Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 565
  • Last Modified:

can I revert permissions for "self" account in Active Directory?

I was trying to change the permissions so that users could edit all the settings in galmod32 and used the Delegate Control wizard to add permissions.  After "adding" these permissions, now the users can't even change the attributes they were able to before.  I also think that I applied the changes to the entire directory, not just a particular OU.  Is there a way to make the permissions for "self" go back to what they were by default?
0
hawthornedirect
Asked:
hawthornedirect
  • 4
  • 2
1 Solution
 
Vipin VasudevanInfrastructure SpecialistCommented:
Please try dsacls command line tool available in Windoes support tool to get back the defalut permissions in AD

dsacls DC=Domain,DC=Com /S /T..

Try do it with objects rathwer than doing it on complete domain

like dsacls ou=*****, DC=Domain,DC=Com /S /T..


Please refer this link too

http://www.enterprisenetworkingplanet.com/netos/article.php/623801/Active-Directory-Modifying-Default-Permissions.htm
0
 
hawthornedirectAuthor Commented:
I definitely learned my lesson not to apply the untried to the entire domain.

I'm not familiar with the dsacls command.  I will look on my own, but can you tell me the syntax to revert the permissions for "self" back to what they were?  I'm also puzzled as to why granting permissions didn't seem to work, but for right now I'd be happy to have back what we had.
0
 
hawthornedirectAuthor Commented:
If I go to Properties for the domain and select the Security tab, I can look at the security setting for "Self" in there.  In Advanced there is an option to replace the permission entries with the default settings.  Would this take us back to where we were?
0
Get expert help—faster!

Need expert help—fast? Use the Help Bell for personalized assistance getting answers to your important questions.

 
Vipin VasudevanInfrastructure SpecialistCommented:
I prefer you to DSACLS, which will get you back to the default permissions. Make sure that you dont have any other sec settings  changed and inplace.  

Syntax as shown above

dsacls DC=Domain,DC=Com /S /T {it is for domain.com.. if you have child.acme.net, it is dsacls DC=child,DC=acme.dc=net /S /T }  

Please try it in one OU and carryout for domain like dsacls OU=sales,DC=child,DC=acme,dc=net /S /T
0
 
hawthornedirectAuthor Commented:
I ran the command against an OU to test it and it seemed to correct everything just fine.  I ran it against the rest of the domain next.  It appeared to work alright, but I got two unsettling messages "Cannot remove the folder" and "The command completed unsuccessfully."  On the other hand everything seemed to be back to normal when I tested it with galmod32.

There seemed to be a momentary glitch later on when I couldn't connect to the Exchange server and Activesync for Exchange on my phone quit working, but then in a few minutes it was working again.

Thoughts?
0
 
hawthornedirectAuthor Commented:
I have a backup of the domain controller from last night, so I've saved it in two different places just in case this blows up in my face.  Thanks so much for your help.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 4
  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now