Remove a security group from all folders in a machine.

Posted on 2007-07-23
Last Modified: 2012-05-05

I need to Remove a security group from all folders in a machine.

This group is a member of the security permissions so need to remove 1 specific group
Question by:bsharath
    LVL 13

    Expert Comment

    A more complete question might yield better result for answers.

    Are you talking about a local group or a domain group?

    Either way, you can't really do this from the group side. Instead, you have to go to each folder you want to change, and remove permissions for the group from the folder security tab. If you are only doing this for one machine, and if you need to do it for ALL folders on the machine, perhaps your better solution would be to delete the group entirely. Of course if it's a domain group, and the group needs permissions to other machines, then that won't work.
    LVL 11

    Author Comment

    The group is a domain group.This group is added to many machines in my network...
    LVL 13

    Expert Comment

    Then the only solution I can think of at the local machine is to remove it manually. You may be able to find some utilities that will scan your machine's ACLs to find out where that group has permissions, but let's also see if anyone else chimes in with better solutions.
    LVL 82

    Accepted Solution

    You can use subinacl.exe to do that. Since you probably have the W2k3 Resource Kit Tools installed anyway, you can use the help from there, but download and install the current version of subinacl, the one from the Resource Kit is buggy. Running subinacl /? should return "SubInAcl version 5.2.3790.1180" as the first line.
    The command would be (replace the "C:\*.*" with the drive or path on which to start):
    subinacl /subdirectories C:\*.* /suppresssid=DOMAIN1\USER1

    Download details: SubInACL (SubInACL.exe)SubInACL is a command-line tool that enables administrators to obta

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip Migration Tip #1 – Source Server Health can be found listed in my profile here: http:…
    INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
    In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    758 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now