Has anyone seen this? I implemented UAM policies last month, first on one host pool, then two more. I just noticed that hosts in those pools have a local admin account, which looks like 20 characters of random hexadecimal. The admin user is the same in all the hosts in all 3 pools. The profile creation times match with when UAM policies were added, and the last logon times match with when UAM ran during the last maintenance window, so I asked Nerdio support, but they said it was not created by UAM.
The 3 host pools have only 4 applications in common, and they are:
- 7-Zip
- Google Chrome
- PowerShell
- Mozilla Firefox
I was installing those applications with Winget in Scripted Actions previously, and they did not create any users.
Thanks!
Comments (1 comment)