Submit a ticketCall us

Solarwinds & Cisco Live! Barcelona
Join us from the 29th of January to the 2nd of February at Cisco Live 2018 in Barcelona, where we will continue to show how monitoring the network with SolarWinds will keep you ahead of the game. At our booth (WEP 1A), we will demonstrate how SolarWinds network solutions can help. As a bonus, we are also hosting a pre-event webinar - Blame the Network, Hybrid IT Edition with our SolarWinds Head Geek™, Patrick Hubbard on January 24th - GMT (UTC+0): 10:00 a.m. to 11:00 a.m. There's still time to RSVP.

Home > Success Center > Server & Application Monitor (SAM) > This account must be an Active Directory account with local administrative privileges

This account must be an Active Directory account with local administrative privileges

Overview

This account must be an Active Directory account with local administrative privileges.

Environment

All SAM versions

Resolution

To verify the user is a member of the local 'Administrators' group, perform the following:
Open a PowerShell session, and type the following commands:
$Recurse = $true
$GroupName = 'Administrators'
Add-Type -AssemblyName System.DirectoryServices.AccountManagement
$ct = [System.DirectoryServices.AccountManagement.ContextType]::Machine
$group = [System.DirectoryServices.AccountManagement.GroupPrincipal]::FindByIdentity($ct,$GroupName)
$LocalAdmin = $group.GetMembers($Recurse) | select @{N='Domain'; E={$.Context.Name}}, samaccountName, @{N='ObjectType'; E={$.StructuralObjectClass}} -Unique
$LocalAdmin = $LocalAdmin | Where-Object {$_.ObjectType -eq "user"}
$LocalAdmin


If service account is not a local administrator, perform the following:

  1. open a Computer Management console on the server where you wish to grant local administrative privileges.
  2. Navigate to System Tools/Local Users and Groups/Groups and double click the Administrators group.
  3. Click the Add button and type in the Active Directory username of the account you which to grant administrative privileges and hit Enter. Instead of an individual user object, you can alternatively add an AD group which contains the user object. (Ensure the location is set to either the domain where the account is located or Entire Directory.)
  4. Click the Apply button and then the OK button.

 

 

Last modified

Tags

Classifications

Public