Windows infrastructure password managementPassword Manager » Features » Windows infrastructure password management

Windows Password Manager

In most of IT environments, Windows servers and systems are a significant component of the infrastructure. Local, domain, and service accounts constitute the core access to the Windows infrastructure. So, a breach of any of these high-privileged accounts is the worst-case scenario for any organization.

  • Local administrator accounts: These are all powerful accounts on member servers and clients that grant absolute control over their hosts. If the local administrator passwords are weak, left unchanged, or used repeatedly on multiple accounts, malicious users could gain unauthorized access to workstations. In the worst-case scenario, an attacker with access to a local admin account could navigate widely across the network and even elevate their privileges to that of a domain administrator.

  • Domain administrator accounts: These are the accounts that have the widest control over every object in the domain. They provide administrative privileges on all workstations, servers, and domain controllers. Only a few, trusted administrators should use the domain administrator accounts. And, they should use the account only to log on to the domain controller systems that are as secure as the domain controllers. This is because Windows systems are vulnerable to pass-the-hash attacks. The single sign-on functionality of Windows allows users to enter credentials once and then never have to enter the password again. Windows actually caches the login details within the system in the form of password hashes. If an attacker manages to access a system where the domain administrator had logged on in the past using his domain admin credentials, the attacker could easily obtain the hash and perpetrate an unauthorized transaction.

    As a best practice approach, domain administrator accounts should not be used to sign on to any system other than domain controllers. If there is a strong need to do so, the password access should go through a workflow for one-time usage, after which it should be reset. Even if the domain admin accounts are prudently used from trusted systems, they should be periodically changed.

  • Service accounts: These are very powerful accounts used by the system programs to run application software services or processes. These accounts often possess high or even excessive privileges. Service account passwords are generally set to "never change," due to the difficulty in discovering all dependent services and propagating the password change. However, static service accounts make the enterprise a haven for hackers.

Implementing proper controls and other standard security practices around these privileged accounts can help reduce vulnerabilities and keep malicious attacks at bay.

Easily locate and manage privileged accounts in your Windows infrastructure.

An effective password management procedure for the Windows infrastructure calls for identifying and consolidating the various privileged accounts on the network. Password Manager Pro's discovery capabilities help detect the local admin and domain admin accounts and automatically place them into the inventory. It also helps locate service accounts by identifying the various Windows server components that are run using domain accounts and mapping the services and scheduled tasks to respective accounts.

Secure your Windows account credentials with periodic password resets.

Security best practices demand that the privileged accounts on Windows infrastructure are reset periodically or after every usage (request-release). Frequent password changes for Windows resources also ensure regulatory compliance for the enterprise.

Windows Service Account Reset

Manually performing password resets for all systems is cumbersome, making the presence of an automated system convenient. With Password Manager Pro, local and domain admin passwords—including service account passwords—can be periodically rotated through scheduled reset tasks. For reinforced security, the account passwords can also be subject to an access control workflow, which ensures that the passwords are instantly changed, even after one-time usage by an authorized administrator.

When a service account password is reset, Password Manager Pro automatically propagates the change across all dependent services associated with the account to avoid any service stoppage.

Achieve a complete management routine with automated service restarts.

When a service account password is reset, associated Windows services usually require a restart for the changes to take effect. Password Manager Pro helps automate this reboot process with executable custom scripts to ensure that all applications and tasks dependent on service accounts are properly updated.

Password Manager Pro - Enterprise Password Management Software trusted by

Technical Support Request Demo