Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
ChubbyThePhat
Dec 22, 2006

Who nico nico needs anyone else

PUBLIC TOILET posted:

I haven't Googled this but I thought I'd ask here first:

What (if possible) is the easiest way to migrate a Hyper-V Ubuntu Server VM running on a Windows 10 Enterprise LTSC 2019 host to a Hyper-V Server 2016 host? Can I just do "Export", copy the file(s) to the server, then "Import" from the Hyper-V Manager?

Yep.

What a snipe. I got nothing.

Adbot
ADBOT LOVES YOU

FISHMANPET
Mar 3, 2007

Sweet 'N Sour
Can't
Melt
Steel Beams
So, speaking of Hyper-V. I'm doing some testing with DHCP and PXE with some VMs on my work machine. I've got my NIC setup as a "bridged" switch so my VMs are on the same network as my physical machine. I want to be able to sniff all the traffic my VMs are generating with wireshark. I've found lots of information on port-mirroring where I can set a VM as the "source" and another VM as the "destination" and I've even found how to use Hyper-V host as the "source" and a VM as the "destination" but I can't find a way to use a VM as the "source" and the physical NIC as the "destination."

I found this: https://cloudbase.it/hyper-v-promiscuous-mode/
I want the monitormode to be 1 instead of 2, but I can't do that just by changing the number from 2 to 1. I tried the module there and it also failed.

This seems simple but maybe I'm missing something? I basically just want to capture all traffic that touches my virtual switch.

Gucci Loafers
May 20, 2006

Ask yourself, do you really want to talk to pair of really nice gaudy shoes?


I am just bad at Windows or is this just stupid complicated?

I have a program that needs to modify the AD Schema and needs terrible Enterprise Administrator Credentials. I'm a user with domain administrator, the program is in my downloads folder and I need to run this with parameters. When I open command prompt with "As another user" I get access denied to that folder which makes sense - what the hell am I missing? All my google results are insanely complicated with RunAs-Powershell Jobs.

Also, is there still a need for Domain Users to be apart of the local admins on the local machine?

Internet Explorer
Jun 1, 2005





Tab8715 posted:

I am just bad at Windows or is this just stupid complicated?

I have a program that needs to modify the AD Schema and needs terrible Enterprise Administrator Credentials. I'm a user with domain administrator, the program is in my downloads folder and I need to run this with parameters. When I open command prompt with "As another user" I get access denied to that folder which makes sense - what the hell am I missing? All my google results are insanely complicated with RunAs-Powershell Jobs.

Also, is there still a need for Domain Users to be apart of the local admins on the local machine?

That does sound odd. Can you try taking it out on your user profile (out of downloads and to a temp folder on C) and try running it as the enterprise admin creds then?

And... Ah... No? Domain Users in local admins means that everyone is a local admin on that machine.

H2SO4
Sep 11, 2001

put your money in a log cabin


Buglord

Tab8715 posted:

Also, is there still a need for Domain Users to be apart of the local admins on the local machine?

holy gently caress, no absolutely not good god run away

Gucci Loafers
May 20, 2006

Ask yourself, do you really want to talk to pair of really nice gaudy shoes?


H2SO4 posted:

holy gently caress, no absolutely not good god run away

Why do I keep seeing this from time to time? Was there some reason in the past to do this?

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are

Tab8715 posted:

Why do I keep seeing this from time to time? Was there some reason in the past to do this?

Laziness. Usually someone felt the need to be logging onto multiple machines (either a nosy boss or a piss-poor IT guy) and couldn't wrap their brain around role based administration.

Internet Explorer
Jun 1, 2005





For a long time many Windows apps wouldn't run without admin rights. Since then, lovely programmers still can't get it right. I have 2 main line of business apps where the vendors tell me that end users need to be local admin. They don't and those vendors are dumb and I have to argue with them every time I need support.

peak debt
Mar 11, 2001
b& :(
Nap Ghost

Tab8715 posted:

Why do I keep seeing this from time to time? Was there some reason in the past to do this?

It was pretty normal pre 2005 because applications wouldn't run without it. It used to be pretty common for them to store state information right in "c:\program files\whatever" and if the end user didn't have write rights in that directory you'd either get endless error messages or configuration changes were reset every restart.
Only after Vista made this harder because of UAC did developers start putting the end user writable files into %appdata%.

And yeah, I actually had this discussion with the solo-developer of a pension fund application in loving 2017 that he couldn't put his .mdb files that he needs to open with read/write rights in the program files directory.

GreenNight
Feb 19, 2006
Turning the light on the darkest places, you and I know we got to face this now. We got to face this now.

Everyone in the company I work for are all local admins. Shrug.

Schadenboner
Aug 15, 2011

by Shine
The group that really confuses me is “Power Users”, like Windows tells me it’s for old applications but I’ve never actually encountered a program that required Power User membership.

I do remember the old days of “Local admins... local admins everywhere!” mostly because doing its still a standard practice at the lovely little MSP I work at.

:doh:

AreWeDrunkYet
Jul 8, 2006

GreenNight posted:

Everyone in the company I work for are all local admins. Shrug.

There's a big difference between everyone being an admin on their workstation (not best practice under most circumstances, but not the end of the world and the risk is manageable) and Domain Users having admin to every workstation (aww hell no).

Sickening
Jul 16, 2007

Black summer was the best summer.

AreWeDrunkYet posted:

There's a big difference between everyone being an admin on their workstation (not best practice under most circumstances, but not the end of the world and the risk is manageable) and Domain Users having admin to every workstation (aww hell no).

Its all subjective but I don't believe that everyone having admin on their computer is manageable risk. Saying that, I don't think anyplace where that is a norm is actually attempting to manage risk though.

Japanese Dating Sim
Nov 12, 2003

hehe
Lipstick Apathy
In my previous position at a university all staff and faculty had local admin on their own PCs. I didn't like it, but it was an entrenched policy and I certainly didn't have the power to tell a bunch of tenured faculty that they couldn't install various accounting/research/CAD applications that they needed to do their job and that we didn't have the resources to support/deploy/etc anyway. So it made a certain about of sense in that particular environment, despite my misgivings about it. I'm pretty sure most universities are the same, though that's just from anecdotes during the one conference I went to while I worked there.

Now I'm in a place that still has some rough edges but at least operates a software center and doesn't give admin to normal staff. I definitely prefer it this way.

stevewm
May 10, 2005
95% of our users are standard users...

But we have a handful of users that have local admin, but on their computer only. We use a Group Policy Preference that adds the user to the local built in administrators group, but also uses item level targeting via DNS name, so the GPP applies only to that user if they are logging onto their assigned computer. They are a standard user on any other machine.

These users use an app where vendors ship catalog updates packaged into customized installers. One vendor can have upwards of 20+ different catalogs, one for each product line, each with its own custom installer. And they all need admin access to work. :mad: I have tried so many times to get the things to work without admin, but every drat one is different. What works for one, doesn't work for others.

Docjowles
Apr 9, 2009

That seems perfectly reasonable. "domain users in local admin group lol" does not.

Agrikk
Oct 17, 2003

Take care with that! We have not fully ascertained its function, and the ticking is accelerating.

Sickening posted:

Its all subjective but I don't believe that everyone having admin on their computer is manageable risk. Saying that, I don't think anyplace where that is a norm is actually attempting to manage risk though.

Where I work we are not granted local admin access to our laptops, but you can petition for local admin if you want it. The process is incredibly simple: the ticket goes in with a statement by the user to the effect of “I know what I am doing and I want local admin. I understand that preserving my laptop’s data is now my responsibility. I further understand that if something goes wrong with it, desktop support will flatten/reinstall first and ask questions later.”

The policy is remarkably effective.

wolrah
May 8, 2006
what?

Sickening posted:

Its all subjective but I don't believe that everyone having admin on their computer is manageable risk. Saying that, I don't think anyplace where that is a norm is actually attempting to manage risk though.

There is a huge difference between "User X has local admin on User X's PC" and "All users have local admin on all PCs".

If User X infects their poo poo with malware in the first scenario it can rape that one machine all it wants but it can only spread to the rest of the network within User X's level of access the same as it could if they don't have local admin. In the second scenario it can spread throughout the entire network and easily use that level of access to gain execution under within other users' sessions by adding itself to one of the various startup autorun locations or just replacing a commonly used program.

I don't like either situation, but one is at least containable where the other is just waiting for disaster. If a computer is only used by a single user and you're prepared to flatten it if it ever becomes questionable it's not the worst thing for that user to have local admin on that machine alone. All they can possibly gently caress up with that power is their own data.

wolrah fucked around with this message at 18:12 on Jan 31, 2019

Gucci Loafers
May 20, 2006

Ask yourself, do you really want to talk to pair of really nice gaudy shoes?


Docjowles posted:

That seems perfectly reasonable. "domain users in local admin group lol" does not.

My bad, I didn't mean the group "domain users" just users on the domain.

Sickening
Jul 16, 2007

Black summer was the best summer.

wolrah posted:

There is a huge difference between "User X has local admin on User X's PC" and "All users have local admin on all PCs".

If User X infects their poo poo with malware in the first scenario it can rape that one machine all it wants but it can only spread within User X's level of access. In the second scenario it can spread throughout the entire network and easily use that level of access to gain execution under within other users' sessions by adding itself to one of the various startup autorun locations or just replacing a commonly used program.

I don't like either situation, but one is at least containable with some careful design where the other is just waiting for disaster.

That isn't true at all. An infected machine can infect others with no regard of that personas level of access to other machines. Once access is gained to the first machine it can then exploit vulnerabilities in others to execute code or aid in social engineering. While having admin access to just your machine isn't as bad as having admin access to all, it puts a lot of strain on hardening your environment in other places. Frankly, if everyone has admin access to their own machine I find it unlikely that people are really putting in the effort into other areas to mitigate risk.

Dirt Road Junglist
Oct 8, 2010

We will be cruel
And through our cruelty
They will know who we are
Our users are local admins on their own machines, which is something we keep trying to take away to the consternation of the VP of IT. There's really no reason people should have local admin (I mean, we're the :yayclod: massive), but then someone says, "Bu bu but what if someone calls in and they need like a program installed and like they can't?" OH NOES, THE END OF THE loving WORLD just push the installer from the content management system and close the ticket, you loving moron.

As as result, we have overbearing security tools on our endpoints that run up 100% CPU and cause mystery calls that can't be solved by pushing the goddamn button. And Powershell is hard blocked because lol that's a sane security policy. Oh, and everyone wants a Mac now, because it means they can install Dropbox and not get hassled by IT.

Oh, for further lulz, those of us who need access to servers have super user accounts, which is great. Separate account, separate perms, separate password (ideally). Until I find out half my teammates are using their SU accounts on their local workstations. CONGRATULATIONS, COLLEAGUES, YOU ARE THE PROBLEM.

Docjowles
Apr 9, 2009

Tab8715 posted:

My bad, I didn't mean the group "domain users" just users on the domain.

Ah, I suspect we all thought you meant the former, which is much more horrifying :v:

Gucci Loafers
May 20, 2006

Ask yourself, do you really want to talk to pair of really nice gaudy shoes?


Sickening posted:

That isn't true at all. An infected machine can infect others with no regard of that personas level of access to other machines. Once access is gained to the first machine it can then exploit vulnerabilities in others to execute code or aid in social engineering. While having admin access to just your machine isn't as bad as having admin access to all, it puts a lot of strain on hardening your environment in other places. Frankly, if everyone has admin access to their own machine I find it unlikely that people are really putting in the effort into other areas to mitigate risk.

I was about to ask about the risk of being in local admins, I guess that answered my question. I didn't recognize the impact.

Squatch Ambassador
Nov 12, 2008

What? Never seen a shaved Squatch before?
There's some industrial software taught in a couple courses here that requires all users to be in the local admin group, which means students in those courses have admin on a set of lab PCs. There haven't been any issues in the 3 years I've been supporting it, but it's only a matter of time.

When I asked the developer if there was a way around giving everyone local admin they told me: "Just add students to the $productadmin group that's created when you install the software, then add that group to local admin." :ughh:

wolrah
May 8, 2006
what?

Sickening posted:

That isn't true at all. An infected machine can infect others with no regard of that personas level of access to other machines. Once access is gained to the first machine it can then exploit vulnerabilities in others to execute code or aid in social engineering. While having admin access to just your machine isn't as bad as having admin access to all, it puts a lot of strain on hardening your environment in other places. Frankly, if everyone has admin access to their own machine I find it unlikely that people are really putting in the effort into other areas to mitigate risk.

Correct, if we're talking about malware spreading by exploit. The thing is in most cases that doesn't really care what level of access "patient zero" has, it can usually spread just as well from an unprivileged account, so I don't consider that to be too relevant to discussions of local admin. I'm talking about the damage that can be done without any exploits necessary.

If patient zero has a standard account with no special privileges then without some kind of unpatched vulnerability to exploit the malware can only spread or cause damage within the user's own account and those shared areas which they have been granted access to.

If patient zero has local administrator privileges on just their own machine then the same malware can take over that entire machine but is still limited in its ability to spread within the network by the privileges of the user it's running as. This is dangerous with a shared machine because it could infect any other accounts that logged in to that machine and spread to the extent of their privileges, but if we're talking about dedicated hardware used by one person it's basically no worse than the first scenario as long as that machine is handled with care after infection.

If they have local admin across the board, that malware can spread using C$ shares and the like to every machine in reach within seconds.

---

IMO limited one user to one machine local admin is to be avoided but justifiable in some cases, giving all users local admin to any station is a :yikes: situation.

stevewm
May 10, 2005

wolrah posted:

If they have local admin across the board, that malware can spread using C$ shares and the like to every machine in reach within seconds.

---

IMO limited one user to one machine local admin is to be avoided but justifiable in some cases, giving all users local admin to any station is a :yikes: situation.


This is why I went with the setup I did... At first I had a group that was added to the local admins group. If I had a user who needed local admin, I added them to this group. Except it gave them local admin on any machine that was part of that group, and it also gave them access to the administrative shares (C$) on all machines!

Doing it through a GPP with a Item level targeting restriction prevents this. They are standard user on any other system, including those accessed over the network. So no C$ access.

Sickening
Jul 16, 2007

Black summer was the best summer.

wolrah posted:

Correct, if we're talking about malware spreading by exploit. The thing is in most cases that doesn't really care what level of access "patient zero" has, it can usually spread just as well from an unprivileged account, so I don't consider that to be too relevant to discussions of local admin. I'm talking about the damage that can be done without any exploits necessary.

If patient zero has a standard account with no special privileges then without some kind of unpatched vulnerability to exploit the malware can only spread or cause damage within the user's own account and those shared areas which they have been granted access to.

If patient zero has local administrator privileges on just their own machine then the same malware can take over that entire machine but is still limited in its ability to spread within the network by the privileges of the user it's running as. This is dangerous with a shared machine because it could infect any other accounts that logged in to that machine and spread to the extent of their privileges, but if we're talking about dedicated hardware used by one person it's basically no worse than the first scenario as long as that machine is handled with care after infection.

If they have local admin across the board, that malware can spread using C$ shares and the like to every machine in reach within seconds.

---

IMO limited one user to one machine local admin is to be avoided but justifiable in some cases, giving all users local admin to any station is a :yikes: situation.

You are thinking way too narrowly. Once access is established on the first machine they can scan/exploit the machines around it at its leisure. An attacker is by no means bound to the initial exploit/whatever was used on the initial compromise.

wolrah
May 8, 2006
what?

Sickening posted:

You are thinking way too narrowly. Once access is established on the first machine they can scan/exploit the machines around it at its leisure. An attacker is by no means bound to the initial exploit/whatever was used on the initial compromise.

I don't see how this is relevant. How many network-based exploits actually depend on having high privileges on the attacking host? As far as I can think, only the ones that attack the target's kernel network stack and thus need to generate nonsensical packets with raw sockets. Those vulnerabilities are of course rare at this point and get treated as ultra-critical by the OS vendors so anyone who hasn't patched up has bigger problems than worrying about user privileges. Pretty much anything attacking an application on the remote host can be initiated without any special privileges.

Aside from those rare cases where a kernel-level vulnerability has just been discovered and hasn't been patched yet, how does the user of a dedicated workstation having local admin make them more of a threat to anything else on the network?

If they only have admin on their sole dedicated workstation that only they use, the only stuff that admin privilege allows them to gently caress up is their own.

wolrah fucked around with this message at 16:15 on Feb 1, 2019

Sickening
Jul 16, 2007

Black summer was the best summer.

wolrah posted:

I don't see how this is relevant. How many network-based exploits actually depend on having high privileges on the attacking host? As far as I can think, only the ones that attack the target's kernel network stack and thus need to generate nonsensical packets with raw sockets. Those vulnerabilities are of course rare at this point and get treated as ultra-critical by the OS vendors so anyone who hasn't patched up has bigger problems than worrying about user privileges. Pretty much anything attacking an application on the remote host can be initiated without any special privileges.

Aside from those rare cases where a kernel-level vulnerability has just been discovered and hasn't been patched yet, how does the user of a dedicated workstation having local admin make them more of a threat to anything else on the network?

If they only have admin on their sole dedicated workstation that only they use, the only stuff that admin privilege allows them to gently caress up is their own.

That was my point. Companies that just give everyone local admin access isn't going to patch effectively, isolate endpoints, or anything of the other things to harden their environments. Minimizing risk isn't on their radar.

The things you don't see as "relevant" definitely are and should be. Minimizing who is local admin on their machine is very relevant.

Sickening fucked around with this message at 17:11 on Feb 1, 2019

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib

wolrah posted:

I don't see how this is relevant. How many network-based exploits actually depend on having high privileges on the attacking host? As far as I can think, only the ones that attack the target's kernel network stack and thus need to generate nonsensical packets with raw sockets. Those vulnerabilities are of course rare at this point and get treated as ultra-critical by the OS vendors so anyone who hasn't patched up has bigger problems than worrying about user privileges. Pretty much anything attacking an application on the remote host can be initiated without any special privileges.

Aside from those rare cases where a kernel-level vulnerability has just been discovered and hasn't been patched yet, how does the user of a dedicated workstation having local admin make them more of a threat to anything else on the network?

If they only have admin on their sole dedicated workstation that only they use, the only stuff that admin privilege allows them to gently caress up is their own.
Dumping the cached SAM database requires admin credentials and PtH is gonna be one of the first things someone tries on a popped domain machine, so unless you can guarantee that no one besides the workstation user has ever logged in to that machine you're giving away a pretty big attack surface, and that's just the first thing that comes to mind

Sickening
Jul 16, 2007

Black summer was the best summer.

wyoak posted:

Dumping the cached SAM database requires admin credentials and PtH is gonna be one of the first things someone tries on a popped domain machine, so unless you can guarantee that no one besides the workstation user has ever logged in to that machine you're giving away a pretty big attack surface, and that's just the first thing that comes to mind

I was tempted to crosspost his arguements into the infosec threads for things just like this but I don't exactly hate him that much.

Caf
May 21, 2004

I'm King James! The Lion King!

Sickening posted:

That was my point. Companies that just give everyone local admin access isn't going to patch effectively, isolate endpoints, or anything of the other things to harden their environments. Minimizing risk isn't on their radar.


As a small enterprise (~10000 users) we definitely do all these things despite giving our users local admin access.

We restrict user profile access, we don't allow the server or winrm services to run on workstations and a bunch of other things. Hell, when everyone else was freaking out about smb exploits last year we just shrugged because we were already protected. It's really not that hard to minimize risk if you need to live with local admins and any place with more than a handful of IT staff is definitely doing it.

Sickening
Jul 16, 2007

Black summer was the best summer.

Caf posted:

As a small enterprise (~10000 users) we definitely do all these things despite giving our users local admin access.

We restrict user profile access, we don't allow the server or winrm services to run on workstations and a bunch of other things. Hell, when everyone else was freaking out about smb exploits last year we just shrugged because we were already protected. It's really not that hard to minimize risk if you need to live with local admins and any place with more than a handful of IT staff is definitely doing it.

You give all your users admin rights? If so, no, you are not minimizing risk lmao.

peak debt
Mar 11, 2001
b& :(
Nap Ghost

wyoak posted:

Dumping the cached SAM database requires admin credentials and PtH is gonna be one of the first things someone tries on a popped domain machine, so unless you can guarantee that no one besides the workstation user has ever logged in to that machine you're giving away a pretty big attack surface, and that's just the first thing that comes to mind

I thought the SAM database for locally cached domain passwords was double-hashed exactly to protect against this?

wyoak
Feb 14, 2005

a glass case of emotion

Fallen Rib
I'm a bit rusty on the specifics of the various AD hashing scenarios but yeah you're right. Still, an attacker can dump the hashes and attempt offline cracks - is everyone who has logged on that workstation using a strong password?

Also, if an attacker is on a live machine and someone logs in remotely (say, for desktop support), or if there's a process running as a service account, etc etc etc, those hashes are going to be exposed as well and they are vulnerable to PtH. At the very least an attacker is going to be able to impersonate the computer account - did someone do something dumb like include a service account password in a computer-facing GPO? Does the computer account have access to potentially sensitive info that a user account doesn't?

Anyway, yeah, local admin privileges can expose more than just local resources.

tadashi
Feb 20, 2006

I'm trying to find a good fit for this question but I can't seem to figure out any other thread to put it in:

Does anyone know of a web filter program that would work with Windows that allows for a manual bypass feature? Sort of like a captive portal that you can acknowledge that you're on break before continuing to a website that we don't want people going to?

We don't want to completely take away access to things like Facebook/Instagram/Whatever because it usually just leads to extra bathroom breaks or people coming back late from breaks. I'd actually rather people use social media messaging from their PC than their phone so at least we have a trail if they do something stupid.

Sorry, but my web filtering experience is limited to binary answers (yes you can go here or no, you can't).

skipdogg
Nov 29, 2004
Resident SRT-4 Expert

I'm not aware of anything like that.

orange sky
May 7, 2007

I know of something that can check if people are going to the websites you define, and if so, pop up a message saying whatever you want and requiring an answer. It's outside the browser and not really related to networking, though.

Internet Explorer
Jun 1, 2005





tadashi posted:

I'm trying to find a good fit for this question but I can't seem to figure out any other thread to put it in:

Does anyone know of a web filter program that would work with Windows that allows for a manual bypass feature? Sort of like a captive portal that you can acknowledge that you're on break before continuing to a website that we don't want people going to?

We don't want to completely take away access to things like Facebook/Instagram/Whatever because it usually just leads to extra bathroom breaks or people coming back late from breaks. I'd actually rather people use social media messaging from their PC than their phone so at least we have a trail if they do something stupid.

Sorry, but my web filtering experience is limited to binary answers (yes you can go here or no, you can't).

I'd imagine any that allow for the use of a bypass code would do this. Just make the bypass code common knowledge.

Not sure that's a great idea, but yeah.

Adbot
ADBOT LOVES YOU

Thanks Ants
May 21, 2004

#essereFerrari


I'm pretty sure there are filtering options that the end-user can bypass and just enter their own reason in, then their line manager can review the exemptions they've entered.

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply