<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable Duo for Windows Local Admin? in Deployment Strategy</title>
    <link>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879465#M73</link>
    <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Excellent suggestion, &lt;A class="mention" href="https://community.duo.com/u/macolinob"&gt;@macolinob&lt;/A&gt; ! Bypassing the local administrator account in the Duo Admin Panel (either via &lt;A href="https://duo.com/docs/policy#authentication-policy" rel="noopener nofollow ugc"&gt;Policy&lt;/A&gt; or setting the user to &lt;A href="https://duo.com/docs/administration-users#changing-user-status" rel="noopener nofollow ugc"&gt;Bypass status&lt;/A&gt;) can permit logon without 2FA.&lt;/P&gt;
&lt;P&gt;It may be a good idea to set your &lt;A href="https://duo.com/docs/rdp-faq#how-can-i-configure-the-fail-mode?" rel="noopener nofollow ugc"&gt;Fail Mode&lt;/A&gt; to &lt;EM&gt;open&lt;/EM&gt; in the event the local administrator needs to log in while the server is offline since Duo’s cloud service needs to be accessible in order to perform the bypass. Enrolling in &lt;A href="https://duo.com/docs/rdp#offline-access" rel="noopener nofollow ugc"&gt;Offline Access&lt;/A&gt; may be a cumbersome process if multiple server admins need to log in with the local admin account at any given (offline) time. The ability to exempt users locally via the Duo for Winlogon client (from the above process) is not available at this time.&lt;/P&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 29 Nov 2021 18:42:56 GMT</pubDate>
    <dc:creator>DuoPablo</dc:creator>
    <dc:date>2021-11-29T18:42:56Z</dc:date>
    <item>
      <title>Disable Duo for Windows Local Admin?</title>
      <link>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879462#M70</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;I am testing deploying to our fleet of Windows devices for our domain admin, server admin and maybe for RDP for regular users.&lt;/P&gt;
&lt;P&gt;We do leave the local admin account enabled on all systems and rotate the passwords weekly with LAPS.&lt;/P&gt;
&lt;P&gt;I can’t figure out how to exclude this account?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 20 Nov 2021 18:32:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879462#M70</guid>
      <dc:creator>LipidFault</dc:creator>
      <dc:date>2021-11-20T18:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Duo for Windows Local Admin?</title>
      <link>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879463#M71</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Hi &lt;A class="mention" href="https://community.duo.com/u/lipidfault"&gt;@LipidFault&lt;/A&gt; ,&lt;/P&gt;
&lt;P&gt;Installing Duo Authentication for Windows Logon adds two-factor authentication to &lt;STRONG&gt;all&lt;/STRONG&gt; interactive user Windows login attempts, whether via a local console or over RDP: &lt;A href="https://duo.com/docs/rdp#important-notes" class="inline-onebox" rel="noopener nofollow ugc"&gt;Duo Authentication for Windows Logon and RDP | Duo Security&lt;/A&gt;. At this time, there is no way to exclude certain accounts. Please also see &lt;A href="https://help.duo.com/s/article/1088?language=en_US" class="inline-onebox" rel="noopener nofollow ugc"&gt;Knowledge Base | Duo Security&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Please feel free to submit a feature request asking for this functionality via your Account Executive, Customer Success Manager if applicable, or our Support Team.&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 22 Nov 2021 21:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879463#M71</guid>
      <dc:creator>DuoPablo</dc:creator>
      <dc:date>2021-11-22T21:12:22Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Duo for Windows Local Admin?</title>
      <link>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879464#M72</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Why not make that user in Duo (example admin) and place them in a Duo group (example local admins) and set the group to bypass.  Add that group to the RDP logon groups.  That should allow that user to bypass Duo security.  Does that make sense?&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 24 Nov 2021 12:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879464#M72</guid>
      <dc:creator>macolinob</dc:creator>
      <dc:date>2021-11-24T12:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Disable Duo for Windows Local Admin?</title>
      <link>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879465#M73</link>
      <description>&lt;DIV class="duo-migrated-content"&gt;&lt;P&gt;Excellent suggestion, &lt;A class="mention" href="https://community.duo.com/u/macolinob"&gt;@macolinob&lt;/A&gt; ! Bypassing the local administrator account in the Duo Admin Panel (either via &lt;A href="https://duo.com/docs/policy#authentication-policy" rel="noopener nofollow ugc"&gt;Policy&lt;/A&gt; or setting the user to &lt;A href="https://duo.com/docs/administration-users#changing-user-status" rel="noopener nofollow ugc"&gt;Bypass status&lt;/A&gt;) can permit logon without 2FA.&lt;/P&gt;
&lt;P&gt;It may be a good idea to set your &lt;A href="https://duo.com/docs/rdp-faq#how-can-i-configure-the-fail-mode?" rel="noopener nofollow ugc"&gt;Fail Mode&lt;/A&gt; to &lt;EM&gt;open&lt;/EM&gt; in the event the local administrator needs to log in while the server is offline since Duo’s cloud service needs to be accessible in order to perform the bypass. Enrolling in &lt;A href="https://duo.com/docs/rdp#offline-access" rel="noopener nofollow ugc"&gt;Offline Access&lt;/A&gt; may be a cumbersome process if multiple server admins need to log in with the local admin account at any given (offline) time. The ability to exempt users locally via the Duo for Winlogon client (from the above process) is not available at this time.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 29 Nov 2021 18:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/deployment-strategy/disable-duo-for-windows-local-admin/m-p/4879465#M73</guid>
      <dc:creator>DuoPablo</dc:creator>
      <dc:date>2021-11-29T18:42:56Z</dc:date>
    </item>
  </channel>
</rss>

