Solved

change the security permission of some files and directories to “Everyone - Full Control”.

Posted on 2003-11-27
2
363 Views
Last Modified: 2013-12-04
I need to change the security permission of some files and directories to “Everyone - Full Control”.
I have the cacls command (“cacls c:\mydir\*.* /e /g everyone:f”) but the problem is that on some OS the Everyone group has a different name (like "Jeder" in German OS).
I need a command that can make this change without using the “everyone” word.

0
Comment
Question by:igalb
  • 2
2 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 250 total points
ID: 9831521
The "Everyone" group is a "well known group" with the SID S-1-1-0. You can use this information to extract the localized name.
Get SIDtoName.exe from Joeware.net:
http://www.joeware.net/win32/index.html
Then use a script like the following to set your permission; it's currently in test mode, it will only display the "cacls" command.

====8<----[Everyone.cmd]----
@echo off
setlocal
:: *** Retrieve the localized name of the "Everyone" group using sidtoname.exe:
for /f "tokens=2 delims=\" %%a in ('sidtoname.exe S-1-1-0 2^>NUL ^| find "[WellKnownGroup]"') do set Everyone=%%a
echo The local name of the Everyone group is %Everyone%.

:: *** Test mode: Remove the "ECHO" in fron of the next line to "arm" the script
ECHO cacls c:\mydir\*.* /e /g %Everyone%:f
====8<----[Everyone.cmd]----
0
 
LVL 83

Expert Comment

by:oBdA
ID: 10897012
May I ask for the reason of the "C"?

What's the right grade to give?
http://www.experts-exchange.com/help.jsp#hi73
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question