Given domain credentials with the appropriate permissions and an incident in progress, the operator will limit access to sensitive systems, impacted hosts, and critical infrastructure to only members of the approved Incident Response (IR) team.
Operator Note: Restricting access during containment prevents accidental or malicious tampering, reduces risk of malware spreading, and preserves forensic integrity.
Non-IR personnel are prevented from logging into or accessing critical incident systems. Only designated IR team members have access until containment is complete.
New-ADGroup -Name "IR-Access-Only" -GroupScope Global -Path "OU=IncidentResponse,DC=example,DC=com"
Add-ADGroupMember -Identity "IR-Access-Only" -Members "user1","user2","user3"
Operator Note: If available, always use group membership vs. individual accounts for easy rollback.
gpmc.msc
Computer Configuration → Windows Settings → Security Settings → Local Policies → User Rights Assignment → Allow log on locally
gpupdate /force
New-NetFirewallRule -DisplayName "Block RDP" -Direction Inbound -Protocol TCP -LocalPort 3389 -Action Block
Operator Note: Use this to prevent RDP access except from known IR jump hosts.
Get-EventLog -LogName Security -InstanceId 4625 -After (Get-Date).AddHours(-1)
Operator Note: Event ID 4625 indicates failed logon attempts.
# Create IR team group and restrict logon locally on target system
$IRGroup = "IR-Access-Only"
New-ADGroup -Name $IRGroup -GroupScope Global -Path "OU=IncidentResponse,DC=example,DC=com"
Add-ADGroupMember -Identity $IRGroup -Members "user1","user2"
# Set local policy (manual via GPO recommended, but can script with LGPO or secedit)
# Force GPO update
gpupdate /force
Tool | Platform | Use Case |
---|---|---|
GPMC (gpmc.msc) | Windows | Preferred method for large scale access restriction |
Local Group Policy Editor (gpedit.msc) | Windows | Non-domain systems |
PowerShell (New-ADGroup, Add-ADGroupMember) | Windows | IR team group management |
Windows Firewall (netsh, PowerShell) | Windows | Block remote access |
VPN or NAC solutions | Cross-platform | Network level access restriction |
Microsoft Group Policy: User Rights Assignment
PowerShell AD Module Documentation
Windows Firewall PowerShell Commands
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Fully generated operator guide for restricting non-IR access with GPO, PowerShell, firewall and checklist | Leo |