We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Securing your Environment with Just Enough Administration

Formal Metadata

Title
Securing your Environment with Just Enough Administration
Title of Series
Number of Parts
60
Author
License
CC Attribution - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language
Producer
Production Year2018

Content Metadata

Subject Area
Genre
Abstract
Giving everyone, local administrator or domain administrator privileges is a really bad idea. Even the best of admins makes mistakes which can have unexpected consequences. With JEA we can truly follow the model of least privilege access giving admins the rights they need to do their job. No matter how big or small your environment is, giving every administrator unnecessary elevated privileges can result in data loss, or theft due to mistakes or rogue administration. Now with Just Enough Administration (JEA) we can truly follow the model of least privilege access and give admins, helpdesk technicians, developers (the list goes on) the rights they need to do their job, without bugging you, but still maintaining security best practices. We will not only go over how to configure JEA but will also show you how to properly configure and deploy it to an already existing infrastructure (without using DSC) but using remote PowerShell commands and GPO’s Speakers