Solved

How do I grant rights using dsacls

Posted on 2010-09-22
1
996 Views
Last Modified: 2012-05-10
This is the command I am using and the results.

C:\>dsacls cn={965545B4-2D20-4904-8E6A-B7878777CCE9},cn=policies,cn=system,dc=domain_name,dc=com /G "domain_name\Domain Admins"
The specified domain either does not exist or could not be contacted.

The command failed to complete successfully.

The domain_name is where I put our domain name however I keep getting the results specified domain either does not exist or could not be contacted.

I can ping my domain name.

Any ideas.
0
Comment
Question by:clearcap
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 31

Accepted Solution

by:
Justin Owens earned 500 total points
ID: 33735847
Make sure you are using the right domain name.  When you look at ADUC, you will see at the root level your DC server name.  Under that you will see "Saved Queries" and your FQDN.  Your command must include what that has.  Let's say, for example, that your domain is mycompany.local.  Your command would be:

C:\>dsacls cn={965545B4-2D20-4904-8E6A-B7878777CCE9},cn=policies,cn=system,dc=mycompany,dc=local /G "domain_name\Domain Admins"

You can actually get EXACTLY what need to be there if you look at the Attribute Tab under the setting "distinguishedName".  The bolded "domain_name" above is actually the "Pre Windows 2000" name, and stored under the value "name" in the same attribute tab.

Justin
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question