Skip to main content
Question

Admin Rights Justification

  • January 8, 2019
  • 36 replies
  • 240 views

Forum|alt.badge.img+8

Hi all,

I was hoping you could share your experiences in regards to allowing your user base to have full admin rights on their machines. I've had experience with both sides of the coin, but I know companies like IBM like to tout that they give their users full control, while others tend to lock them down completely.

I know admin rights can be a slippery slope, so I'm excited to hear your input!

36 replies

Forum|alt.badge.img+10
  • Valued Contributor
  • January 8, 2019

I don't see the point. We manage all the software distribution and self service. Certain things that need admin rights that I want to over ride like date/time, printers, setting DVD Regions, etc. I find a defaults write command to allow and apply it to their machines.

When I started at my current job with over 2,000 employees and they had admin rights -- it was insane the amount of malware, PUPs, etc that were installed that Virus Scanner did not catch. I have since migrated to a new Virus Scanner solution that helps but the first thing I did was remove admin privileges and have had no issues.

We created processes for users to request software and works well.


Forum|alt.badge.img+8

With all the latest changes Apple have in their OS, it moves in direction that users must have admin rights like it or not.

Typically these kind of "non admins" views comes from Windows companies that are used to have non rights "and that is how it should be" politics without knowing the difference from windows to MAC

Block all untrusted applications on Mac through gatekeeper, use SIP and look to more advanced antivirus solution on company network, that can lock computers out of the network connection if malware/virus is detected on a client. With admins rights or not users can still download from Appstore, which is typically why windows users have removed their access so nothing is installed. But for Mac it does not change anything as App Store is still open

As also many other write in similar topics, if users cannot behave with admins rights there are other problems that should be solved internally. I have been macadmin for 10 years or there about, and think I have seen couple of malware on Mac´s even without we have super educated users at all.

But of course are you working in a super security area like Bank etc admin rights are probably difficult to enable, as then security is just something you have to enable without even looking at the pros and cons


Forum|alt.badge.img+8
  • Valued Contributor
  • January 8, 2019

In a previous job we changed all users to Admin because of a request that "came from above". The network and firewalls were secure enough and we did have a team that provided constant monitoring. We did create a policy that all agreed upon; any Mac with spyware, malware, unauthorized apps, etc. that was discovered would be wiped and the user was then demoted to non-admin. This policy opens the door to better end user education on the risks and in the end, worked out quite well.


Forum|alt.badge.img+7
  • Contributor
  • January 8, 2019

I think it depends on your environment. Being a quaker school we are more lenient due to the cultural values of the school. We have tons of users that want to use Spotify, Google File Stream, and other free apps. We just have them sign a policy that says they will not install torrent clients and other inappropriate applications. We also use the restricted software to blacklist things we know are bad/common ones that people abuse, Epic Games for Fortnite (yes people still think playing games on their work issued computer is ok), MacKeeper, etc.

In a more corporate structure, it makes sense to see how much you can limit for liability purposes. When in doubt, I think having a written policy as part of employment obligations is a great way get halfway there.


Forum|alt.badge.img+3
  • New Contributor
  • January 9, 2019

From a pure IT Security perspective no matter the OS, users doing their everyday work with a account with admin rights is a bad thing. Accounts with Admin Rights are an open door for an assortment of malicious activities into what is supposed to be a secured corporate environment. If a user needs admin rights, they should be given a separate account with admin rights to be used only when necessary. Otherwise, you do your day to day work with an account without admin rights.


Forum|alt.badge.img+4
  • Contributor
  • January 9, 2019

When I started at my current job all staff had admin rights. We had multiple tickets a day of various performance issues, errors and virus related issues. The current model was to re-image every year, basically to clean up the machines and get them working again. Without telling anyone we removed admin rights at the next re-image. Since then the number of support tickets has dropped significantly and the user experience is much better. The most telling thing for me was most people didn't even notice they didn't have admin rights and even when we informed them overall they were ok with it since the user experience was so much better. No more slow or buggy machines, they just worked. To me the user experience is the most important thing and the only way to guarantee that is to limit whats installed on the machine. Any software that the staff would be installing most likely wont be coming from a big company (there is a reason its free) and who know what R&D they have done to make sure it works correctly with other applications. If you pair that with Self Service and the App Store I just can't see why to give them admin rights.


damienbarrett
Forum|alt.badge.img+19
  • Honored Contributor
  • January 9, 2019

I've written about this several times and have even presented at JNUC and PSU MacAdmins about how my school deals with this issue. All of our students are administrators on their Macs -- and here is the justification.

Similar to @tomhastings and @rhoward , we use administrative rights as an educational lever for our students. Before being allowed to be admins, each must take and pass a technology "Drivers Test" that we have created. They must prove they know about our AUP and what's in it, as well as knowing how to do basic management tasks like running software updates and avoiding malware and adware.

Is it perfect? No, of course not. I still have lots of students ignore the software update prompts and even more that believe MacKeeper is worthwhile software to install. However, the good still outweighs the bad here. For every student who doesn't fully understand basic stewardship of their computer, there is another who does. And every one of those is one more person in our world using computers successfully and competently. It's my opinion that locking down the computers and doing all the maintenance tasks for all users teaches the users nothing.


Forum|alt.badge.img+3
  • New Contributor
  • January 9, 2019

@damienbarrett Your situation sounds great for an academic environment, but the potential risk for a loss to business in a corporate environment is too high. Not to mention, every trouble ticket opened represents an overhead cost, and loss of productivity to the company. There isn't much room for altruism in the corporate computing environment when money is at stake.


Forum|alt.badge.img+8
  • Contributor
  • January 9, 2019

@gmendez If you mention tickets as 'costs' please do not overlook the fact that co-workers who have trouble doing their work, and spend hours to bypass the locked-down system are (hidden) costs too.
In general I feel that giving trust to users by making them admin is usually rewarded with good behaviour, and happy users, but all depends on the kind of users and the environment.


Eyoung
Forum|alt.badge.img+10
  • Contributor
  • January 9, 2019

admin at a school (1-2-1 macbook airs, grades 5-12). So this is from that perspective.

The kids are an easy no admin. Worked very hard to develop the Self Service culture. That combined with Google makes for pretty smooth running overall. I work with individuals who would benefit from being admin (development projects, internships, etc..), its worked out on a limited basis, case by case with written rules governing do's and don'ts

The adult population is where this gets interesting (interesting in the broadest sense at any rate)

I have a completely mobile adult population as well. The IT director mandated all adults be admins on their own laptop from day one when we swapped over from a shared environment. A large percentage of the population then began the never ending upgrading of Flash because, well I never really understood why perfectly sane looking people feel the need to install EVERYTHING the interewebs puts in front of you... but I digress. Malware, unlicensed software, general instability reigned.

Over the years I have quietly demoted adults to standard users, beginning with the offenders, especially repeat offenders. If I have to have the malware talk with you more than once you get a standard account. This goes back to building out Self service to meet needs.

Now the standard is to make all adults a standard user by default. Those in the know, who are generally responsible/savvy enough are gladly promoted to admin if requested. I like to think I reserve the right to take that privilege away but who am I kidding. Overall, those who get the promotion do fine, and find the added benefits worth it, with little to no overhead on my part supporting them. This pool of local admins is a small handful of people. The majority of the clients do not feel the pinch at all. They know to go to Self service for the odds and ends. I've had a goodly portion express to me that they are quite content to not have to worry about "messing up" their machines unwittingly. It makes the experience easier for them so they can get the tool out of the way of the work.


Forum|alt.badge.img+14
  • Valued Contributor
  • January 9, 2019

Admin at a community college here with about 160 Macs and 190 iPads. I'm full-time and just got a part-time person to help with things. We also have 5 full-time people each with 2-4 part-time people to handle about 3000 pc's. That is for desktop support only. I mention these numbers as the difference between having and not having admin on systems affects the strain from the amount of work that needs done. Admin access requires more resources.

Having said that a little background...we've had a number of cultural battles here over the years on this. I've been here for 21 years now and have served both Mac and Windows systems. We are currently locking down all student systems to no longer have admin. This wasn't always the case as some techs refused to invest in it because their rationale was that they could just put Deep Freeze on a system to keep it cleaned up. With newer OS's on both platforms Deep Freeze proved to not be reliable for the pace we were trying to achieve with upgrades. Either way I've never been a fan of it because it seems to always get in the way so I've ditched it in each area that I've supported and removed admin access. Keep in mind I'm talking about lab and classroom machines. Interesting enough my calls always go down in the labs when doing this. Removing admin privileges from students is more about protecting the system and ensuring the operation of them for classes since more than one student uses them. The only machines we have for students that I know of that are single user operated as those that our library lends out and I believe those are provided admin access. In those situations the student takes responsibility for their own operations. Labs and classrooms are locked down though.

With our faculty and staff we're still allowing them to have admin privileges and I don't know if that will ever change. Our president believes they all should have it while our CIO opposes it. Like I said we have cultural battles here. Some feel that there isn't any freedom if admin is removed(translation...I want my Spotify and games). Some feel that it's a waste of time to wait for us to install something that they could just easily do themselves. Some need to test software and that's where I admit that there are some who really do need some sort of access like so. As usual a blanket policy doesn't work well. For now though they all get admin. There are a few who we've tested removing admin from their systems and in each case calls went down drastically. Not only were there not calls about true problem issues but very little about needing to install anything.

There are arguments that sound good regarding keeping admin rights and in some cases I believe it really can work in the right scenario but I firmly believe that with a good evaluation of the situation, that most times removing them is going to be in everyone's best interests if you have to go with a blanket policy.

Keep in mind one avenue to explore for Macs anyways would be to provide admin on demand. Such a solution would have a user give themselves admin access for a set amount of time by clicking an icon in Self Service. There have been some here and elsewhere that have done this. I would love to do that here on our campus as I think it would help as a compromise but as of yet the Windows side doesn't know of a way to do this and the powers that be would like to keep both platforms similar in this regard.

As for those that say Apple is pushing in the direction that users need admin rights I would firmly argue against that. To me it seems easier than ever and this goes for Windows as well. If you're running into situations where admin solves an operational issue, I would ask if you're not putting the correct resources into dealing with the issue. Removing admin comes at a cost but so does providing admin access and then there are ethics and liability arguments that can come into play.

At any rate this question will probably rage on for decades.


Forum|alt.badge.img+12
  • Contributor
  • January 9, 2019

Shared machine users are not admins, so they can't mess it up for everyone else. Single user devices users are, if they break they soon learn when it either gets wiped to reset it or they spend quite while getting it fixed. That said we make sure they get updated, control OS version upgrades and blow crap such as mackeeper away by policies.


Hugonaut
Forum|alt.badge.img+15
  • Esteemed Contributor
  • January 9, 2019

All users are Non Admins - We have a self service script that grants users Admin Rights when they need them. Times out and makes them Standard user after a given amount of time.


Forum|alt.badge.img+10
  • Valued Contributor
  • January 9, 2019

@landon_Starr @Captainamerica @damienbarrett If you are security certified and/or a security professional you know that the most basic and fundamental concepts taught is least permissions. Which means users should only be given sufficient permissions to do their job. Permissions beyond that is considered permission issue that could lead to access violation. In my opinion as a security professional and systems administrator -- giving someone admin rights to "educate" them is not an exception -- it is our job to ensure the network and all client machines are secure at all times. No one outside of the tech department should have credentials to administer anything. @rhoward With MDM solutions that allow white listing apps, kext approvals, self service, etc. admin is not necessary. People want Spotify, Google File Stream, Dropbox...put it in self service. @tomhastings If you are solely relying on your firewall and network you are not adhering to the concept of defense in depth when it comes to Security in IT. I understand when it comes from top down sometimes you have no option but at that point I would have built a case and stated why that's a bad idea.


Forum|alt.badge.img+4
  • Contributor
  • January 9, 2019

I took a bunch of the "admin granting" tools from various sources on the forum and combined them in to one.

What we can do is allow users to elevate to admin level privileges for a specific amount of time. For example: for X minutes or permanently.

This works well because you can tie it to the needs of different user groups. Perhaps engineers need it for 4 hours while executive admins need it for just 15 minutes.


Forum|alt.badge.img+7
  • Contributor
  • January 9, 2019

While what you are saying is true, with a limited budget/staffing I manage 1000+ users and 1500+ Macs & iOS devices with just one other employee. The amount of time it takes to create packages, deal with specific requests for apps, etc doesn’t make sense for us to do this route for teachers. Now for our administration and staff that deal with financial records, student/business data, all of that lives on shares or things that require authentication using AD, Google or other sources that are cloud based. We have to do this for COPPA and many other compliances. We prevent data from being moved outside these parameters.

Again what I said goes back to knowing your culture/environment. When I was working for Apple, it was locked down (and for good reason) because that is the culture. Teachers who experiment with lessons and software regularly make it outside of our general ability to have it as strict as possible.


Forum|alt.badge.img+23
  • Valued Contributor
  • January 10, 2019

@gmendez In what way does a user with a local administrative account on macOS expose a company to a greater risk of data loss than a user with a standard account?


donmontalvo
Forum|alt.badge.img+36
  • Hall of Fame
  • January 10, 2019

+1 to @Chuey and @gmendez.

I've only ever managed Macs at large publicly traded companies, where disruptions/outages can cost a company a lot of money.

In our space, it is very rare that a user would need admin rights, but that's what the review process is for, protect the Firm, and enable the user.

Apple has a position that they market, because their audience is mom and dad.

Enterprise has a position that mandates protecting shareholder confidence and share price.

So there's more to the issue than security breaches, or data loss.

Although if my mom was a famous actress, I might risk giving all my users admin rights and not running anti malware software, since I know if I get fired I'll have a cushy job waiting for me.

The rest of us need to be employable and marketable, so unnecessary risk, or keeping up with the Joneses isn't a very smart option.

With all that said, to each his/her own, as everyone has to deal with a different set of responsibilities, different requirements, etc.


mark_mahabir
Forum|alt.badge.img+15
  • Jamf Heroes
  • January 10, 2019

All our users (the large majority of which are academic staff) are non-admin by default, but they can request a local administrator account via an online form if they need to be able to say, develop software or install packages when off the campus network.

For many years our Macs were self-managed, so when folks were migrated to our managed service they often got admin rights without too much justification. New users need to supply a few lines of justification, but we will grant those rights more often than not.


Forum|alt.badge.img+10
  • Valued Contributor
  • January 10, 2019

@milesleacy I can already think of 10 scenarios off the top of my head. That could not only put the company at risk but the users personal life.

From an ethical hacker, sys admin, and security professional mindset ....... hearing people say things like "why does it matter? What can possibly go wrong?" is exactly why companies suffer data breaches, peoples identities get stolen, bank accounts drained, etc.

Does everyone forget the weakest link to any organization? The end user.


damienbarrett
Forum|alt.badge.img+19
  • Honored Contributor
  • January 10, 2019

@Chuey None of your arguments are invalid or illegitimate. And you make some great points about protecting data and enhancing security. But I still believe that it's better to teach a person to fish rather than just giving him/her a fish when hungry. The more people we train to be good stewards of the technology they use, the better off everyone is. Arbitrarily locking down environments only teaches people that someone else will be responsible for applying security updates or protecting against malware and adware. I prefer to place the onus on the end-users and give them the tools and knowledge to manage their own systems.

As others have pointed out, this does not work in every environment. In mine, it does. Every day, I spend time showing users how to enable Flash for websites, how to apply security updates, how to see their uptime, how to manage their file systems, how to update their browsers, how to use password managers, and more. Every time, I know that it's one more person in the world better equipped for when they go to the Apple Store or the Microsoft store and buy their computer, set it up, and the account they create is an Admin account. Until the OS manufacturers start leaning away from this default model (not likely), I will keep doing this. It's a better paradigm, for a better world. I guess I prefer to be altruistic, not draconian. Positive instead of paranoid. Take it as you wish. I am pleased there are people out there very concerned about security. Everyone, including me and my user base, relies on you and other security researchers to help alert us to threats, around which we can educate and inform (and for some, immediately apply patches). The weakest link in any organization is indeed the end user. I work hard to make my users stronger computer users.


Forum|alt.badge.img+23
  • Valued Contributor
  • January 10, 2019

@Chuey Don't get me wrong, I fully understand that risk exists.

My question is how does having or not having a local administrative account on macOS affect risk?

What company or personal data is placed at greater risk when the user has an administrative account instead of a standard account?

I would argue that local administrative privileges have minor to no effect on the risk of data loss. For example:

- I can just as easily be phished when I have a standard account as I can when I have an administrative account.

- Local administrative privileges on my Mac do not grant any elevated access to data sources. If I am a bad actor and my macOS account is a standard account, and I have access to a sensitive data source, I can still leak that data. Having or not having local administrative privileges does not help or hinder my ability to exfil the data.

- With management tools like Jamf Pro, I can detect and take action when suspicious activity occurs.

- I can detect installs of undesired software or removal of required security tools or settings.

- Through 'compliance' smart grouping and/or complementary tools such as MS InTune, I can revoke access to sensitive apps/networks/etc. when a device is altered into an unacceptable state.

On the other hand, not having administrative privileges represents a major hit to UX & productivity and a significantly increased workload for IT.

This calls for a real cost/benefit analysis. Each org may come to different answers in that evaluation. However, I do argue that in general, local macOS administrative privileges in themselves do not introduce major risk.


Forum|alt.badge.img+14
  • Valued Contributor
  • January 11, 2019

@milesleacy I think context matters for much of this like how a system is managed and what policies exist regarding use and administration of said machine.

At a technical level though...in my environment we have several multiuser systems...most are lab and classroom systems as I work at a community college but we also have some office systems like this. Based on the class I took that I believe you taught in New York(awesome class btw if that was you), I'm quite sure you know that in having admin you then can invoke sudo and su as well as enable root. That ability alone can be dangerous for other users on the same machine. A few years ago I thought I would test whether I could, as a local admin, be able to access a mounted share by another user already logged in while fast user switching was enabled. It was incredibly easy to access. I was able to access that user's mounted Windows server file share and anything I did to a file appeared as if that user had done it. I'll admit I haven't tried this since then so maybe Apple has addressed this but my CIO was none too pleased to see how easy it was.

Several years ago before DEP was completely implemented we had users who would receive their system fully configured and then wipe it..."in the name of educating themselves how to install the OS and support it themself"...translation..."I want what I want and do what I want to do no matter how it impacts anyone else". It was pretty laughable because we regularly had to support them and routinely found things on the system that should not be there and caused their very problems. So much for remotely accessing inventory of anything about the machine with Jamf which was exactly one of the goals for some.

Basically part of the argument is that for any access you give, certain users can and will find a way to exploit it and that can take many forms with various degrees of impact. This then affects cost of support which then impacts cost to the company or institution. The overhead of just removing admin for most users is much less in most cases than managing every possible tool to monitor and fix systems that just might have the same overall impact in the end.

Lastly, I've actually found the exact opposite in that these days most people can get by just fine as a standard user. Not everyone as different jobs have different needs and that also goes back to why I was talking about context. The key, to me, is can the user get their work done? If it can be justified that they need admin then it has to happen; otherwise, admin should not be provided until that time.


Forum|alt.badge.img+10
  • Valued Contributor
  • January 11, 2019

@milesleacy

I would argue that local administrative privileges have minor to no effect on the risk of data loss.

That's a very bold statement -- You better go watch David Kennedy and see what he has to say about this very topic in InfoSec.

If you cannot think of what risks are associated with having this type of elevated access on a production network -- I can't help you.

But maybe a few of these will:

You Can remove local admin rights
Why to disable local admin on Servers
Why you should remove local admin
Reclaiming the Keys to the Kingdom in Higher Ed


Forum|alt.badge.img+7
  • Contributor
  • January 11, 2019

@Chuey all of those articles are still subjective to culture/environment and mostly reflect a Windows mentality. MacOS isn't built the same, it's primary function is to be a consumer device, not an enterprise device. We apply permissions on network shares and Windows machines very differently than we do on our Macs because of this. And with almost all of our systems (Google, Blackbaud, Citrix Remote Access, etc) are cloud based, actual business data doesn't live on the machine. If someone gets malware, our Cisco ISE takes it off wifi and notifies us. If a user installs applications that break our responsible use policy, they're removed right away using JAMF and we're notified.

The practice of keeping data safe and having good access control is something everyone should do. As @milesleacy said, data can be leaked even if you aren't a local admin. Once we gave our users local admin access, our ticket requests were cut in half.

Again, your environment/culture matters.