Solved

exchange security settings

Posted on 2011-02-18
7
232 Views
Last Modified: 2012-05-11
I have a mix exchange 2k and  ex07 environment with public folders
when I go to exchange top level properties security tab (on ex2k) I do  have two S-1-5.................  account which were removed, however I can't  remove them as they are inherited .
How do I remove them? where is it inherited from?
0
Comment
Question by:leop1212
7 Comments
 
LVL 42

Expert Comment

by:Amit
ID: 34927655
Check at the root level in AD for your domain
0
 
LVL 6

Expert Comment

by:naughtynat
ID: 34927670
I am not really familar at all with Exchange 2K however
 - the 2 S-1-5 account are generally old accounts which have been remote or deleted somehow. They have been assigned privalages to access these files but have since been deleted. This is how it generally is for most files, but I am not sure if maybe there is some "built-in" accounts like this for Exchange 2K.
 - If they are inherited, they are usually inherited from the folder above it. Most of the time when you change a folder permission on a top folder, you can set it to change permissions on those underneith.
WARNING: THIS MIGHT BREAK YOUR SYSTEM
 - to change settings and remote
 - Right Click item, Properties, Security Advanced, Owner - assign yourself
 - Go to Permissions, change permissions remove all enteries and disable inherited, then add your user with full control.
 - Close down, go back in there and you should be able to delete
NOTE: Windows may stop you from doing this because it might break something.
0
 
LVL 42

Expert Comment

by:Amit
ID: 34927715
You might need to use PFDAVAdmin tool to reapply the permission again

http://technet.microsoft.com/en-us/library/bb508858(EXCHG.65).aspx
0
 

Author Comment

by:leop1212
ID: 34927765
these accounts are not listed under domain sucurity
in pfdavadmin I do not see security tab only export security.....
and my ex2k ESM give me same access as pfdavadmin
0
 
LVL 38

Accepted Solution

by:
Hypercat (Deb) earned 500 total points
ID: 35031288
You will need to use ADSIEDIT to edit the permissions for the Exchange organization.  Adsiedit is one of the tools that are installed with the Support Tools from the Windows 2003 or 2008 CD. They can be installed from the Support/Tools folder on the installation CD.  Once you have the tools installed, click Start/Run and type "adsiedit.msc."CAUTION: USING THE ADSIEDIT TOOL IS DANGEROUS!!! YOU MUST BE VERY CAREFUL WHAT YOU CHANGE WHEN USING THIS TOOL, AS IT COULD CAUSE DAMAGE TO ACTIVE DIRECTORY PERMISSIONS. USE AT YOUR OWN RISK.

Once you have adsiedit.msc open, navigate to the following location:

Configuration [domain]/CN=Configuration/CN=Services/CN=Microsoft Exchange/CN=[Org name]/CN=Administrative Groups/[Group Name]

Right-click, go to Properties and click the Security tab. Look to see if those user accounts are there. If they are, you should be able to delete them.


0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
This article explains how to install and use the NTBackup utility that comes with Windows Server.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question