Least Privilege Scenario: Recommended

Working with 12beAdmin:
  • Create groups that we can use for AD Delegation. I expect you to be familiar with RBAC (Role Based Access Control).
  • Create 2 User accounts for each Admin of your company. Where the userpart isidentical but the ending is something you can identify for administrating the TIER, like:
    • .CLI and .SRV
    • .002 and .001
    • .cli and .ad
    • MyName.c02 and MyName.s01

  • Run 12beAdmin with the higher priviledged user Account. Do not use the account, you want to be a member of the %computername%-Admins group. That would be a „self elevation“ and that could be exploid be an attacker.
  • Delegate permissions in AD on OU Level to add members to an existing group and reset the password
    • dsAcls.exe „$GroupPath“ /I:S /G „*yourACgroup*:RPWP;member;group“
    • dsAcls.exe „$UserPath“ /I:S /G „*yourACgroup*:CA;Reset Password;user“
Bulk Creation of Admin Groups for each Computer
  • dsAcls.exe „$GroupPath /I:S /G „*yourACgroup*:GA;;group“