IncidentResponsev2

Restrict Non-IR Personnel Access

Task Restrict Access to Critical Systems to Only Authorized Incident Response Personnel

Conditions

Given domain credentials with the appropriate permissions and an incident in progress, the operator will limit access to sensitive systems, impacted hosts, and critical infrastructure to only members of the approved Incident Response (IR) team.

Operator Note: Restricting access during containment prevents accidental or malicious tampering, reduces risk of malware spreading, and preserves forensic integrity.

Standards

End State

Non-IR personnel are prevented from logging into or accessing critical incident systems. Only designated IR team members have access until containment is complete.


Notes


Manual Steps

Step 1: Identify Impacted Systems


Step 2: Identify and Prepare IR Team Accounts

New-ADGroup -Name "IR-Access-Only" -GroupScope Global -Path "OU=IncidentResponse,DC=example,DC=com"
Add-ADGroupMember -Identity "IR-Access-Only" -Members "user1","user2","user3"

Operator Note: If available, always use group membership vs. individual accounts for easy rollback.


Step 3: Restrict Access Using Group Policy (Preferred)

Open Group Policy Management Console (GPMC):

gpmc.msc

Create or edit GPO:

Computer Configuration → Windows Settings → Security Settings → Local Policies → User Rights Assignment → Allow log on locally
gpupdate /force

Step 4: Block Remote Access via Firewall (Optional Enhancement)

New-NetFirewallRule -DisplayName "Block RDP" -Direction Inbound -Protocol TCP -LocalPort 3389 -Action Block

Operator Note: Use this to prevent RDP access except from known IR jump hosts.


Step 5: Validate Access Restrictions

Get-EventLog -LogName Security -InstanceId 4625 -After (Get-Date).AddHours(-1)

Operator Note: Event ID 4625 indicates failed logon attempts.


Running Script (Automated Access Restriction)

# Create IR team group and restrict logon locally on target system
$IRGroup = "IR-Access-Only"
New-ADGroup -Name $IRGroup -GroupScope Global -Path "OU=IncidentResponse,DC=example,DC=com"
Add-ADGroupMember -Identity $IRGroup -Members "user1","user2"

# Set local policy (manual via GPO recommended, but can script with LGPO or secedit)
# Force GPO update
gpupdate /force

Dependencies


Other Available Tools

Tool Platform Use Case
GPMC (gpmc.msc) Windows Preferred method for large scale access restriction
Local Group Policy Editor (gpedit.msc) Windows Non-domain systems
PowerShell (New-ADGroup, Add-ADGroupMember) Windows IR team group management
Windows Firewall (netsh, PowerShell) Windows Block remote access
VPN or NAC solutions Cross-platform Network level access restriction

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

Microsoft Group Policy: User Rights Assignment
PowerShell AD Module Documentation
Windows Firewall PowerShell Commands


Revision History

Date Version Description Author
2025-05-02 1.0 Fully generated operator guide for restricting non-IR access with GPO, PowerShell, firewall and checklist Leo