?
Solved

change the security permission of some files and directories to “Everyone - Full Control”.

Posted on 2003-11-27
2
Medium Priority
?
368 Views
Last Modified: 2013-12-04
I need to change the security permission of some files and directories to “Everyone - Full Control”.
I have the cacls command (“cacls c:\mydir\*.* /e /g everyone:f”) but the problem is that on some OS the Everyone group has a different name (like "Jeder" in German OS).
I need a command that can make this change without using the “everyone” word.

0
Comment
Question by:igalb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 500 total points
ID: 9831521
The "Everyone" group is a "well known group" with the SID S-1-1-0. You can use this information to extract the localized name.
Get SIDtoName.exe from Joeware.net:
http://www.joeware.net/win32/index.html
Then use a script like the following to set your permission; it's currently in test mode, it will only display the "cacls" command.

====8<----[Everyone.cmd]----
@echo off
setlocal
:: *** Retrieve the localized name of the "Everyone" group using sidtoname.exe:
for /f "tokens=2 delims=\" %%a in ('sidtoname.exe S-1-1-0 2^>NUL ^| find "[WellKnownGroup]"') do set Everyone=%%a
echo The local name of the Everyone group is %Everyone%.

:: *** Test mode: Remove the "ECHO" in fron of the next line to "arm" the script
ECHO cacls c:\mydir\*.* /e /g %Everyone%:f
====8<----[Everyone.cmd]----
0
 
LVL 85

Expert Comment

by:oBdA
ID: 10897012
May I ask for the reason of the "C"?

What's the right grade to give?
http://www.experts-exchange.com/help.jsp#hi73
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Suggested Courses
Course of the Month11 days, 3 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question