Solved

change the security permission of some files and directories to “Everyone - Full Control”.

Posted on 2003-11-27
2
366 Views
Last Modified: 2013-12-04
I need to change the security permission of some files and directories to “Everyone - Full Control”.
I have the cacls command (“cacls c:\mydir\*.* /e /g everyone:f”) but the problem is that on some OS the Everyone group has a different name (like "Jeder" in German OS).
I need a command that can make this change without using the “everyone” word.

0
Comment
Question by:igalb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 84

Accepted Solution

by:
oBdA earned 250 total points
ID: 9831521
The "Everyone" group is a "well known group" with the SID S-1-1-0. You can use this information to extract the localized name.
Get SIDtoName.exe from Joeware.net:
http://www.joeware.net/win32/index.html
Then use a script like the following to set your permission; it's currently in test mode, it will only display the "cacls" command.

====8<----[Everyone.cmd]----
@echo off
setlocal
:: *** Retrieve the localized name of the "Everyone" group using sidtoname.exe:
for /f "tokens=2 delims=\" %%a in ('sidtoname.exe S-1-1-0 2^>NUL ^| find "[WellKnownGroup]"') do set Everyone=%%a
echo The local name of the Everyone group is %Everyone%.

:: *** Test mode: Remove the "ECHO" in fron of the next line to "arm" the script
ECHO cacls c:\mydir\*.* /e /g %Everyone%:f
====8<----[Everyone.cmd]----
0
 
LVL 84

Expert Comment

by:oBdA
ID: 10897012
May I ask for the reason of the "C"?

What's the right grade to give?
http://www.experts-exchange.com/help.jsp#hi73
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Best practice in Granting access to certain computer only for external contractor ? 8 101
deny local logon 12 129
Need to disable SSL Cipher 7 489
RRAS on Windows Servers 13 47
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question