Hi guys,
I am currently running a cleanup on my Active Directory and looking for domain accounts with too many rights which I can disable (security risks e. g. account can be delegated or password never expires). And SEC creates a lot of groups and users :D For example there's a "SophosSAU<servername>aaa" for each domain controller (description: to download sophos-updates > password never expires). I think because it's not possible to create local admins on a DC, fair enough.
But there are two accounts with builtin administrator-rights and I am not able to find any documentation about this accounts:
SophosEmLibUser1 (password never expires, can be delegated, member of builtin groups "Administrators", "SophosAdministrator" and also "Domain-user", description "Sophos EM Library Account")
SophosEndpointUpdate (password never expires, can be delegated, member of builtin groups "Administrators" and "Users" and also "Domain-user", description "Sophos AutoUpdate Account")
Are this old accounts and are they save to delete/disable? I think they were created at a inital installation of sophos EC in the AD. Where should I look if they are used by some services?
I used process explorer to take a look if there's any service on the SEC server that uses one of the accounts, but most of the services runs as local service oor system-account. Some parts are running on a sophos-user I created at the last move of SEC to a new server (Sophos.FrontEnd.Service.exe, PatchServerCommunicator.exe, PatchEndpointOrchestrator.exe and PatchEndpointCommunicator.exe).
Maybe one of them is used to install the clientpart? But why do I have to type in administration-credentials of the client where i want to install Sophos Endpoint Security? And Sophos Update Manager seems to run on a local account on the SEC server named "SophosUpdate".
I hope someone can help me with this two accounts :)
Best regards, Toby
PS: running on SEC 5.5.1
This thread was automatically locked due to age.