?
Solved

Changing permissions on registry keys

Posted on 2004-09-16
6
Medium Priority
?
816 Views
Last Modified: 2008-01-09
I want to allow full access for all users for two keys.

So far I know of two ways, regini.exe (and a \Registry\HKEY_LOCAL_MACHINE\Software\KeyName [1 5 7 17] script)
and using regedt32 (Security->Permissions menu).

We are running Windows 2000 server. Are there any issues I should know of, or things I should take care of in doing this? I have little experience in modifying the registry, and so just would like to know the best way, possible pitfalls.

Thanks
0
Comment
Question by:RichardFox
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 23

Assisted Solution

by:Justin Durrant
Justin Durrant earned 400 total points
ID: 12075388
Hi RichardFox,


We have done this via regedt32 on many servers... no issues as of yet.

JJ
0
 
LVL 12

Accepted Solution

by:
valicon earned 1200 total points
ID: 12075434
You need to be very careful when editing anything in the registry.  Here is a link that will show you how to change permissions in the registry:

http://www.windowsecurity.com/articles/Securing_the_Windows_2000_Registry.html

The ways that you have outlined are the only ways that I am aware of.  Before you do anything to your registry, perform a backup of your registry just in case things don't go as planned.  Hope this helps
0
 
LVL 85

Assisted Solution

by:oBdA
oBdA earned 400 total points
ID: 12075451
Setting permissions on a registry key basically works the same as setting NTFS permissions on a folder. The pitfalls are the same: Be very careful with Deny, and make sure you don't lock out the Administrator. If you simply add a user group to an ACL, there shouldn't be an issue (apart from members of this group being able to write to that key).
If you need to do this for a bunch of machines, and you have the W2k Resource Kit, you can use subinacl.exe to set the permissions from the commandline as well. It's easier to handle than regini.
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Comment

by:RichardFox
ID: 12075472
Where is the registry, so that I may back it up?
0
 
LVL 12

Expert Comment

by:valicon
ID: 12075600
Also I would recommend testing your registry edits on 1 computer to ensure that it works as you would like it, then if you get the desired results you can apply the same settings to other machines. If you don't you can just restore the registry back to it's original state using the links I gave you :)  
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
We live in a world of interfaces like the one in the title picture. VBA also allows to use interfaces which offers a lot of possibilities. This article describes how to use interfaces in VBA and how to work around their bugs.
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question