Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

How to use ICACLS to revoke permission to a registry hive

Posted on 2008-10-13
4
2,535 Views
Last Modified: 2012-06-27
How to revoke permission using ICACLS for users from accessing a particular registry hive in HKLM in VISTA. Please help.
0
Comment
Question by:KC2TC
  • 2
4 Comments
 
LVL 59

Accepted Solution

by:
LeeTutor earned 250 total points
ID: 22752631
I don't see anywhere in the syntax of ICACLS where it can modify registry permissions:

http://technet.microsoft.com/en-us/library/cc753525.aspx
ICACLS

I think you may need to use the SubInACL tool:

http://blogs.msdn.com/astebner/archive/2006/09/04/739820.aspx
Solving setup errors by using the SubInACL tool to repair file and registry permissions

A page about SunInACL syntax:

http://www.ss64.com/nt/subinacl.html
0
 
LVL 59

Expert Comment

by:LeeTutor
ID: 22802708
KC2TC, any feedback?
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The Service applet starts in Extended Mode by Default, with a taskpad on the left of the services pane. This view mode was introduced in XP. As I find it not very usefull, I like to use the Standard view as default, and without the Console tree. …
There are many reasons a PC runs slower than when it was new, ranging from malicious software intended to mess things up to simple general Windows use.  Your PC performance may slowly degrade over time without you noticing but when you buy a PC from…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question