O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL)
Information in this chapter:
▪ Creating and Configuring Service User Accounts
▪ Real, Quantifiable Password Strength, and How to Measure It
Products, Tools, and Methods:
▪ AD
▪ Least Privilege Service Users
▪ Delegation
▪ Password Strength
▪ MS SQL Server
▪ Visual Studio (C#)
This chapter outlines how to create and maintain low privileged users in order to serve as the user context for different services and applications.
Keywords: Event Logs SQL WMI SDDL

Introduction

Every process running on your system runs in the context of some account entity, be that an actual user account, a machine account, LOCAL SYSTEM, LOCAL SERVICE, NETWORK SERVICE, or some other built-in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required