3
1
Machines in AD (domain) do cache domain user credentials in default, and I like this behaviour, not only because it is especially useful in case of laptops. The number of last logons to be cached might be easily changed via GPO.
BUT, here is the thing. I am looking for a way how to disallow the domain administrators' password to be cached on any computer in the network. The reason I want this is malware - we do not want to have whole domain compromised just because of one infected machine, right?!
Question 1:
How to properly disable credentials caching just for domain administrator users (and let it be enabled for normal "authenticated users") in GPO?
I believe it shall be achieved by setting Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options GPO container\Interactive logon: Number of previous logons to cache (in case domain controller is not available)
to 0
But I haven't figured out how to successfully apply it for domain administrators only :(
--
Question 2:
Also... I am aware I need to set password/credentials policies in the "Default Domain Policy" GPO branch only to actually allow them to be active/performed? But ...Is this the only exception? Which policies are those to have this exception? Is it whole "Security Settings" branch? Or just some of its sub branches? Or something else? How is it indicated in the Group Policy Management console?
Using Windows Server 2012R2
1
The answer to your Question #2 is found here.
– I say Reinstate Monica – 2017-03-06T17:37:44.040