
Removing local Administrator account from Administrators group
"Martin Underwood" wrote ...
Quote:
> OK. Time to think laterally: suppose I rename the Administratoir account
to
> a random collection of permissible characters - without a well-known user
> name, it's very difficult to start deluging it with likely passwords until
> you find the right one (which is also a random collection of permissible
> characters).
Won't stop anyone who even vaguely knows what they're doing, unfortunately -
the Administrator account:
a) Can't be deleted
b) Can't be disabled
c) Can't have its priviledges revoked (as per previous messages)
d) Has an *extremely* well known SID - it will always be of the form
S-1-5-21-XXXXXXXXX-XXXXXXXXX-XXXXXXXXX-500 (As an aside, the 'Guest' account
is always 501)
Renaming it will, however, stop casual attackers. The safest way I can
reccomend (any other suggestions welcome) is:
a) Create a second account which is used for administrative work (ideally
you should have done this anyway)
b) Cause the built-in account to become locked out (i.e. force x
unsuccessful logins, where x is determined by your security policy)
At this point, it doesn't matter if anyone finds out the password for the
account, as it will be unable to log in. *NB I haven't actually tried this
on Win2K, so I'm not sure if it's possible for the Administrator account to
be locked out under the default policy - I know this was certainly
configurable under NT4*
You still have the problem of protecting your new account, but at least
you've closed off some of the more obvious attempts.
hth hand
Adam