HOWTO: Verify & Configure Local Windows Admins Accounts
This article offers step-by-step guidance on how to define a desired configuration with OtterScript that will verify that a user exists, is a local administrator, has the correct password, and, optionally, if the user should be enabled or disabled.
If the user doesn't exist, then Otter will report this as "configuration drift" and give you the option to automatically remediate configuration drift by ensuring a user exists in that desired state.
Create Secure Credentials
Otter uses Secure Credentials to store accounts, logins, and access keys that contain secrets. Because a local administrator account has a password, we will use these to store the desired password, and it will only be visible only to privileged users in Otter.
- Navigate to Administration > Secure Credentials
- Create a new UserName and Password credential
- Enter the name of the administrator account and password you'd like to create
- Repeat for as many accounts as you'd like to create
Create "EnsureLocalAdmin" Script
Otter uses Scripts to store PowerShell scripts. When you're using your own scripts, you may need to modify them to detect & remediate drift; however the script below will work as is.
- Navigate to Scripts and create a new PowerShell script named
EnsureLocalAdmin
- Click on
EnsureLocalAdmin
to edit it - Copy/paste the contents of the EnsureLocalAdmin PowerShell script from below
- Save the Script
Create "LocalAdmins" Server Role
Otter uses server roles to define desired configuration states using OtterScript.
- Navigate to Roles and create a new role named
LocalAdmins
- Navigate to the Desired Configuration tab of the new Role
- Click create to the right of Configuration Plan
- Add the
EnsureLocalAdmin
powershell script operation to your OtterScript plan.- Select
Collect & Remediate configuration (PSEnsure)
for the Script execution mode option if you'd like Otter to remediate, orVerify configuration (PSVerify)
if you'd only like to report drift - For the User option, enter
$PSCredential(«YOUR_SECURE_CREDENTIAL_NAME»)
- Enter
false
only if you want the account disabled
- Select
Next, assign the LocalAdmins server role to your servers and check for drift! You can also remediate the drift if you configured to do so.
Example OtterScript Desired Configuration
This is only an example, and your desired configuration will look different.
PSEnsure EnsureLocalAdmin
(
User: $PSCredential(bobAdminAccount)
);
PSEnsure EnsureLocalAdmin
(
User: $PSCredential(jimAdminAccount)
);
PSEnsure EnsureLocalAdmin
(
User: $PSCredential(defaultAdminAccount),
Enabled: false
);
EnsureLocalAdmin PowerShell Script
You can copy/paste this script directly, or modify it as needed.
<#
.SYNOPSIS
Ensures the specified account exists in the Administrators group
.PARAMETER User
PSCredential with the username/password
.AHCONFIGTYPE
Local Admins
.AHCONFIGKEY
$Username
.AHEXECMODE
$ExecutionMode
#>
param ([System.Management.Automation.PSCredential]$User, [bool]$Enabled = $true)
if ($Enabled -eq $true)
{
$Username = $User.UserName
}
else
{
$Username = $User.UserName + " (disabled)"
}
if ($ExecutionMode -eq "Collect") {
$currentUser = Get-LocalUser -Name $User.UserName -ErrorAction Ignore
if($currentUser -eq $null)
{
if($Enabled -eq $true)
{
Write-Information "User does not exist." -InformationAction Continue
return $false
}
else {
Write-Information "User does not exist." -InformationAction Continue
return $true
}
}
else {
if($Enabled -eq $false){
if( $currentUser.Enabled -eq $Enabled){
Write-Information "User exists, but disabled." -InformationAction Continue
return $true
}
else {
Write-Information "User exists and enabled." -InformationAction Continue
return $false
}
}
if($currentUser.Enabled -ne $Enabled)
{
return $false;
}
$userInAdmin = Get-LocalGroupMember -Name "Administrators" -Member $User.UserName -ErrorAction Ignore
if($userInAdmin -eq $null)
{
Write-Information "User is not an administrator." -InformationAction Continue
return $false
}
else {
Write-Information "User is an administrator." -InformationAction Continue
}
Add-Type -assemblyname system.DirectoryServices.accountmanagement
$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine)
if($DS.ValidateCredentials($user.UserName, $User.GetNetworkCredential().password) )
{
Write-Information "User credentials are valid." -InformationAction Continue
return $true
}
else {
Write-Information "User credentials are not valid." -InformationAction Continue
return $false
}
}
}
elseif ($ExecutionMode -eq "Configure") {
$currentUser = Get-LocalUser -Name $User.UserName -ErrorAction Ignore
if($currentUser -eq $null) {
if($Enabled -eq $true){
Write-Information "Adding new user." -InformationAction Continue
New-LocalUser -Name $User.UserName -Password $User.Password -PasswordNeverExpires
Add-LocalGroupMember -Name "Administrators" -Member $User.UserName
}
else{
return
}
}
else{
if($Enabled -eq $false -and $currentUser.Enabled -eq $true)
{
Write-Information "Disabling user." -InformationAction Continue
Disable-LocalUser -Name $User.UserName
}
elseif($Enabled -eq $true -and $currentUser.Enabled -eq $false)
{
Write-Information "Enabling user." -InformationAction Continue
Enable-LocalUser -Name $User.UserName
}
if($Enabled -eq $true)
{
$userInAdmin = Get-LocalGroupMember -Name "Administrators" -Member $User.UserName -ErrorAction Ignore
if($userInAdmin -eq $null)
{
Write-Information "Adding user to group." -InformationAction Continue
Add-LocalGroupMember -Name "Administrators" -Member $User.UserName
}
Add-Type -assemblyname system.DirectoryServices.accountmanagement
$DS = New-Object System.DirectoryServices.AccountManagement.PrincipalContext([System.DirectoryServices.AccountManagement.ContextType]::Machine)
if($DS.ValidateCredentials($user.UserName, $User.GetNetworkCredential().password) -eq $false)
{
Write-Information "Updating user password." -InformationAction Continue
Set-LocalUser -Name $User.UserName -Password $User.Password -PasswordNeverExpires $true
}
}
}
}
else {
Write-Information "Unknown operation." -InformationAction Continue
}