Adding Users to the Local Admin Group via Group Policy

You can use GPO (Group Policy) to add Active Directory customers and teams to the native Administrators group on domain-joined servers and workstations. This permits you to grant native admin privileges on area computer systems to technical assist employees, HelpDesk staff, particular customers or different privileged accounts. In this text we’ll present how to handle members of the native Administrator group on area computer systems utilizing GPO.

Local Administrators Group in Active Directory Domain

When you becoming a member of a pc to an AD area, the Domain Admins group is mechanically added to the native Administrators group, and the Domain User group is added to the native Users group.

The easiest method to grant native admin privileges on a pc is to add a consumer or group to the native safety group Administrators utilizing the Local customers and teams snap-in (lusrmgr.msc). However, this technique isn’t handy if there are a number of computer systems and in a while undesirable folks could keep the members of the privileged group. If you’re utilizing this technique of granting native privileges, it’s not handy to management the members of the native admins group on every area pc.

add user to the local administrator group manually using local users and groups snap-in (lusrmgr.msc)

Microsoft recommends utilizing the following teams to separate administrative privileges in an AD area:

  1. Domain Admins are used solely on area controllers;
    From the safety viewpoint for, it’s not really useful to carry out each day administration duties on workstations and servers below an account with the Domain Admin privileges. These accounts have to be used just for AD administration  (including new area controllers, administration, Active Directory schema modification, and many others.). Most consumer, pc or GPO administration duties have to be to common administrator accounts (with out Domain Admin permissions). Do not use Domain Admin accounts to go online to any workstations or servers apart from area controllers.
  2. Server Admins is a gaggle that permits to handle the area member servers. It should not be a member of the Domain Admins group or native Administrators group in your workstations;
  3. Workstation Admins is a gaggle for performing administrative duties on workstations solely. Must not be a member of the Domain Admins and Server Admins teams;
  4. Domain Users are widespread consumer accounts to carry out typical workplace operations. They should not have any administrator privileges on servers or workstations.
You may also fully refuse from offering any administrator privileges to area customers or teams. In this case, the built-in native Administrator account with a password saved in AD (-based) is used to carry out administrative duties on workstations.

Suppose, you need to grant native administrator privileges on computer systems in the particular OU to the group of technical assist and HelpDesk staff. Create and add the technical assist accounts to it:

New-ADGroup munWKSAdmins -path 'OU=Groups,OU=Munich,OU=DE,DC=woshub,DC=com' -GroupScope Global –PassThru
Add-AdvertGroupMember -Identity munWKSAdmins -Members amuller, dbecker, kfisher

Open the area Group Policy Management console (GPMC.msc), create a brand new coverage (GPO) AddLocaAdmins and hyperlink it to the OU containing computer systems (in my instance, it’s ‘OU=Computers,OU=Munich,OU=DE,DC=woshub,DC=com’).

AD Group Policy supplies two strategies to handle native teams on area computer systems. Let’s examine them in flip:

  • Local teams administration utilizing Group Policy Preferences;
  • Restricted Groups.

How to Add Domain Users to the Local Administrators via GPO Preferences?

Group Policy Preferences (GPP) present the most versatile and handy manner to grant native administrator privileges on area computer systems by way of a GPO.

  1. Open the AddLocaAdmins GPO you created earlier in the Edit mode;
  2. Go to the following GPO part: Computer Configuration –> Preferences –> Control Panel Settings –> Local Users and Groups;
  3. Add a brand new rule (New -> Local Group); group policy preferences manage local groups
  4. Select Update in the Action discipline (it is a vital possibility!);
  5. In the Group Name dropdown record, choose Administrators (Built-in). Even if this group has been renamed on the pc, the settings will likely be utilized to the native Administrators group by its — S-1-5-32-544;
  6. Click the Add button and choose the teams you need to add to the native directors group (in our case, it’s munWKSAdmins);

    If you need to take away manually added customers and teams from the present native Admins group, test the “Delete all member customers” and “Delete all member teams” choices. In most circumstances it’s cheap because you assure that solely the assigned area teams can have administrator permissions in your area computer systems. Then in case you add a consumer to the Administrators group manually utilizing the “Local customers and teams” snap-in, it is going to be mechanically eliminated subsequent time when the coverage is utilized.

    add domain user group to the local admin group using gpo

  7. Save the coverage and wait until it’s utilized on the workstation. To apply the coverage instantly, run this command gpupdate /pressure on a consumer pc;
  8. Open the lusrmgr.msc snap-in on any pc and test the native Administrators group members. Only the munWKSAdmins group will likely be added to this group, whereas different customers and teams will likely be eliminated. You can show the record of the native directors utilizing the command: web localgroup Administrators

You can configure further (granular) situations for concentrating on the coverage on the particular computer systems utilizing the or Item-level Targeting.

In the second case, go to the Common tab and test the Item-level concentrating on. Click Targeting. Here you possibly can specify the situations when the coverage will likely be utilized. For instance, I need the coverage of including administrator teams to be utilized solely to Windows 10 computer systems, which NetBIOS/DNS names don’t include adm. You can use your individual filtering choices.

Updating Administrators (built-in) group with GPO item-level targeting

It isn’t really useful to add particular person consumer accounts to this coverage. It is best to use the area safety teams. In this case, to grant administrator privileges to one other tech assist worker, it’s sufficient to add them to the area group (you gained’t want to edit the GPO).

Managing Local Admins Group Using Restricted Groups

The Restricted Groups coverage additionally permits to add area teams/customers to the native safety group on computer systems. It is an older technique of granting native administrator privileges and is used much less usually now (it’s much less versatile than that the Group Policy Preferences technique).

  1. Open a GPO in the enhancing mode;
  2. Expand the part Computer Configuration -> Policies -> Security Settings -> Restricted Groups;
  3. Select Add Group in the context menu;gpo restricted group policy
  4. In the subsequent window, sort Administrators after which click on OK; gpo: add to local admin
  5. Click Add in the Members of this group part and specify the group you need to add to the native admins;configure membership for admiinstrators for domain group
  6. Save the adjustments, apply the coverage to consumer computer systems and test the native Administrators group. It should include solely the group you may have laid out in the coverage.

This coverage at all times (!) removes all different members of the native directors group (added manually, or utilizing different insurance policies or scripts). If a number of insurance policies with the Restricted Groups settings are energetic for a pc, solely the final one is utilized. You can bypass this limitation by first including the munWKSAdmins group to the Restrictred Groups, after which including this group to the Administrators group.

Using GPO to Add a Single User to the Local Admin Group on a Specific Computer

Sometimes chances are you’ll want to grant a single consumer the administrator privileges on the particular pc. For instance, you may have a number of builders who want elevated privileges from time to time to check drivers, debug or set up them on their computer systems. It isn’t advisable to add them to the group of workstation admins on all computer systems.

To grant native administrator privileges on the particular pc, you should use the following scheme:

Right in the GPO desire part (Computer Configuration –> Preferences –> Control Panel Settings –> Local Users and Groups) of AddLocalAdmins coverage created earlier create a brand new entry for the Administrators group with the following settings:

  • Action: Update
  • Group Name: Administrators (Built-in)
  • Description: “Add amuller to the native directors on the mun-dev-wsk21 pc
  • Members: Add -> amuller add user user to the local admin group using group policy preferences
  • In the Common -> Targeting tab, specify this rule: “the NETBIOS pc title is mun—dev-wks24.” It signifies that this coverage will likely be utilized solely to the pc specified right here. gpo: adding local admin permissions on specific computer only

Also, listen to the order by which teams are utilized on the pc (the Order GPP column). Local group settings are utilized from high to backside (ranging from the Order 1 coverage).

The first GPP coverage (with the “Delete all member customers” and “Delete all member teams” settings as described above) removes all customers/teams from the native administrator teams and provides the specified area group. Then the further  computer-specific insurance policies are utilized that add the specified consumer to the native admins. If you need to change the membership order in your Administrators group, use the buttons on high of your GPO Editor console.

Check Also

How to Enable and Configure MPIO on Windows Server 2016/2012R2?

In this text we’ll contemplate how to set up and configure MPIO on Windows Server …

Leave a Reply

Your email address will not be published. Required fields are marked *