?
Solved

Finding Objects with given SID W2K Server

Posted on 2007-11-29
3
Medium Priority
?
215 Views
Last Modified: 2010-03-05
I want to find out the objects that are represented by their SID's in a foloder Security settings.

Thanks in advance
0
Comment
Question by:AMEC99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 375 total points
ID: 20378240
If this were possible, you'd actually see the names, not the SIDs ...
These are either users or groups that have been deleted, or objects from a trusted domain were the trust has been removed or the DC isn't accessible.
0
 
LVL 11

Expert Comment

by:Paul S
ID: 20390336
You can resolve SIDs to objects in Active Directory, but oBdA is right. The object has to exist. If you just see SIDs on a folder then the object has been deleted or the domain is unavailable.
0
 

Author Comment

by:AMEC99
ID: 20391917
Thanks guys.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
A hard and fast method for reducing Active Directory Administrators members.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question