Share via

'Deny log on through Terminal Services' and 'Deny log on locally'to the domain service account that runs SQL Server AlwaysOn cluster

Mona Seddik 20 Reputation points
2026-05-12T12:20:15.79+00:00

We are planning to apply Active Directory Group Policy settings — 'Deny log on through Terminal Services' and 'Deny log on locally' — to the domain service account that runs SQL Server cluster, SQL Server Always On services, and SQL Agent across our 16 SQL Server clusters. Before implementation, we need Microsoft’s guidance on whether these policies will negatively impact SQL Server Always On availability group functionality, failover behavior, or cluster health?

SQL Server Database Engine

1 answer

Sort by: Most helpful
  1. Q&A Assist
    2026-05-12T12:21:00.76+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Applying “Deny log on locally” and “Deny log on through Terminal Services” to the domain service account that runs SQL Server, SQL Agent, and Always On/WSFC will not, by itself, break Always On availability groups, WSFC health, or failover, provided that:

    1. The SQL Server and SQL Agent services are already configured to run under that account as a service account, and
    2. No operational or maintenance process depends on that account performing interactive logons (console or RDP).

    Key points from the documented behavior:

    • SQL Server Always On availability groups rely on:
      • WSFC health monitoring and quorum (cluster service and its own accounts/SIDs).
      • The SQL Server service account having required permissions to registry, cluster, storage, and databases.
      • The SQL Server instance driving availability group state; administrators must not manipulate AGs directly from Failover Cluster Manager.
    • WSFC security and Always On AGs:
      • Always On AGs inherit security from WSFC; enabling AGs gives the SQL Server instance full control of the cluster via its service SID, not via interactive logon rights.
      • Cluster security for the SQL Server instance is managed via SQL Server Configuration Manager or WMI, not by granting it local/RDP logon rights.
    • User rights guidance:
      • “Allow log on locally” is required for users logging on at the console or starting services interactively; services themselves run under the Service Control Manager and do not require that right.
      • Removing interactive logon rights can cause issues only if an account is expected to log on from the network/console; it does not affect service authentication as long as the account has the required “log on as a service” and network access rights.
    • Cluster-specific local accounts (for example, CLIUSR) are sensitive to network logon deny settings, but that is a different policy (“Deny access to this computer from the network”), not “Deny log on locally” or “Deny log on through Remote Desktop Services.”

    Therefore, from the documented behavior:

    • Always On availability group functionality, automatic/manual failover, and WSFC health are driven by:
      • WSFC quorum and health monitoring.
      • SQL Server and cluster services running and being able to communicate and access required resources.
    • These do not depend on the SQL Server domain service account having interactive logon rights (local or RDP).

    Operational considerations before enforcing the policy:

    1. Ensure the SQL Server and SQL Agent services are configured with that domain account and that it has:
      • “Log on as a service” right.
      • Required permissions to SQL data/log/backup paths, registry, and cluster.
    2. Verify that no scripts, scheduled tasks, or admin procedures rely on logging on as that service account via console or RDP.
    3. Do not apply “Deny access to this computer from the network” to cluster-related local accounts (for example, CLIUSR) or to accounts required for cluster communication, as that is known to break cluster services.

    If those conditions are met, applying “Deny log on locally” and “Deny log on through Terminal Services” to the SQL Server domain service account is compatible with SQL Server Always On availability groups and WSFC and should not affect cluster health or failover behavior.


    References:

    Was this answer helpful?

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.