2008 Server Loosing Local Account from Folder Security

Posted on 2011-04-21
Last Modified: 2012-05-11
We have a production environment used for a software as a service solution.

It is made up of a single domain controller and multiple member servers. All are operating Server 2008.

We have a need on each of the servers to allow a local user account access to a certain folder on each of the servers. The account is in the user group.

The account is  added to the folders security tab and the security attributes granted. (Full Control)

The security settings remain following log off / log on, reboots and gpupdate's. However each morning we come in and notice this account has been removed from the folder (security) of each server. Other security permissions applied to other accounts are not affected.

Can anyone advise why this is been removed each day and how we can 'make it stick'

Question by:csnmeexchange
    LVL 9

    Expert Comment

    Check in your 2008 scheduled task, some might be running in the background as a policy or as a script.

    Author Comment

    Ahmed786: Thanks. No, there are no scheduled tasks running which influence policy.

    LVL 9

    Expert Comment

    Sorry for late reply as i was on leave.

    An Active Directory domain controller that holds the primary domain controller (PDC) operations master role (also known as the flexible single master operations role or the FSMO role) runs a thread every hour to check the access control lists (ACLs) on the following groups and all of the member objects of these groups:

        * Enterprise Admins
        * Schema Admins
        * Domain Admins
        * Administrators
        * Domain Controllers
        * Cert Publishers
        * Backup Operators
        * Replicator Server Operators
        * Account Operators
        * Print Operators

    If a user account is a member of one of these administrative groups because of its membership with a distribution group, the user account's ACL is checked when the thread is run and may be reset to match the ACL of the AdminSDHolder thread. If you use the repadmin /showmeta user distinguished name command to view the user account, you see that the ntSecurityDescriptor attribute is set within one hour after the last time you changed the ACL on the user account. The user account also contains the AdminCount attribute.

    go thorugh below URLS it may help

    Go through below URL in details about Understanding AdminSDHolder and Protected Groups in 2008

    Author Comment

    Hi Ahmed786,

    Thanks, I suspect this is the issue, however the troubleshooting, diagnosis and fix is going to be more complex.

    The account which is been removed is a local account on a member server, not a domain account. I am unable to use repadmin to diagnose the problem as a local account doesn't have a distinguished name??

    also repadmin is only available on the PDC, not the member server.

    The local account is been removed from a local group, all the documentation, including the Active Directory Technical Specification references this background task (AdminSDHolder) is protecting the AD and removing domain accounts with elevated domain rights. Not local user accounts under local groups.

    How do I get this process to ignore this non-domain account?

    Accepted Solution

    Resolved, I was using a GPO to enforce security permissions over certain folders. This must have been wiping out non-standard permissions which were not defined in the GPO.

    Switched to using a domain account and added domain account to GPO managed folder security.

    Author Closing Comment

    fixed it myself

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
    This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
    This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now