Admin Tip #39: IPC$ Authenication to Windows NT Servers |
Hits: Failed to execute CGI : Win32 Error Code = 3
|
net use \\myaccdomPDC\IPC$ /user:myaccdom\myadminaccount myadminpw
When I finish the admin task of the moment, I type:
net use \\myaccdomPDC\IPC$ /d
which removed my admin access rights. With this mechanism I promote my access to admin, get the job done, then remove the admin-level access rights. When I am working at the admin level, I can pay the appropriate level of attention. Its difficult to do that if one works all day with that level of access. Its a bit of a hassle, but with significant safety builtin.
I have scripts to gain access or remove access to the servers I normally work on. If I have already accessed a particular server as a user, there may be a user-level IPC$ connection which will cause a credentials collision. Eliminiate the user-level connect by net use \\machine\ipc$ /d . Occasionally I have to logoff as a user and log back in as an admin (probably couple times a week). In any case, I drastically reduce the chance of accidently doing damage by doing all my work as an admin account. This method makes me think about the level of access. I also can remove the IPC$ connection when I am through and not be so concerned if I leave the workstation temporarily unsecured. After all, my logon only has normal user access at that time.
This is a good way to avoid performing routine non-admin tasks such as web surfing, browsing email with too many privileges.