Jump to content

How to prevent Employee from Bypass / Bridge Administrator Password to Install unauthorized software & Torrenting?

So, apparently 2 of our employee manage to bypass our Admin password and install torrent software to Company's PC.

There are two local user:

1. Administrator with password - they supposedly don't know.  

2. User with password - they use this one.

 

Even though they already sign the User Agreement for company PC.

They confess that they ask 3rd party (outside of our organization) : ex employee and their kids to do it.

Either they know the Admin password or they find a way to bypass it.

From Google Search this what I found:

https://itoolab.com/windows-password/how-to-bypass-admin-password-windows-10/#:~:text=Method 1%3A Bypass Admin Password Windows 10 Using Lusrmgr&text=msc” in the Run bar,admin account without any software

 

How to prevent them next time from doing it again?

Should we just use M365 Business Account to log them?

 

Thanks

 

 

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

fire them or tell em to not do it lol

Dont forget to mark as solution if your question is answered

Note: My advice is amateur help/beginner troubleshooting, someone else can probably troubleshoot way better than me.

- I do have some experience, and I can use google pretty well. - Feel free to quote me I may respond soon.

 

Join team Red, my apprentice

 

STOP SIDING WITH NVIDIA

 

Setup:
Ryzen 7 5800X3DSapphire Nitro+ 7900XTX 24GB / ROG STRIX B550-F Gaming / Cooler Master ML360 Illusion CPU Cooler / EVGA SuperNova 850 G2 / Lian Li Dynamic Evo White Case / 2x16 GB Kingston FURY RAM / 2x 1TB Lexar 710 / iiYama 1440p 165HZ Montitor, iiYama 1080p 75Hz Monitor / Shure MV7 w/ Focusrite Scarlett Solo / GK61 Keyboard / Cooler Master MM712 (daily driver) Logitech G502-X (MMO mouse) / Soundcore Life Q20 w/ Arctis 3 w/ WF-1000XM3

 

CPU OC: -30 all cores @AutoGhz

GPU OC: 3Ghz Core 2750Mhz Memory w/ 25%W increase (460W)

Link to comment
Share on other sites

Link to post
Share on other sites

A lot of corporations use Employee Monitoring Software to deal with such issues.

After all it's a corporate computer - not a personal one.

 

The Best Employee Monitoring Software for 2023:

https://www.pcmag.com/picks/the-best-employee-monitoring-software

A PC Enthusiast since 2011
AMD Ryzen 7 5700X@4.65GHz | GIGABYTE GTX 1660 GAMING OC @ Core 2085MHz Memory 5000MHz
Cinebench R23: 15669cb | Unigine Superposition 1080p Extreme: 3566
Link to comment
Share on other sites

Link to post
Share on other sites

  • 3 months later...
On 3/23/2023 at 7:06 PM, Blqckqut said:

fire them or tell em to not do it lol

We made them sign the NDA, the GDPR treatment, and security paper work for them to sign. 

The other way that we haven't tried is to implement Login using Microsoft 365 Business or Enterprise account (we might plan to subs)

Link to comment
Share on other sites

Link to post
Share on other sites

On 3/23/2023 at 9:24 PM, Vishera said:

A lot of corporations use Employee Monitoring Software to deal with such issues.

After all it's a corporate computer - not a personal one.

 

The Best Employee Monitoring Software for 2023:

https://www.pcmag.com/picks/the-best-employee-monitoring-software

We don't want to monitor them too much, we want to give them flexibility for productivity. We want more toward their self awareness

Link to comment
Share on other sites

Link to post
Share on other sites

On 3/23/2023 at 8:06 AM, Blqckqut said:

fire them or tell em to not do it lol

It's harsh, but it's more or less standard procedure to outline employee responsibilities with corporate supplied computers as to what is allowed.  This was the case where I worked (been retired for a while now).  We were not permitted to install any software on a corporate PC other than a web browser of choice.  Certainly what the OP describes would have resulted in a firing for violating company policies.

Workstation PC Specs: CPU - i7 8700K; MoBo - ASUS TUF Z390; RAM - 32GB Crucial; GPU - Gigabyte RTX 1660 Super; PSU - SeaSonic Focus GX 650; Storage - 500GB Samsung EVO, 3x2TB WD HDD;  Case - Fractal Designs R6; OS - Win10

Link to comment
Share on other sites

Link to post
Share on other sites

  • 1 month later...

So the best way?   *

  1. go into bios; set password
  2. lock down boot options disable cdrom and usb boot
  3. turn on Secure Boot
  4. enable TPM module
  5. Setup GPO to turn on credential guard / Security Features
  6. Enable bitlocker and encrypt drive
  7. Change password; consider LAPS for unique admin per machine

First:

Bios options prevent cold boot attacks. Typical linux boot cdroms mount file system offline and rely on boot options being changed.

 

Second: Credential Guard 

Prevents secrets discovered in memory. Seperates credentual processes in a harded isolation env using hyperv

 

Third: Encryption 

Prevents someone taking disk drive out and mounting the SAM hive to reset the password 

Disk can only be read with TPM secrets stored on same workstation

 

Fourth:LAPS

Makes local admin passwords unique and temporary so if somehow password gets known can not be used by another machine. Sometimes local passwords get discovered or leaked by your admins.

 

Hope this helps 😀

 

Link to comment
Share on other sites

Link to post
Share on other sites

This only prevents admin accounts access not unauthorized programs from running.

Most torrents programs run without admin permissions 

 

Consider using in addition applocker to either

   Best: whitelist only approved programs

   Better: deny known unauthorized programs (like bit torrent programs)

 

Consider also only allowing programs with code signing signatures

These steps will also help prevent malware and ransomware

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, tech.guru said:

So the best way?   *

  1. go into bios; set password
  2. lock down boot options disable cdrom and usb boot
  3. turn on Secure Boot
  4. enable TPM module
  5. Setup GPO to turn on credential guard / Security Features
  6. Enable bitlocker and encrypt drive
  7. Change password; consider LAPS for unique admin per machine

First:

Bios options prevent cold boot attacks. Typical linux boot cdroms mount file system offline and rely on boot options being changed.

 

Second: Credential Guard 

Prevents secrets discovered in memory. Seperates credentual processes in a harded isolation env using hyperv

 

Third: Encryption 

Prevents someone taking disk drive out and mounting the SAM hive to reset the password 

Disk can only be read with TPM secrets stored on same workstation

 

Fourth:LAPS

Makes local admin passwords unique and temporary so if somehow password gets known can not be used by another machine. Sometimes local passwords get discovered or leaked by your admins.

 

Hope this helps 😀

 

I see

Link to comment
Share on other sites

Link to post
Share on other sites

5 hours ago, tech.guru said:

This only prevents admin accounts access not unauthorized programs from running.

Most torrents programs run without admin permissions 

 

Consider using in addition applocker to either

   Best: whitelist only approved programs

   Better: deny known unauthorized programs (like bit torrent programs)

 

Consider also only allowing programs with code signing signatures

These steps will also help prevent malware and ransomware

Interesting, Will try this one

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×