Chapter 5. The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL)
Information in this chapter:
▪ Creating and Configuring Service User Accounts
▪ Real, Quantifiable Password Strength, and How to Measure It
Products, Tools, and Methods:
▪ AD
▪ Least Privilege Service Users
▪ Delegation
▪ Password Strength
▪ MS SQL Server
▪ Visual Studio (C#)
This chapter outlines how to create and maintain low privileged users in order to serve as the user context for different services and applications.
Keywords: Event Logs SQL WMI SDDL

Introduction

Every process running on your system runs in the context of some account entity, be that an actual user account, a machine account, LOCAL SYSTEM, LOCAL SERVICE, NETWORK SERVICE, or some other built-in ...

Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.