ksuchy
asked on
How to change local account SID
How do you edit the SID of a local account on a 2000 AD member server. (built-in system accounts, IUSER_Machine and IWAM_Machine).
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Why would you want to?
ASKER
PREFACE: This is part of the creation of a test lab scenario, in preparation for an enterprise level migration of a giant webserver to a new box, and from IIS 5 to 6.
RESPONSE TO POSTS: NewSID (SysInternals) will not work for this. I think that it can be done, but rather than continue to work on this, we have decided to use another workaround. I will thus grant the points to sirbounty, although I think he could be wrong (because he is the least wrong).
EXPLANATION: I wanted to avoid parsing NTFS on a couple hundred host-header web content folders, and writing a script to add all the correct permissions and remove all the old permissions for an IUSER on IIS 5 . The old SID cannot be retrieved due to a long complex story; this is a test lab machine on a duplicate AD in the lab (same as production AD), but (a) the test lab IIS machine cannot be ghosted (no duplicate raid controller and similar-enough-hw is available), (b) Sys State (and thus Metabase) cannot be restored/migrated respectively, ALTHOUGH (c) we were able to use tape restore of web content folders since that volume was separate from the 'c' (windows os) drive. The folders have lots of other permissions which will need to remain, and the SIDs for those accounts are good AD SIDs which resolve just fine in the lab.
SOLUTION: We are just parsing all the NTFS folders with Cacls to add the new local IUSER account, and using iCacls to remove the local ISUR account SID of the production IIS server which cannot be resolved.
RESPONSE TO POSTS: NewSID (SysInternals) will not work for this. I think that it can be done, but rather than continue to work on this, we have decided to use another workaround. I will thus grant the points to sirbounty, although I think he could be wrong (because he is the least wrong).
EXPLANATION: I wanted to avoid parsing NTFS on a couple hundred host-header web content folders, and writing a script to add all the correct permissions and remove all the old permissions for an IUSER on IIS 5 . The old SID cannot be retrieved due to a long complex story; this is a test lab machine on a duplicate AD in the lab (same as production AD), but (a) the test lab IIS machine cannot be ghosted (no duplicate raid controller and similar-enough-hw is available), (b) Sys State (and thus Metabase) cannot be restored/migrated respectively, ALTHOUGH (c) we were able to use tape restore of web content folders since that volume was separate from the 'c' (windows os) drive. The folders have lots of other permissions which will need to remain, and the SIDs for those accounts are good AD SIDs which resolve just fine in the lab.
SOLUTION: We are just parsing all the NTFS folders with Cacls to add the new local IUSER account, and using iCacls to remove the local ISUR account SID of the production IIS server which cannot be resolved.
http://www.sysinternals.com/SourceCode.html