Windows 10: BitLocker - non-domain admin abilities to write to AD

Discus and support BitLocker - non-domain admin abilities to write to AD in Windows 10 Software and Apps to solve the problem; Hello,Working on setting up BitLocker to save the keys to AD, but can't seem to find an answer to my big question. We have non-domain administrators at... Discussion in 'Windows 10 Software and Apps' started by SMertz01, Nov 17, 2021.

  1. SMertz01 Win User

    BitLocker - non-domain admin abilities to write to AD


    Hello,Working on setting up BitLocker to save the keys to AD, but can't seem to find an answer to my big question. We have non-domain administrators at locations that have been granted delegation rights to their AD OUs. While setting up BitLocker, I created a security group and added these admins to it, delegated them the additional full access rights to msFVE-RecoveryInformation attribute, which gives them rights to see the BitLocker keys in a machine's properties, but can they write the keys to AD when setting up machines?If they do the command: "manage-bde.exe -on C: -recoverypassword" wi

    :)
     
    SMertz01, Nov 17, 2021
    #1

  2. How does BitLocker behave on a PC with multiple admin accounts and multiple non-admin accounts?

    I'm thinking of enabling BitLocker on a Windows 10 Version 1709 Pro x64 PC and setting the drives to automatically unlock. The PC currently has:

    • 2 Microsoft Accounts (AccountA and AccountB) with admin authority. BitLocker will be enabled using AccountA.
    • 2 Microsoft Accounts (AccountB and AccountC) with non-admin authority.
    • 1 Local, Non-Microsoft Account (AccountD) with non-admin authority.
    Given the above, how will BitLocker behave when the PC is booted up and an account
    other than Account A is logged in to? Will the OS request the BitLocker password, or will the BitLocker protected drives automatically unlock? I'm hoping for the latter behavior so as not to degrade the user experience for accounts other than AccountA.

    Does anyone know?
     
    Judah_Richardson, Nov 17, 2021
    #2
  3. changari Win User
    Raising the windows domain and forest issues?


    hi,

    I run a domain that was all 2003 r2 servers. I recently upgraded all my domain controllers to windows 2012 r2.
    That went off without any problems.. Our trust relationships had no issues also.

    My first step was to raise the Domain and Forest levels past 2003 to 2008. This went off without a hitch.
    These are the features for raising the levels to 2008:

    • Features and benefits include all default Active Directory features, all features from the Windows Server 2003 domain functional level, plus:
    • Read-Only Domain Controllers – Allows implementation of domain controllers that only host read-only copy of NTDS database.
    • Advanced Encryption Services – (AES 128 and 256) support for the Kerberos protocol.
    • Distributed File System Replication (DFSR) – Allows SYSVOL to replicate using DFSR instead of older File Replication Service (FRS). It provides more robust and detailed replication of SYSVOL contents.

    Forest Level Windows Server 2008

    • Features and benefits include all of the features that are available at the Windows Server 2003 forest functional level, but no additional features. All domains that are subsequently added to the forest will operate at the Windows Server 2008 domain functional level by default.


    My next step is to raise the domain and forest to 2008 r2, then 2012, and finally 2012 r2. I have been trying to find out exactly what I could expect from raising the Domain and Forest for each step.

    The step involving 2008 r2 seems relatively a non issue. But getting the couple of new features seem very nice

    Domain Level Windows Server 2008 R2

    • All default Active Directory features, all features from the Windows Server 2008 domain functional level, plus 2 new features

    Forest Level Windows Server 2008 R2

    • All of the features that are available at the Windows Server 2003 forest functional level, plus the following features:


    • Active Directory Recycle Bin, which provides the ability to restore deleted objects in their entirety while AD DS is running. <== New Feature very cool
    • All domains subsequently added to the forest will operate at the Windows Server 2008 R2 domain functional level by default.

    Here is my big concerns for the next raising of domain and forest to 2012.

    Forest Level Windows Server 2012:

    • All of the features that are available at the Windows Server 2008 R2 forest functional level, but no additional features.
    • All domains subsequently added to the forest will operate at the Windows Server 2012 domain functional level by default.

    Domain Level Windows Server 2012 R2: <=====
    Need to investigate more and why this post

    • DC-side protections for Protected Users. Protected Users authenticating to a Windows Server 2012 R2 domain can no longer:


    • Authenticate with NTLM authentication <==============(what issues may arise)
    • Use DES or RC4 cipher suites in Kerberos pre-authentication
    • Be delegated with unconstrained or constrained delegation
    • Renew user tickets (TGTs) beyond the initial 4-hour lifetime


    Will this affect my exchange anywhere users with remote access authenticating either clear of NTLM???
    and what would/may not to work properly day 1 when I raise the domain and forest to 2012. I cant really find anyone that can answer a straight question.

    Has anyone gone through this? what problems did you have, if any , if a lot???

    Any thoughts and suggestions will be much appreciated??

    thanks


    - - - Updated - - -

    One more point... I am not sure if I posted this to the correct forum.. So if I was wrong and it should be in a different one..
    PLEASE LET ME KNOW
     
    changari, Nov 17, 2021
    #3
  4. EducIT Win User

    BitLocker - non-domain admin abilities to write to AD

    BitLocker automatically enabled when computer gets added to the domain?

    I talked to my boss about this issue, and he claims there is no domain group policy in place to automatically enable BitLocker when computers get added to the domain. Is there any way this could just be a security feature in Windows 10 that any computer
    added to any domain gets BitLocker encrypted by default, or is that not a thing that happens in Windows 10? I feel like it has to be a group policy. Are there any other ways BitLocker could get automatically enabled?
     
    EducIT, Nov 17, 2021
    #4
Thema:

BitLocker - non-domain admin abilities to write to AD

Loading...
  1. BitLocker - non-domain admin abilities to write to AD - Similar Threads - BitLocker non domain

  2. Disable UAC for non admin on domain

    in Windows 10 Gaming
    Disable UAC for non admin on domain: I have a Windows 11 computer. UAC doesn't allow me to lower the UAC settings for a non admin user on this computer. It keeps telling me to log in to an administrator account to do so but when I log into that administrator account it doesn't change it for the non admin user. I...
  3. Disable UAC for non admin on domain

    in Windows 10 Software and Apps
    Disable UAC for non admin on domain: I have a Windows 11 computer. UAC doesn't allow me to lower the UAC settings for a non admin user on this computer. It keeps telling me to log in to an administrator account to do so but when I log into that administrator account it doesn't change it for the non admin user. I...
  4. How to collect logs from AD with non-admin user?

    in Windows 10 Software and Apps
    How to collect logs from AD with non-admin user?: Dear colleagues,I need to collect descriptive logs from Active Directory, but using a user with minimal privileges. Currently, technologies allow me to use WMI log collection but the problem is that as far as I have read, to collect security logs from Windows Server 2012 R2...
  5. BitLocker - non-domain admin abilities to write to AD

    in Windows 10 Gaming
    BitLocker - non-domain admin abilities to write to AD: Hello,Working on setting up BitLocker to save the keys to AD, but can't seem to find an answer to my big question. We have non-domain administrators at locations that have been granted delegation rights to their AD OUs. While setting up BitLocker, I created a security group...
  6. BitLocker - non-domain admin abilities to write to AD

    in Windows 10 Customization
    BitLocker - non-domain admin abilities to write to AD: Hello,Working on setting up BitLocker to save the keys to AD, but can't seem to find an answer to my big question. We have non-domain administrators at locations that have been granted delegation rights to their AD OUs. While setting up BitLocker, I created a security group...
  7. MS 365 Family - Adding a non-admin user

    in User Accounts and Family Safety
    MS 365 Family - Adding a non-admin user: Hi, all. I'd like to add my wife to my MS 365 account but I'd like her to have her own computer sign on and screen that's different from mine even though we are using the same computer. Will I get that if I have her create an account via MS 365 Family or should I have her...
  8. Adding Domain User as Local Admin

    in Windows 10 Customization
    Adding Domain User as Local Admin: Hi there, We are trying to set up the computer of one of our remote employees in house and are running into the issue that every time a setting is changed or a program is installed, it is requiring an administrator password from our domain. We don't want this meaning having...
  9. Disabling CMD and BIOS for non admin accounts Domain

    in Windows 10 Support
    Disabling CMD and BIOS for non admin accounts Domain: Hello dear people of Tenforums. ive used this site everyday since i started my job as head of IT in the local goverment office i work. and i have learned alot like making a new DC Anyways to the point. The systems implemented in the 4 schools of the local goverment are old...
  10. One profile for Domain and non-domain

    in Windows 10 Network and Sharing
    One profile for Domain and non-domain: I have a couple users that work on their laptops outside of the office but need to connect to the domain when here. When they connect it creates a new profile and they have to re-register their software licenses. They also lose access to all of their documents and such unless...