Chapter 5. The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL)
Information in this chapter:
▪ Creating and Configuring Service User Accounts
▪ Real, Quantifiable Password Strength, and How to Measure It
Products, Tools, and Methods:
▪ Least Privilege Service Users
This chapter outlines how to create and maintain low privileged users in order to serve as the user context for different services and applications.
Keywords: Event Logs SQL WMI SDDL
Every process running on your system runs in the context of some account entity, be that an actual user account, a machine account, LOCAL SYSTEM, LOCAL SERVICE, NETWORK SERVICE, or some other built-in ...