Compare cert salaries and plan your next career move
qwertyiop wrote: » I have to update all of the Local Administrator Passwords on my network. I have a logon script already in place to redirect our users desktops and my documents folders. I would like to add a few lines to my batch script to change the local admin password. Also would it be possible to add a condition like for it not to run if the computer is named "fs1"? Can someone please help me with this?
hypnotoad wrote: » One liner...make a .bat file: net user administrator %1 set this in group policy and pass your password as the parameter (from the GP console).
astorrs wrote: » It would be much better to use the script linked to by tiersten. Even better would be a script that generated a random password for each computer and wrote the output to a CSV file.
HeroPsycho wrote: » Technically better for security, but may cause difficulties to manage the computers. Setting them all to the same is easier to manage.
astorrs wrote: » How often do you find yourself needing the local admin password? The answer should be almost never. If someone compromises a single desktop/laptop on your environment and all computers (inc servers) have the same local admin password then they can technically compromise your entire network.
Claymoore wrote: » Which is why the local admin password on your servers should be blank (although good luck getting an auditor to sign off on that). Since you cannot connect to a network resource with a blank password, you have to physically be standing at the server's keyboard to access the server with a blank password. If your servers aren't in a secure area, no amount of password complexity can protect you.
Tyrant1919 wrote: » Never knew that, and I like it very much.
Claymoore wrote: » Which is why the local admin password on your servers should be blank (although good luck getting an auditor to sign off on that).
royal wrote: » Bad idea. There's a GPO that actually allows you to access a server/workstation with a blank password which is obviously not enabled by default. If you have everything blank and for some reason (purposely or accidentally) this GPO gets enabled, you have complete open access for all servers to anybody.
Claymoore wrote: » And with Group Policy Preferences you can reset the local admin password to anything you want. Either way, you need an account that has the ability to create and link group policy objects. With Advanced Group Policy Management in 2008 you can separate the responsibility of creating and approving GPOs for an extra layer of protection. Nothing can completely prevent admins from doing stupid things that compromise servers - like keep all the passwords in a spreadsheet on the file server or prop the server room door open with a box fan for extra ventilation. I'm sure the pen testers on the forum have crazy stories about admins that went full retard.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.