Hello,
As many of you know, it's possible to administer AD and DNS servers (as well as many other features) by using Remote Server Administration Tools that can be installed on any Windows version.
For some reason, I thought that in order to be able to use it, a user has to have more privileges on a domain than a regular user, like being able to reset passwords, move users between OUs and so on. Well, this is not true.
Yesterday I was able to install the RSAT using a generic user account that has local administrator privileges. I then could see the DNS entries, user accounts (including information that only a few people should be able to see). In short, the tools allow accessing the same MMC snap-ins that are available when logged in on a domain controller. Of course, the access is read-only, but there is still too much information that better be inaccessible by regular users.
Is there a way to block the remote management? I have a few ideas, but not sure how to implement them:
1) Block MMC and certain snap-ins by using AppLocker and Software Restriction Policies. Easy to get around, as there probably other tools that can expose the AD information.
2) Block certain ports on DCs, so that MMC can only communicate with trusted computers. What ports should I block and won't it break the AD replication?
3) Just forget about it and hope that users are not savvy enough to do any harm.
I know that users shouldn't be local administrators, but this is a business requirement for some departments.
And in any case, once somebody has access to the computer, it's difficult to stop them from becoming a local admin. Been there, done that