Вы находитесь на странице: 1из 6

Active Directory

Delegated Permissions
Best Practices
Step 1: Create Roles and Assign
Responsibilities
The first thing you need to do is to create a set of administrator roles and assign them proper
responsibilities. Best practices suggest using the following roles:

Service administrators:

 Enterprise Admins — Responsible for top-level service administration across the enterprise. Should
contain no permanent members.

 Domain Admins — Responsible for top-level service administration across the domain. Should
contain only a small, manageable number of trusted administrators.

 Tier 4 Admins — Responsible for service administration across the domain. Granted only the rights
necessary to manage necessary services. Serve as an escalation point for data administrators.

Data administrators:

 Tier 1 Admins — Responsible for general management of directory objects, including performing
password resets, modifying user account properties, and so on.

 Tier 2 Admins — Responsible for the selective creation and deletion of user and computer accounts
for their locale or organization.

 Regional Admins — Responsible for the management of their local OU structure. Granted permissions
to create most objects within their OU.

 Tier 3 Admins — Responsible for management of all data administrators. Serve as top-tier help desk and
escalation point for all regional admins.

2
Step 2: Define OU Security Model
 Once roles are defined in the organization, you should define your OU and security group model. A
top-level OU (or series of OUs) should be created directly beneath the domain to house all objects.
This OU serves the specific purpose of defining the highest-level scope of management for the Tier 4
Admins. With a top-level OU in place, rights over the directory service can start explicitly at the OU
level rather than at the domain level.

 Below the top-level OUs, you should create separate sub-OU hierarchies to represent each region or
business unit that has a discrete data management team. Each regional sub-OU should have a
common, non-extensible OU hierarchy for management of directory objects.

 Finally, to prevent administrators from escalating their privileges, create separate sub-admin groups
— a Tier 1 Admins, a Tier 2 Admins and a Regional Admins group for each sub-OU hierarchy — and
put appropriate accounts in each group. Placing these accounts in separate OUs enables restriction
of management to their level or below.

Step 3: Establish a Delegation Model


 The key to a successful delegation model is enforcing the principle of least privilege. In practice, this
means that each security principal should have the ability to perform only the tasks required for its
given role and nothing more. Basically, all admins must normally log in as average users and use their
privilege rights only when they need them.

 To accomplish this without requiring the user to log off and back on, use the Secondary Logon service
(Runas.exe). This enables users to elevate their privileges by providing an alternate set of credentials
when executing scripts or other executables on servers and workstations.

 The final step in developing a delegation model is the actual delegation of rights within Active
Directory (AD). ACLs on Active Directory containers define what objects can be created and how those
objects are managed. Delegation of rights involves basic operations on objects, such as the ability to
view an object, create a child object of a specified class, or read attribute and security information on
objects of a specified class. Besides these basic operations, Active Directory defines Extended Rights,
which enable operations such as Send As and Manage Replication Topology.

3
How to Delegate Administrator
Privileges in Active Directory
The Delegation of Control Wizard provides an easy way to delegate active directory management. For
example, suppose you want members of the Help Desk group to be able to create, delete and manage user
accounts in the All Users OU in your AD domain. To do this, you need to perform these steps:

1. Open the Active Directory Users and Computers console.

2. Right-click the All Users OU and choose Delegate Control. Click the Next button to advance past the
wizard's welcome page.

3. On the wizard's Users or Groups page, click the Add button.

4. In the Select Users, Computers, or Groups dialog box, enter the group's name (Help Desk), click the
Check Names button to make sure the group's name is correct, and click OK.

5. After making sure the group's name is listed on the Users or Groups page, click Next.

6. On the Tasks to Delegate page, select "Create, delete, and manage user accounts" and click Next.

7. Verify the information in the final page of the wizard and click Finish.

4
Other AD Delegation Best Practices
 For delegation to be successful, OUs must be designed and implemented properly and the correct
objects (users, groups, computers) must be placed in them.

 Don't use built-in groups; they give privileges that are too wide in the domain. Your delegation design
must include the creation and location of new groups designed solely for delegation.

 Use nested OUs. There will be various levels of data administrators within AD. Some will be delegated
control over an entire data type, such as servers, and others might be given only a subset of a data
type, such as file servers. This hierarchy is established by creating OUs and sub-OUs, with the
delegated administration at the top having more privilege than those lower in the OU structure.

 Perform regular audits on who has been given delegated administrator privileges to different levels
in AD.

 Perform yearly audits on who has which AD delegate controls. There is a free tool to view delegated
permissions in Active Directory, it is called Netwrix Effective Permissions Reporting Tool.

About Netwrix
Netwrix Corporation is a software company focused exclusively on providing IT security and operations
teams with pervasive visibility into user behavior, system configurations and data sensitivity across hybrid IT
infrastructures to protect data regardless of its location. Over 9,000 organizations worldwide rely on Netwrix
to detect and proactively mitigate data security threats, pass compliance audits with less effort and expense,
and increase the productivity of their IT teams.

Founded in 2006, Netwrix has earned more than 140 industry awards and been named to both the Inc. 5000
and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S.
For more information about Netwrix, visit www.netwrix.com.

5
Keep a Close Eye
on AD Delegation
with Netwrix Auditor

Easily review the current state of delegated


permissions

Keep tabs on the delegation of rights


with the critical who, what, when and
where details and before and after values

Be notified about the most critical changes


to your delegation model as they happen

Simplify reporting with automated


subscriptions and a range of export options

Download Free 20-Day Trial

Corporate Headquarters: Phone: 1-949-407-5125


300 Spectrum Center Drive, Suite 200, Toll-free: 888-638-9749 netwrix.com/social
Irvine, CA 92618 EMEA: +44 (0) 203-588-3023

Вам также может понравиться