity. This identity distinguishes dial-up users from other types of authenticated users.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-1 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -194,9 +172,8 @@ Any user who accesses the system through a dial-up connection has the Dial-Up id
|
||||
|
||||
## Digest Authentication
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-64-21 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -204,11 +181,10 @@ Any user who accesses the system through a dial-up connection has the Dial-Up id
|
||||
|
||||
## Enterprise Domain Controllers
|
||||
|
||||
|
||||
This group includes all domain controllers in an Active Directory forest. Domain controllers with enterprise-wide roles and responsibilities have the Enterprise Domain Controllers identity. This identity allows them to perform certain tasks in the enterprise by using transitive trusts. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-9 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -216,15 +192,14 @@ This group includes all domain controllers in an Active Directory forest. Domain
|
||||
|
||||
## Everyone
|
||||
|
||||
|
||||
All interactive, network, dial-up, and authenticated users are members of the Everyone group. This special identity group gives wide access to system resources. Whenever a user logs on to the network, the user is automatically added to the Everyone group.
|
||||
|
||||
On computers running Windows 2000 and earlier, the Everyone group included the Anonymous Logon group as a default member, but as of Windows Server 2003, the Everyone group contains only Authenticated Users and Guest; and it no longer includes Anonymous Logon by default (although this can be changed, using Registry Editor, by going to the **Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa** key and setting the value of **everyoneincludesanonymous** DWORD to 1).
|
||||
On computers running Windows 2000 and earlier, the Everyone group included the Anonymous Logon group as a default member, but as of Windows Server 2003, the Everyone group contains only Authenticated Users and Guest; and it no longer includes Anonymous Logon by default (although this can be changed, using Registry Editor, by going to the **Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa** key and setting the value of **everyoneincludesanonymous** DWORD to 1).
|
||||
|
||||
Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-1-0 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -232,11 +207,10 @@ Membership is controlled by the operating system.
|
||||
|
||||
## Fresh Public Key Identity
|
||||
|
||||
|
||||
A SID that means the client's identity is asserted by an authentication authority based on proof of current possession of client public key credentials.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-3 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -244,11 +218,10 @@ A SID that means the client's identity is asserted by an authentication authorit
|
||||
|
||||
## Interactive
|
||||
|
||||
|
||||
Any user who is logged on to the local system has the Interactive identity. This identity allows only local users to access a resource. Whenever a user accesses a given resource on the computer to which they are currently logged on, the user is automatically added to the Interactive group. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-4 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -256,11 +229,10 @@ Any user who is logged on to the local system has the Interactive identity. This
|
||||
|
||||
## IUSR
|
||||
|
||||
|
||||
Internet Information Services (IIS) uses this account by default whenever anonymous authentication is enabled.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-17 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -268,11 +240,10 @@ Internet Information Services (IIS) uses this account by default whenever anonym
|
||||
|
||||
## Key Trust
|
||||
|
||||
|
||||
A SID that means the client's identity is based on proof of possession of public key credentials using the key trust object.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-4 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -280,11 +251,10 @@ A SID that means the client's identity is based on proof of possession of public
|
||||
|
||||
## Local Service
|
||||
|
||||
|
||||
The Local Service account is similar to an Authenticated User account. The Local Service account has the same level of access to resources and objects as members of the Users group. This limited access helps safeguard your system if individual services or processes are compromised. Services that run as the Local Service account access network resources as a null session with anonymous credentials. The name of the account is NT AUTHORITY\\LocalService. This account does not have a password.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-19 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -292,12 +262,10 @@ The Local Service account is similar to an Authenticated User account. The Local
|
||||
|
||||
## LocalSystem
|
||||
|
||||
|
||||
This is a service account that is used by the operating system. The LocalSystem account is a powerful account that has full access to the system and acts as the computer on the network. If a service logs on to the LocalSystem account on a domain controller, that service has access to the entire domain. Some services are configured by default to log on to the LocalSystem account. Do not change the default service setting. The name of the account is LocalSystem. This account does not have a password.
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-18 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -305,11 +273,10 @@ This is a service account that is used by the operating system. The LocalSystem
|
||||
|
||||
## MFA Key Property
|
||||
|
||||
|
||||
A SID that means the key trust object had the multifactor authentication (MFA) property.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-5 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -320,7 +287,7 @@ A SID that means the key trust object had the multifactor authentication (MFA) p
|
||||
This group implicitly includes all users who are logged on through a network connection. Any user who accesses the system through a network has the Network identity. This identity allows only remote users to access a resource. Whenever a user accesses a given resource over the network, the user is automatically added to the Network group. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-2 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -328,11 +295,10 @@ This group implicitly includes all users who are logged on through a network con
|
||||
|
||||
## Network Service
|
||||
|
||||
|
||||
The Network Service account is similar to an Authenticated User account. The Network Service account has the same level of access to resources and objects as members of the Users group. This limited access helps safeguard your system if individual services or processes are compromised. Services that run as the Network Service account access network resources by using the credentials of the computer account. The name of the account is NT AUTHORITY\\NetworkService. This account does not have a password.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-20 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -340,9 +306,8 @@ The Network Service account is similar to an Authenticated User account. The Net
|
||||
|
||||
## NTLM Authentication
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-64-10 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -350,11 +315,10 @@ The Network Service account is similar to an Authenticated User account. The Net
|
||||
|
||||
## Other Organization
|
||||
|
||||
|
||||
This group implicitly includes all users who are logged on to the system through a dial-up connection. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-1000 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -362,11 +326,10 @@ This group implicitly includes all users who are logged on to the system through
|
||||
|
||||
## Owner Rights
|
||||
|
||||
|
||||
A group that represents the current owner of the object. When an ACE that carries this SID is applied to an object, the system ignores the implicit READ_CONTROL and WRITE_DAC permissions for the object owner.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-3-4 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -374,11 +337,10 @@ A group that represents the current owner of the object. When an ACE that carrie
|
||||
|
||||
## Principal Self
|
||||
|
||||
|
||||
This identity is a placeholder in an ACE on a user, group, or computer object in Active Directory. When you grant permissions to Principal Self, you grant them to the security principal that is represented by the object. During an access check, the operating system replaces the SID for Principal Self with the SID for the security principal that is represented by the object.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-10 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -386,11 +348,10 @@ This identity is a placeholder in an ACE on a user, group, or computer object in
|
||||
|
||||
## Proxy
|
||||
|
||||
|
||||
Identifies a SECURITY_NT_AUTHORITY Proxy.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-8 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -398,11 +359,10 @@ Identifies a SECURITY_NT_AUTHORITY Proxy.
|
||||
|
||||
## Remote Interactive Logon
|
||||
|
||||
|
||||
This identity represents all users who are currently logged on to a computer by using a Remote Desktop connection. This group is a subset of the Interactive group. Access tokens that contain the Remote Interactive Logon SID also contain the Interactive SID.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-14|
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -410,11 +370,10 @@ This identity represents all users who are currently logged on to a computer by
|
||||
|
||||
## Restricted
|
||||
|
||||
|
||||
Users and computers with restricted capabilities have the Restricted identity. This identity group is used by a process that is running in a restricted security context, such as running an application with the RunAs service. When code runs at the Restricted security level, the Restricted SID is added to the user’s access token.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-12 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -422,9 +381,8 @@ Users and computers with restricted capabilities have the Restricted identity. T
|
||||
|
||||
## SChannel Authentication
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-64-14 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -432,12 +390,10 @@ Users and computers with restricted capabilities have the Restricted identity. T
|
||||
|
||||
## Service
|
||||
|
||||
|
||||
Any service that accesses the system has the Service identity. This identity group includes all security principals that are signed in as a service. This identity grants access to processes that are being run by Windows Server services. Membership is controlled by the operating system.
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-6 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -445,11 +401,10 @@ Any service that accesses the system has the Service identity. This identity gro
|
||||
|
||||
## Service Asserted Identity
|
||||
|
||||
|
||||
A SID that means the client's identity is asserted by a service.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-18-2 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -457,11 +412,10 @@ A SID that means the client's identity is asserted by a service.
|
||||
|
||||
## Terminal Server User
|
||||
|
||||
|
||||
Any user accessing the system through Terminal Services has the Terminal Server User identity. This identity allows users to access Terminal Server applications and to perform other necessary tasks with Terminal Server services. Membership is controlled by the operating system.
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-13 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
@ -469,18 +423,17 @@ Any user accessing the system through Terminal Services has the Terminal Server
|
||||
|
||||
## This Organization
|
||||
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-15 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
|Default User Rights| None |
|
||||
|Default User Rights| None |
|
||||
|
||||
## Window Manager\\Window Manager Group
|
||||
|
||||
| Attribute | Value |
|
||||
| :--: | :--: |
|
||||
| :--: | :--: |
|
||||
| Well-Known SID/RID | S-1-5-90 |
|
||||
|Object Class| Foreign Security Principal|
|
||||
|Default Location in Active Directory |cn=WellKnown Security Principals, cn=Configuration, dc=\<forestRootDomain\>|
|
||||
|
@ -63,7 +63,7 @@ sections:
|
||||
|
||||
- question: How does Windows Hello for Business work with Azure AD registered devices?
|
||||
answer: |
|
||||
A user will be prompted to set-up a Windows Hello for Business key on an Azure AD registered devices if the feature is enabled by policy. If the user has an existing Windows Hello container, the Windows Hello for Business key will be enrolled in that container and will be protected using their exiting gestures.
|
||||
A user will be prompted to set up a Windows Hello for Business key on an Azure AD registered devices if the feature is enabled by policy. If the user has an existing Windows Hello container, the Windows Hello for Business key will be enrolled in that container and will be protected using their exiting gestures.
|
||||
|
||||
If a user has signed into their Azure AD registered device with Windows Hello, their Windows Hello for Business key will be used to authenticate the user's work identity when they try to use Azure AD resources. The Windows Hello for Business key meets Azure AD multi-factor authentication (MFA) requirements and reduces the number of MFA prompts users will see when accessing resources.
|
||||
|
||||
@ -79,7 +79,7 @@ sections:
|
||||
answer: |
|
||||
It's currently possible to set a convenience PIN on Azure Active Directory Joined or Hybrid Active Directory Joined devices. Convenience PIN isn't supported for Azure Active Directory user accounts (synchronized identities included). It's only supported for on-premises Domain Joined users and local account users.
|
||||
|
||||
- question: Can I use an external Windows Hello compatible camera when my computer has a built in Windows Hello compatible camera?
|
||||
- question: Can I use an external Windows Hello compatible camera when my computer has a built-in Windows Hello compatible camera?
|
||||
answer: |
|
||||
Yes. Starting with Windows 10, version 21H1 an external Windows Hello compatible camera can be used if a device already supports an internal Windows Hello camera. When both cameras are present, the external camera is used for face authentication. For more information, see [IT tools to support Windows 10, version 21H1](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/it-tools-to-support-windows-10-version-21h1/ba-p/2365103). However, using external Hello cameras and accessories is restricted if ESS is enabled, please see [Windows Hello Enhanced Sign-in Security](https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/windows-hello-enhanced-sign-in-security#pluggableperipheral-biometric-sensors).
|
||||
|
||||
@ -101,14 +101,10 @@ sections:
|
||||
answer: |
|
||||
The user experience for Windows Hello for Business occurs after the user signs in, after you deploy Windows Hello for Business policy settings to your environment.
|
||||
|
||||
[Windows Hello for Business user enrollment experience](hello-videos.md#windows-hello-for-business-user-enrollment-experience)
|
||||
|
||||
- question: What happens when a user forgets their PIN?
|
||||
answer: |
|
||||
If the user can sign in with a password, they can reset their PIN by selecting the "I forgot my PIN" link in Settings. Beginning with Windows 10 1709, users can reset their PIN above the lock screen by selecting the "I forgot my PIN" link on the PIN credential provider.
|
||||
|
||||
[Windows Hello for Business forgotten PIN user experience](hello-videos.md#windows-hello-for-business-forgotten-pin-user-experience)
|
||||
|
||||
For on-premises deployments, devices must be well-connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can onboard their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs. Non-destructive PIN reset works without access to the corporate network. Destructive PIN reset requires access to the corporate network. For more details about destructive and non-destructive PIN reset, see [PIN reset](/windows/security/identity-protection/hello-for-business/hello-feature-pin-reset).
|
||||
|
||||
- question: What URLs do I need to allow for a hybrid deployment?
|
||||
|
@ -65,8 +65,6 @@ For Hybrid Azure AD-joined devices:
|
||||
|
||||
You may find that PIN reset from settings only works post login, and that the "lock screen" PIN reset function will not work if you have any matching limitation of SSPR password reset from the lock screen. For more information, see [Enable Azure Active Directory self-service password reset at the Windows sign-in screen - General ](/azure/active-directory/authentication/howto-sspr-windows#general-limitations).
|
||||
|
||||
Visit the [Windows Hello for Business Videos](./hello-videos.md) page and watch [Windows Hello for Business forgotten PIN user experience](./hello-videos.md#windows-hello-for-business-forgotten-pin-user-experience).
|
||||
|
||||
## Non-Destructive PIN reset
|
||||
|
||||
**Requirements:**
|
||||
|
@ -21,7 +21,7 @@ ms.reviewer:
|
||||
- Hybrid Deployment
|
||||
- Key trust
|
||||
|
||||
Windows Hello for Business deployments rely on certificates. Hybrid deployments uses publicly issued server authentication certificates to validate the name of the server to which they are connecting and to encrypt the data that flows them and the client computer.
|
||||
Windows Hello for Business deployments rely on certificates. Hybrid deployments use publicly issued server authentication certificates to validate the name of the server to which they are connecting and to encrypt the data that flows them and the client computer.
|
||||
|
||||
All deployments use enterprise issued certificates for domain controllers as a root of trust.
|
||||
|
||||
@ -79,11 +79,11 @@ The certificate template is configured to supersede all the certificate template
|
||||
|
||||
> [!NOTE]
|
||||
> The domain controller's certificate must chain to a root in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a third-party CA, this may not be done by default. If the domain controller certificate does not chain to a root in the NTAuth store, user authentication will fail.
|
||||
>you can view
|
||||
>To see all certificates in the NTAuth store, use the following command:
|
||||
>
|
||||
>'''powershell
|
||||
>Certutil -view
|
||||
>Publish Certificate Templates to a Certificate Authority
|
||||
> `Certutil -viewstore -enterprise NTAuth`
|
||||
|
||||
### Publish Certificate Templates to a Certificate Authority
|
||||
|
||||
The certificate authority may only issue certificates for certificate templates that are published to that certificate authority. If you have more than one certificate authority and you want that certificate authority to issue certificates based on a specific certificate template, then you must publish the certificate template to all certificate authorities that are expected to issue the certificate.
|
||||
|
||||
@ -95,7 +95,7 @@ Sign-in to the certificate authority or management workstations with an _enterpr
|
||||
4. Right-click the **Certificate Templates** node. Click **New**, and click **Certificate Template** to issue.
|
||||
5. In the **Enable Certificates Templates** window, select the **Domain Controller Authentication (Kerberos)** template you created in the previous steps. Click **OK** to publish the selected certificate templates to the certificate authority.
|
||||
6. If you published the **Domain Controller Authentication (Kerberos)** certificate template, then you should unpublish the certificate templates you included in the superseded templates list.
|
||||
* To unpublish a certificate template, right-click the certificate template you want to unpublish in the details pane of the Certificate Authority console and select **Delete**. Click **Yes** to confirm the operation.
|
||||
- To unpublish a certificate template, right-click the certificate template you want to unpublish in the details pane of the Certificate Authority console and select **Delete**. Click **Yes** to confirm the operation.
|
||||
7. Close the console.
|
||||
|
||||
### Unpublish Superseded Certificate Templates
|
||||
|
@ -8,8 +8,8 @@ manager: dansimp
|
||||
ms.collection: M365-identity-device-management
|
||||
ms.topic: article
|
||||
localizationpriority: medium
|
||||
ms.date: 08/19/2018
|
||||
ms.reviewer:
|
||||
ms.date: 07/26/2022
|
||||
ms.reviewer: paoloma
|
||||
---
|
||||
# Windows Hello for Business Videos
|
||||
|
||||
@ -46,22 +46,4 @@ Watch Matthew Palko and Ravi Vennapusa explain how Windows Hello for Business pr
|
||||
|
||||
Watch Matthew Palko and Ravi Vennapusa explain how Windows Hello for Business authentication works.
|
||||
|
||||
> [!VIDEO https://www.youtube.com/embed/WPmzoP_vMek]
|
||||
|
||||
## Windows Hello for Business user enrollment experience
|
||||
|
||||
The user experience for Windows Hello for Business occurs after user sign-in, after you deploy Windows Hello for Business policy settings to your environment.
|
||||
|
||||
> [!VIDEO https://www.youtube.com/embed/FJqHPTZTpNM]
|
||||
|
||||
</br>
|
||||
|
||||
> [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso]
|
||||
|
||||
## Windows Hello for Business forgotten PIN user experience
|
||||
|
||||
If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider.
|
||||
|
||||
> [!VIDEO https://www.youtube.com/embed/KcVTq8lTlkI]
|
||||
|
||||
For on-premises deployments, devices must be well connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can on-board their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs without access to their corporate network.
|
||||
> [!VIDEO https://www.youtube.com/embed/WPmzoP_vMek]
|
Reference in New Issue
Block a user