Problem after applying the Deny Log on locally GPO setting

Mikhail Firsov 1,876 Reputation points
2021-07-13T09:01:04.887+00:00

Hello!
While testing tiered AD infrastructer I was greatly suprised to see how one of the key gpo parameters is working.
Suppose there's a domain controller - DC - which belongs to Tier0 OU (with no gpo applied except the Default Domain Policy) and a number of servers in the SERVERS OU (Tier1) to which the gpo with the following setting is applied:
114134-q01.png

The most important idea in the tiered AD model is preventing the cross-tier logons - in other words, you should not be able to log on to Tier1 servers under Tier0 accounts - in my case it means I shouldn't be able to use any domain/enterprise admin accounts (which are Tier0 accounts) for logging onto Tier1 servers (in the SERVERS OU), and the aforementioned Deny log on locally policy setting is the setting that is supposed to do exactly that.

And it really does what I expect it to do - any domain/enterprise-wide administrative accounts can no longer log on to Tier1 servers - so far so good, but... either I'm missing something or enabling this option may lead to other - rather weird - consequences.

Once again: here's the MS's explanation of the Deny log on locally parameter:
114153-q02.png

As far as I understand this text it means that the ONLY goal of this parameter is to deny log on locally TO THIS COMPUTER for the defined accounts.

Why in this case I'm loosing the ability to connect to DC right after the policy gets applied?

For example, when I try to access \dc as Domain\AdminT1 I see this:

114109-q03.png

ANY domain user can access ANY domain computer by default so what is preventing Domain\AdminT1 from accessing \DC AFTER applying the policy ???

There're other gpo settings being applied but they do not have any effect on the possibility to connect to \dc - as soon as I delete the domain admins/enterprise admins accounts from the policy \dc gets accessible again:

114193-q04.png

114155-q06.png

???

Windows Server 2019
Windows Server 2019
A Microsoft server operating system that supports enterprise-level management updated to data storage.
3,463 questions
Windows Server 2016
Windows Server 2016
A Microsoft server operating system that supports enterprise-level management updated to data storage.
2,373 questions
Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
12,151 questions
Windows Server Management
Windows Server Management
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Management: The act or process of organizing, handling, directing or controlling something.
421 questions
Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,724 questions
0 comments No comments
{count} votes

7 answers

Sort by: Most helpful
  1. Fan Fan 15,291 Reputation points Microsoft Vendor
    2021-07-14T00:56:30.553+00:00

    Hi,
    Based on my understanding, the domain controllers are in the default domain controller OU, and only the domain admins can logon locally.

    The member servers are in the server OU, the admins can't logon to (deny logon locally policy GPO was linked on the server OU), but other users can.

    When logon to the servers with admin 1, DCs can't be accessed.

    If i misunderstand you, feel free to let me know.

    I also did a test in my lab, define the policy: deny logon locally with the domain admins.
    But the DCs was not impacted from the policy on the servers.

    It is suggested confirming the group policy on the servers and DCs by the command:
    Gpresult /h report.html.

    Best Regards,

    0 comments No comments

  2. Mikhail Firsov 1,876 Reputation points
    2021-07-14T06:51:35.85+00:00

    Hi FanFan-MSFT,

    "Based on my understanding, the domain controllers are in the default domain controller OU, and only the domain admins can logon locally.
    The member servers are in the server OU, the admins can't logon to (deny logon locally policy GPO was linked on the server OU), but other users can.

    *When logon to the servers with admin 1, DCs can't be accessed." - yes, you are right!


  3. Mikhail Firsov 1,876 Reputation points
    2021-07-16T07:26:37.727+00:00

    Sorry for the delay...

    DC:
    115343-527.png

    Server:
    115362-526.png


  4. Mikhail Firsov 1,876 Reputation points
    2021-07-19T07:16:18.02+00:00

    "Did you try logon the server with other users?" - no, I didn't, there's only one administrative account for the tier1.

    "can you check the settings on the 2 GPOs?" - sorry, I just don't understand what should I be looking for... I already know that it is the Deny Log on policy that prevents AdminT1 from making NETWORK connections to \DC (and yes, there're no any additional GPOs applied to DC except the defaults ones).


  5. Mikhail Firsov 1,876 Reputation points
    2021-07-22T08:41:20.17+00:00

    "Check if there are following settings configured on the DCs:" - no, they are not configured.