SAMIT: Do You Really Need Active Directory
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
thank you actually answering the question, not just berating me for asking it.
No, he's pandering. He's letting the implication lead that "something" is needed. But nothing is "needed". All those things are good and have value at times. But central application deployment, central identity, central device policies are all "extras" that can be good, can have value, but are not needs. And also, AD doesn't provide all of those.
Your question implies so much... that AD actually manages systems for example, and that management is needed. His examples act as if AD is something it is not, and that the things AD is not, are necessary.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Many of these options are Super expensive compared to an AD implementation
This isn't necessarily true. AD is anything but cheap. Server infrastructure, Windows server licensing, CALs, managing all of those pieces, etc. AD isn't overly expensive, but it's not cheap either. There are situations where everyone one of the products he mentions is cheaper, and situations where every one (I think) is more expensive. It's not a costly vs. cheap, it's different pricing models.
AD is pretty cheap for an existing Windows server based shop (CALs already purchased) with 100 devices on a single LAN, for a single legal org. But once any piece of that changes (and your example didn't specify that) AD can fall down really quickly... if you don't have enough devices, if you need CALs just for this, if you don't have a single LAN or a single legal entity. Change any factor and AD costs can skyrocket.
Not only can cost skyrocket, but they can make the management overhead actually higher, not lower, than doing nothing at all. It's a far more complex thing to approach than simply throwing out that AD does X, X is needed, what's the alternative. The bottom line is... X isn't necessarily needed, AD doesn't do X, and so an alternative isn't necessarily necessary.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
SMB shares is a pretty good example - assuming 100 users, how do you manage the password lists between the PC's and the SMB share (assume a NAS device)?
The point of mentioning SMB in my example is that it is a service designed around the purpose of selling AD. You fix it by removing services put in for that purpose. Don't use SMB, and suddenly AD seems like a really silly amount of overhead for a lot of shops. And these days, the use of mapped drives is dropping fast, really fast. Even shops without IT oversight are often opting out of it for more modern systems because SMB hasn't met the needs of most modern companies in a decade or even two.
-
So what's your starting point? And I realize that this is almost a trick question, because you coming into an existing environment of 100+ units isn't greenfield, so the starting point is already past.
Let's say we're at 100+ already - have AD, and it's time to start looking at new licensing for that AD - what's your general way of going? I'm guessing you're going to say - it depends - what are the requirements.
We'll use my office then for requirements - must be HIPAA compliant. So I have to show that AV is installed (and I assuming I have to show it's getting updates - but maybe I don't HAVE to), I'm pretty sure I have to show that updates are being applied.
I think those are the two main things at the PC level I need for HIPAA compliance. or do you disagree with those?
But more things of note for my environment - user needs to be able to log into roughly 60 different computers.
it would be nice that upon logon, as I currently have - shortcuts are setup, printers are setup, Outlook will configure mostly if not entirely automatically. -
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
SMB shares is a pretty good example - assuming 100 users, how do you manage the password lists between the PC's and the SMB share (assume a NAS device)?
The point of mentioning SMB in my example is that it is a service designed around the purpose of selling AD. You fix it by removing services put in for that purpose. Don't use SMB, and suddenly AD seems like a really silly amount of overhead for a lot of shops. And these days, the use of mapped drives is dropping fast, really fast. Even shops without IT oversight are often opting out of it for more modern systems because SMB hasn't met the needs of most modern companies in a decade or even two.
yeah I get that - Google Drive/NC/DropBox - the mobility aspects are nice.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Since you have nothing pushing out driving mappings since you have no centralized authority, this has to be done by hand... so do you make it LANless - create 100 accounts on the NAS and give those accounts to the users where they then manually map a drive?
AD is neither a central authority nor does it "push out" anything. AD does nothing of the sort. We just had this thread...
https://mangolassi.it/topic/21063/anyway-i-can-learn-ad/
@WrCombs said in Anyway I can Learn AD?:
What is Active Directory?
It is literally a directory service. It is called Active because it's a good marketing name, and because individual systems are constantly updating their own information in the directory
AD is a central "white pages" like service where computers and applications on the network can literally "look up" information about computers or users. Like they can look up a users full name, their extension number, or their email address. Very basic in concept, but obviously super useful.
how is it used? (I think I understand this on a basic level)
It's basic fundamental use case is to store a list of computers on your authorized network, and a list of users for those machines. And the one really cool feature is that it can tell a computer on the network if the password it was given for a user is valid.
I worded that carefully. The password is not send to AD, AD doesn't hand out password, etc. AD maintains a list of password hashes and will give a pass/fail response to a node asking if a user is who they say that they are.
That's basically it. AD also maintains a list of groups to which computers and/or users can belong.
That's really it. The moment that you feel AD does something more than "look up" some basic info, some understanding is wrong. It's extremely simple (and powerful) in what it does. Most people associate AD with all kinds of things that aren't AD, but that commonly use AD. AD itself is a very, very simple directory service. It's magic is that it is fast and secure, not that it does anything special.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
SMB shares is a pretty good example - assuming 100 users, how do you manage the password lists between the PC's and the SMB share (assume a NAS device)?
The point of mentioning SMB in my example is that it is a service designed around the purpose of selling AD. You fix it by removing services put in for that purpose. Don't use SMB, and suddenly AD seems like a really silly amount of overhead for a lot of shops. And these days, the use of mapped drives is dropping fast, really fast. Even shops without IT oversight are often opting out of it for more modern systems because SMB hasn't met the needs of most modern companies in a decade or even two.
yeah I get that - Google Drive/NC/DropBox - the mobility aspects are nice.
Yes, and today most companies have some portion that is mobile that expects to "just work" because it does for everyone else. SMB makes a "just doesn't work" for most mobile users and in many ways just doesn't fit in the majority of the modern world. The only cases where we still see it are clinics where it is just "in clinic data" and AD is of no use even with that SMB, or in legacy situations where they want to phase it out and just need time.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
So what's your starting point? And I realize that this is almost a trick question, because you coming into an existing environment of 100+ units isn't greenfield, so the starting point is already past.
Right, designing a company to not need AD is typically trivial. Moving an AD-entrenched company off of AD is often difficult because workflows and everything else are based around how AD works and systems that AD has tendrils into are often deployed (GPO, SMB, etc.)
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
Let's say we're at 100+ already - have AD, and it's time to start looking at new licensing for that AD - what's your general way of going? I'm guessing you're going to say - it depends - what are the requirements.
Correct, it depends. And often we keep AD in those cases, because while it might not be ideal, it's often too costly to remove. Or the removal process will take "generations" in IT terms.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
We'll use my office then for requirements - must be HIPAA compliant. So I have to show that AV is installed (and I assuming I have to show it's getting updates - but maybe I don't HAVE to), I'm pretty sure I have to show that updates are being applied.
AV is part of the OS. There's really nothing to show. You'd have to have removed it. And updates are automatic, again, you'd have to have disabled them. If you are audited, each machine shows you the status. That's trivial.
-
After reading this I have a few questions as well. Hopefully the answers will be a benefit to this topic. I don't have a use-case so this is just in theory if possible. To me I think Powershell would be a good way to do a lot of this but I'm not an admin so want to hear others opinions also.
- What is the best way to handle accounts without Ad?
- What are alternatives to typical AD tasks?
- Is there a good directory service alternative to AD?
- Can I use Windows Admin Center for a lot of this?
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
I think those are the two main things at the PC level I need for HIPAA compliance. or do you disagree with those?
I agree that you need them and that they are good things. But they aren't things requiring, or suggesting, any centralization.
-
@jmoore said in SAMIT: Do You Really Need Active Directory:
> 1. What is the best way to handle accounts without Ad?
This is very broad. The best way for most shops is "do nothing". Most companies "manage accounts" because they were told this is why they needed AD, and they bought AD, so they need to do it to justify it. But generally you don't need to do this. AD doesn't provide this benefit for us as an MSP, and we don't need it, so that's a good example of just not having it. Obviously accounts DO need to be managed, but just locally on machines is really fast and easy. I do this all day, every day, and it is often faster to do it locally than to even access an AD server.
But if you need account management, you can use CMD or PS scripts, you can use tools like RMM, you can use state machines like Salt or Ansible, you can use online services like AzureAD or Centrify.
> 2. What are alternatives to typical AD tasks?
AD itself doesn't have any typical tasks. Other than what you mention otherwise... looking up passwords and group membership. Those things are done on the local machine natively when AD is removed. So for the actual tasks associated with AD proper, just disable AD and they shift to the local machine where half of them were done anyway even with AD.
All tasks that people associate with AD are still available without AD. If you are thinking SMB shares, those still work without AD. If you are thinking GPO, that still is available without AD. What are you feeling are "AD tasks"? Most AD tasks are... managing AD, which is obviously unneeded without AD.
> 3. Is there a good directory service alternative to AD?
AD is just a copy of LDAP. There are many free and non-free LDAP options. Although you'd be hard pressed to come up with why you'd choose LDAP without AD, when AD has free options (Samba's AD is 100% free.) So once you are trying to replicate AD, youd' just use AD. The question really doesn't make sense in a local mode... the question should be "why do you need a directory service?" Because this is rarely used today, AD kind of fell flat on this one and most people ignore this functionality.
If you really need it, you have to define what for. You could use a shared notepad, a service like AzureAD, any number of things. But since this isn't a predictable use case, we'd have to know exactly what you are trying to use directory services for. For example, NTG uses a wiki page listing people's phone numbers. It's faster and easier than pulling those phone numbers from AD's directory.
> 4. Can I use Windows Admin Center for a lot of this?
No, it depends on AD WAC, like SMB and GPO, is meant to sell AD.
-
I don't want to make AD sound bad, it isn't. It's a great tool, but just one of many tools for doing tasks that many people don't need done. A circular saw is a great tool for certain tasks, but the average person needs no saw at all, and people who are sawing only need a circular saw part of the time. It's great for cutting lumber lengths, but terrible at removing tree limbs, and doesn't knit at all.
One of the key problems with AD is circular reasoning. "We need AD, because we want what AD does, we want what AD does, because we paid for AD" and around we go. If you remove AD (greenfield) from the design, often all of the needs for AD disappear with it. The moment you add AD, AD is needed. So if you accidentally include the "needs created by having AD" in your design, because most people have been taught to do this, then AD is the obvious answer. But if you leave out those pieces, it's often unclear why AD even comes up.
-
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
We'll use my office then for requirements - must be HIPAA compliant. So I have to show that AV is installed (and I assuming I have to show it's getting updates - but maybe I don't HAVE to), I'm pretty sure I have to show that updates are being applied.
AV is part of the OS. There's really nothing to show. You'd have to have removed it. And updates are automatic, again, you'd have to have disabled them. If you are audited, each machine shows you the status. That's trivial.
So you've been through an audit and the auditor allowed you to say - and to see the status of each machine's AV level - we'll be going around to every machine now - and they still passed your audit?
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
So you've been through an audit and the auditor allowed you to say - and to see the status of each machine's AV level - we'll be going around to every machine now - and they still passed your audit?
It meets the requirements. Are you saying that your auditor will require that you run a quick PowerShell script instead? One, that seems to make no sense. And two, that's such an easy fix that it's not worth mentioning.
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
and they still passed your audit?
At what point do you file a fraud case against them for intentionally working to sell you services that aren't related to what they are auditing?
Your issue isn't with HIPAA, but with a belief that a crooked auditor will try to extort you and that it is better to roll over and do something unnecessary because the auditors are really Microsoft salespeople. I find it unlikely that an auditor would risk their careers over something so trivial, especially as it could easily turn into a criminal case.
-
I think it is safe to assume that assuming an auditor will make up a requirement that isn't suggested and doesn't exist, and then building your infrastructure around that assumption, makes little sense. You could use that logic to do absolutely anything.
This is such a trivial thing to work around, and doctors do this every day. To assume that your auditor will make your HIPAA requirements different than the rest of the world... is a bizarre assumption unless you know you are dealing with a criminal and aren't taking the necessary legal action, but in that case, they will just find something else to extort you over.
But even if the auditor decides to require this, there is no reason to assume AD is the solution. AD doesn't do anything for AD or updates in fact. So how that helps the auditor, I have no idea.
-
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
I think it is safe to assume that assuming an auditor will make up a requirement that isn't suggested and doesn't exist, and then building your infrastructure around that assumption, makes little sense. You could use that logic to do absolutely anything.
This is such a trivial thing to work around, and doctors do this every day. To assume that your auditor will make your HIPAA requirements different than the rest of the world... is a bizarre assumption unless you know you are dealing with a criminal and aren't taking the necessary legal action, but in that case, they will just find something else to extort you over.
But even if the auditor decides to require this, there is no reason to assume AD is the solution. AD doesn't do anything for AD or updates in fact. So how that helps the auditor, I have no idea.
OK OK OK - you win.. I'm clearly over thinking this. they can't require a way to get the information - so if I want them to get it by visiting every machine - that's my prerogative.
Though as you said - a PS script can do it (and well, we assume as IT we have the local admin account password so we can do this at a network level - alright... )
-
@Dashrender said in SAMIT: Do You Really Need Active Directory:
@scottalanmiller said in SAMIT: Do You Really Need Active Directory:
@Dashrender said in SAMIT: Do You Really Need Active Directory:
We'll use my office then for requirements - must be HIPAA compliant. So I have to show that AV is installed (and I assuming I have to show it's getting updates - but maybe I don't HAVE to), I'm pretty sure I have to show that updates are being applied.
AV is part of the OS. There's really nothing to show. You'd have to have removed it. And updates are automatic, again, you'd have to have disabled them. If you are audited, each machine shows you the status. That's trivial.
So you've been through an audit and the auditor allowed you to say - and to see the status of each machine's AV level - we'll be going around to every machine now - and they still passed your audit?
AD doesn't provide this... Am I missing something?