We are going to be breaking our domain and joining another, once we have joined will the domain admins of the new domain have access to our SQL database? Currently using windows authentication
The data on the SQL, File and exchange servers must for now stay confidential to ourselves until the nationalization of the company is final. Is there a way to prevent them making themselves admins on the servers?
As far as I know is that we will just be a OU in AD with our branch (Currently our AD Domain 120 users) that I will then manage.
You could look at disabling all of the group accounts other then your specific id's or groups.
Don't disable the NT Authority or NT Service accounts.
Ensure that at least 1 account (Yours) has full sysadmin and adminstrator access and try it on your test box if you have 1 in case it screws up anything else accessing the server.
I love deadlines. I like the whooshing sound they make as they fly by
Douglas Adams
(1952-2001)
On your local windows accounts you should have a group called administrators. A member of this group should be something like
DOMAIN\administrators
Well i would say it would be safe if you made sure that NEWDOMAIN\administrators wasnt in this group.
Then on the current domain server make sure that NEWDOMAIN\administrators are not in the administrators group for your domain.
OR..... the safest approach - keep your domains separate (using vlan`ing - so on same network but one cant see the other) until your ready to allow them to talk.
Dan, that's not possible we are becoming one domain, we already have a trust in place and have had it for several years, but the firms are growing and are about to be nationalized and have already started to conform to international standards and policies. The partners in both companies/branches do not want us the IT managers from either domain[currently] having access to each others data [yet].
SQLBill - Remove it or just set Deny permissions on the account to the database or change server roles? But I take it that it's going to be possible to give myself and our staff access while denying there staff and admins access.
Create logins for those people who need to have access and grant them the appropriate access needed (sysadmin if needed). Then remove Builtin\Administrators. If someone is an administrator on the server, they automatically have SA privilges via Builtin\Administrators. We remove that permission immediately upon building a SQL Server server.
One thing you can do to make security easier to manage is create an Active Directory group that will be used for those who are approved to have sysadmin access. Something like [Domain]\DBAGroup. Grant that Windows group sysadmin priviliges in SQL Server and just assign users to the group as necessary.
Before you remove Builtin\Adminstrators, make sure someone has SA access. Either the SA login/password is stored somewhere, or someone's login has the sysadmin privilege.
-SQLBill
The following is part of my signature block and is only intended to be informational.
Posting advice: FAQ481-4875
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.