Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

Authenticated users group is missing. server 2003

Posted on 2010-09-10
Last Modified: 2012-08-13
In AD under the "Member Of" tab I click "Add" and type "auth" or "authenticated users" select check names and the authenticated users group would show up. Or if I select the advanced tab and select "find now" it would show up, Currently it is not. I am assuming it is not something I would have to install but I could be wrong. Where is the "Authenticated user" group to be found. Am I doing something wrong?
  • 3
  • 3
LVL 24

Expert Comment

by:Mike Thomas
ID: 33645996
It isn't a true group so will not show like other groups, it is a security principle than encomapses all authenticated sessions.

Author Comment

ID: 33646019
So it could be something enabled in group policy? In which may have become disabled? or am I off in left field?
LVL 24

Expert Comment

by:Mike Thomas
ID: 33646023
BTW it will show up for you when you add it to a recourse, so you can add it to folder permissions etc.
Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

LVL 24

Accepted Solution

Mike Thomas earned 125 total points
ID: 33646029
No it has nothing to do with policy, you cannot be a member of authenticated users like that because that is only determined at the time of authentication, as above, you can add the group to recources etc but not manage it like other groups.


Assisted Solution

MetMc earned 125 total points
ID: 33646065
"Authenticated Users isn't a true group—it's a special security principal that specifies any session that's been authenticated using some account, such as a local SAM account, domain account, or account from any trusted domain."

Author Comment

ID: 33646323
Thank you all for the responses, but I guess the problem is that I am unable to add any users to the authenticated users since I am unable to find it. According to another post here on EE.


I should be able to at least see it via ad and add a user to the authenticated users group unless I am misreading it according to the above url.

With that being said
states however that what you guys are saying is correct.  I also just tested to see about it with creating a folder and checking it on that resource. I feel bad for the guy in the EE article since it appeared to show up for him some how. I could have sworn however that I have been able to use it through AD.... but I must be tired.

Author Closing Comment

ID: 33646354

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS Host File Questions 1 40
Problem with Shortcut 3 47
Shouldn't i be able to use an old win xp machine as an internet radio? 7 131
VPN 101 - how and which protocol? 9 120
Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question