Setting Permissions for Active Directory Scans
Local Windows Accounts
The scanning account needs the "Access This Computer From the Network" permission (and possibly one more) on the endpoint:
-
Open the local group policy editor (gpedit.msc).
-
Go to Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment.
-
Double-click the Access this computer from the network policy. The properties for the policy appears.
-
Ensure the scanning account is one of the listed users. If not, click the Add User or Group button to add it.
These settings apply only to the configurations listed below. Check the following list of the operating systems and updates to see if any match your system. If your system configuration is not in this list, then none of the settings above required to be set for you.
- Windows 10, version 1607 and later
- Windows 10, version 1511 with KB 4103198 installed
- Windows 10, version 1507 with KB 4012606 installed
- Windows 8.1 with KB 4102219 installed
- Windows 7 with KB 4012218 installed
- Windows Server 2022
- Windows Server 2019
- Windows Server 2016
- Windows Server 2012 R2 with KB 4012219 installed
- Windows Server 2012 with KB 4012220 installed
- Windows Server 2008 R2 with KB 4012218 installed
For more information on this security issue, see Network access: Restrict clients allowed to make remote calls to SAM.
Windows Services, Scheduled Tasks, App Pools, and COM+ Applications
To scan for service accounts, the account entered must be a domain account that is in the Administrators group on the target machines. Follow the instructions below in either case to ensure your account has the privileges to run a successful scan:
-
Open the group policy editor for your domain policy.
-
Go to ComputerConfiguration > Preferences > Control Panel Settings.
-
Right-click Local Users and groups and select New > Local Group.
-
Leave the Action dropdown list set to Update.
-
Click to select Administrators (Built-in) in the Group Members dropdown list.
-
Click the Add… button.
-
Search for the account you will use for discovery scanning.
-
Click the OK button to save your changes. The next time the group policy updates across your environment, the discovery account will be part of the local administrators group.
-
For strong security, configure the group policy to limit the logon privileges of that account:
-
Open the group policy editor
-
For your domain policy, go to Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assignment.
-
Add your discovery account to the Deny log on locally policy.
-
Add your discover account to the Deny log on through Remote Desktop Services policy.
-
(Optional) Ensure the account is not part of the remote desktop users group.
-