Solved

how do I remove user permissions?

Posted on 2004-03-31
5
143 Views
Last Modified: 2010-04-13
Recently, I started a service using a user account.  I was told that user account was granted "Log on as a service" privileges (naturally).  So, after changing it back, now I want to remove those permissions.  I'm using Active Directory.  How do I do that?

TIA
0
Comment
Question by:end-user
  • 2
5 Comments
 
LVL 67

Expert Comment

by:sirbounty
ID: 10729194
Start/run/secpol.msc /a
Navigate to Local Policies/User Rights Assignments
Log on as a service is in the right-pane...double click it to remove the account.
0
 

Author Comment

by:end-user
ID: 10733122
Well, I got that far, which is why I'm posting here.  What I get when I double click the policy is a window listing who its assigned to, local setting and effective setting. Listed are two users and one group (to which one of the users belongs).  *None of the local policy setting boxes are checked*  So how do I remove a user from this list?  There's an option to add, but not remove.
0
 

Author Comment

by:end-user
ID: 10733227
Nevermind, I found the solution.  I was editing the local security settings, this permission was being set by the domain controller security policy.

I can remove it by going to security settings: local policies: user rights.  If I pull it up, I then have an option of removing it.

I found it in the dompol.msc, not in secpol.msc.
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 11518532
PAQed, with points refunded (25)

Computer101
E-E Admin
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question