IT tutorials
 
Applications Server
 

Microsoft Lync Server 2010 : Firewall and Security Requirements - Securing Service Accounts

4/9/2013 9:42:23 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Most Microsoft applications use service accounts, and Lync Server is no exception. Although some applications use service accounts running as System or Network Service, many IT groups prefer to use named accounts for services. This often results in simplified management of permissions because accounts can use descriptive names and it makes it easier to apply local policies to these service accounts. It also enables you to create a single domain-based service account to use across multiple servers. This also makes it easier to ensure that rights are consistent across multiple servers in the same deployment. Regardless of the methodology used, it is worthwhile to put some effort toward securing the service accounts.

Caution

In too many environments, service accounts are given high-level rights to avoid taking the time to determine granular rights. Often in these situations, multiple members of IT are familiar with the logon name and password of these service accounts because they might be used for configuring certain applications. This results in multiple people having access to a high privilege account with no accountability because there is no way to know which person used the account. This is generally considered a bad idea for security.


Configuring Service Accounts with Least Privilege

As a general rule, when creating service accounts to work with applications, special care should be taken to ensure that the services have only the rights they need to do their jobs. Rather than simply making a service account a local administrator on a given server, take the time to determine what rights it actually needs and grant them through the Local Security Policy editor.

1.
Click Start, Administrative Tools, and Local Security Policy.

2.
Expand Local Policies.

3.
Click User Rights Assignment, as shown in Figure 1.

Figure 1. Viewing User Rights Assignment

4.
Choose a right that needs to be granted from the right pane and double-click it.

5.
On the Local Security Setting tab, click Add User or Group.

6.
Add the service account into the available window, and click Check Names. Click OK.

7.
Click OK again to grant the right.

Some local rights that are typically granted for applications include

  • Access this computer from the network

  • Allow log on locally

  • Back up files and directories

  • Generate security audits

  • Load and unload device drivers

  • Log on as a service

These types of granular rights can easily replace the need to make a service account a local administrator on a server. Coupling limited rights with a Managed Service Account can greatly reduce the possibility of a high privilege account from becoming comprimised and used to take control of a system.

Utilizing Managed Service Accounts for Lync Server

Active Directory 2008 R2 introduced a new type of service account known as a managed service account. Managed service accounts work like computer accounts in Active Directory. That is to say, they automatically rotate their passwords every 30 days, and they cannot be used by a person to interactively log in to a computer system. Managed service accounts are exceptionally useful for applications that require named accounts and have a need for heightened security.

To create a managed service account in Active Directory, you must use PowerShell:

1.
Click Start, Administrative Tools, and Active Directory Module for Windows PowerShell.

2.
Type New-ADServiceAccount MSAName–enabled $true.

This creates an MSA in the Managed Service Accounts OU called MSAName, as shown in Figure 2.

Figure 2. Creating a Managed Service Account

To use this MSA on a server, perform the following steps:

1.
Log on to the server that will use the MSA.

2.
Click Start, Administrative Tools, and Services.

3.
When prompted for permissions, click Continue.

4.
Right-click the service that will use the MSA and click Properties.

5.
Click Log On tab, click This Account, and type the name of the MSA in the format of domain\MSAname. Click OK.

6.
Select the service and click Start the Service. Verify that the MSA name appears in the Log On As column.

From this point forward, the service account updates its own password every 30 days, as a computer account does in Active Directory. This results in a secure password that isn’t known by any administrator on the network.

Note that only one computer can use a particular Managed Service Account, so if you have a need for multiple computers to use a Managed Service Account, configure one MSA per system that needs to use one.

 
Others
 
- Active Directory Lightweight Directory Services : Configuring and Using AD LDS (part 2) - Working with AD LDS Instances
- Active Directory Lightweight Directory Services : Configuring and Using AD LDS (part 1) - Working with AD LDS Tools, Creating AD LDS Instances
- Active Directory Lightweight Directory Services : Understanding and Installing AD LDS
- Microsoft Lync Server 2010 : Using Reverse Proxies with Lync Server (part 2) - Configuring TMG to Support Lync Server
- Microsoft Lync Server 2010 : Using Reverse Proxies with Lync Server (part 1) - Configuring ISA 2006 SP1 to Support Lync Server
- Microsoft Dynamics Ax 2009 : Programming Enterprise Portal Controls (part 4) - ViewState, Page Life Cycle, Proxy Classes
- Microsoft Dynamics Ax 2009 : Programming Enterprise Portal Controls (part 3) - Labels, Formatting, Error Handling
- Microsoft Dynamics Ax 2009 : Programming Enterprise Portal Controls (part 2) - Data, Metadata
- Microsoft Dynamics Ax 2009 : Programming Enterprise Portal Controls (part 1) - AJAX, Session, Context
- Microsoft Dynamics GP 2010 : Speeding up month-end processing with Reconcile to GL functionality
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us