Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows » Grant Non-Domain Admin Privileges to Manage Workstation
  • hero windowsadmincenter
    Failed to create a scheduled task: Cannot perform the operation because the runspace pool is not in the open state Windows Server
  • LOGIN EE Modal View 1 12
    Pleasant User Group Permission and User Access Password Manager
  • printserver
    How to set up a Print Server on Windows Servers Windows
  • find my device banner
    How to Enable Find My Device on Windows 11 Windows
  • Featured image GettingWinReady
    Fix “Getting Windows Ready” Don’t turn off your computer stuck on Windows Windows
  • images
    Advantage of using a 3rd party software for Backup (N2WS by Veeam) over AMI Backup
  • retrieve SSL
    How to Retrieve an SSL Thumbprint in Windows using MMC Windows
  • Screenshot 2022 04 02 at 23.18.48
    CVE-2022-26503: Veeam Agent for Microsoft Windows Vulnerability Backup

Grant Non-Domain Admin Privileges to Manage Workstation

Posted on 18/06/202428/08/2024 Matthew By Matthew No Comments on Grant Non-Domain Admin Privileges to Manage Workstation
Grant Non-Domain Admin Privileges to Manage Workstation
Grant Non-Domain Admin Privileges to Manage Workstation

Managing workstations without domain administrator rights is not only possible but also enhances security by minimizing high-level access to Active Directory (AD). In this guide, we’ll walk through creating a dedicated AD group for workstation management and assigning it the necessary privileges using Group Policy. Please read Delete or Rename and Create a Protected Organisation Unit in AD, and Create and find Organisation Unit paths in AD.

Please see Change Active Directory Domain name from dot local to dot com, Batch rename multiple files on Windows, What are the effect of renaming an MBAM-Protected Computer, and Change the name of your macOS user account and home folder.

Step-by-Step Process: Creating an AD Group for Workstation Management

Let’s establish a management group in Active Directory for users who need administrative access to workstations.

Press the Windows key and search for Server manager to open the server management tool if not already launched.

Server Manager
Server Manager

In the Server Manager, select Active Directory Users and Computers from the Tools menu.

Active Directory Users and Computers
Active Directory Users and Computers

In the AD Users and Computers MMC, right-click the Users container. Choose New > Group from the menu.

Create a new container
Create a new container

Name the group “Workstation Administrators” and click OK.

Workstation Administrators
Workstation Administrators

In the Users container, double-click the newly created “Workstation Administrators” group, switch to the Members tab, and click Add.

Add member
Add member

Add the user accounts that need administrative access to workstations, and click OK to confirm.

Enter the object names
Enter the object names

Adding the New AD Group to Local Administrators Group

We will use Group Policy to add the “Workstation Administrators” group to the local Administrators group on all workstations.

Open Group Policy Management from the server manager Tools menu.

Group Policy Management
Group Policy Management

Expand your domain in Group Policy Management, and right-click your workstations Organizational Unit (OU).

Select Create a GPO in this domain, and Link it here.

Create new GPO
Create new GPO

Name the new GPO “Workstation Administrators” and click OK.

Workstation Administrators GPO
Workstation Administrators GPO

Expand your workstations OU, and right-click the new GPO and select Edit.

Edit GPO
Edit GPO

In the Group Policy Management Editor, navigate to Computer Configuration > Preferences > Control Panel Settings.

Right-click Local Users and Groups, and select New > Local Group.

Create a Local Group
Create a Local Group

In the New Local Group Properties window, select Administrators (built-in) from the Group name dropdown.

Select administrators (built-in)
Select administrators (built-in)

Click Add, then click the box next to Name.

Add local group member
Add local group member

Type “Workstation Administrators” and click OK.

Add workstation administrators
Add workstation administrators

Confirm by clicking OK again in the Local Member Group dialog.

Click OK to confirm
Click OK to confirm

Close the Group Policy Management Editor window.

The next time Group Policy is applied to the computers in the workstations OU, the AD\Workstation Administrators group will be added to the local Administrators group. This setup allows IT staff to manage workstations without needing domain admin privileges.

Conclusion

By creating a specific AD group for workstation management and linking it to the local Administrators group via Group Policy, you can grant necessary permissions without compromising your AD security.

This approach provides a more secure and controlled environment for managing workstations efficiently.

I hope you found this article useful on how to Grant Non-Domain Admin Privileges to Manage Workstation. Please feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows, Windows Server Tags:Active Directory, Active Directory Accounts, Windows Server 2016

Post navigation

Previous Post: Backup Mac with Veeam Agent for Mac to Synology DS923+ NAS
Next Post: How to create AWS Budget

Related Posts

  • banner
    Prevent Microsoft Edge from sending your Search data to Microsoft Windows
  • 1 WeXxkEX0JG3oB781HD8Hrg 1
    OOBESETTINGSMULTIPLEPAGE error on Windows 10 Windows
  • WindowsWebClientcoverPH67
    ​​​​​Install HTML Web Client for Microsoft RDS Windows
  • Screenshot 2020 10 31 at 10.35.37
    How to set the PowerShell Execution Policy via Windows Registry Windows Server
  • wac
    Fix Windows Admin Center cannot be reached Windows
  • How to pause updates and why
    How to Pause Windows Update via Windows Settings Windows

More Related Articles

banner Prevent Microsoft Edge from sending your Search data to Microsoft Windows
1 WeXxkEX0JG3oB781HD8Hrg 1 OOBESETTINGSMULTIPLEPAGE error on Windows 10 Windows
WindowsWebClientcoverPH67 ​​​​​Install HTML Web Client for Microsoft RDS Windows
Screenshot 2020 10 31 at 10.35.37 How to set the PowerShell Execution Policy via Windows Registry Windows Server
wac Fix Windows Admin Center cannot be reached Windows
How to pause updates and why How to Pause Windows Update via Windows Settings Windows

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • hero windowsadmincenter
    Failed to create a scheduled task: Cannot perform the operation because the runspace pool is not in the open state Windows Server
  • LOGIN EE Modal View 1 12
    Pleasant User Group Permission and User Access Password Manager
  • printserver
    How to set up a Print Server on Windows Servers Windows
  • find my device banner
    How to Enable Find My Device on Windows 11 Windows
  • Featured image GettingWinReady
    Fix “Getting Windows Ready” Don’t turn off your computer stuck on Windows Windows
  • images
    Advantage of using a 3rd party software for Backup (N2WS by Veeam) over AMI Backup
  • retrieve SSL
    How to Retrieve an SSL Thumbprint in Windows using MMC Windows
  • Screenshot 2022 04 02 at 23.18.48
    CVE-2022-26503: Veeam Agent for Microsoft Windows Vulnerability Backup

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.