We help IT Professionals succeed at work.

2008 Server Loosing Local Account from Folder Security

241 Views
Last Modified: 2012-05-11
We have a production environment used for a software as a service solution.

It is made up of a single domain controller and multiple member servers. All are operating Server 2008.

We have a need on each of the servers to allow a local user account access to a certain folder on each of the servers. The account is in the user group.

The account is  added to the folders security tab and the security attributes granted. (Full Control)

The security settings remain following log off / log on, reboots and gpupdate's. However each morning we come in and notice this account has been removed from the folder (security) of each server. Other security permissions applied to other accounts are not affected.

Can anyone advise why this is been removed each day and how we can 'make it stick'



Comment
Watch Question

Commented:
Check in your 2008 scheduled task, some might be running in the background as a policy or as a script.

Author

Commented:
Ahmed786: Thanks. No, there are no scheduled tasks running which influence policy.

Commented:
Sorry for late reply as i was on leave.

An Active Directory domain controller that holds the primary domain controller (PDC) operations master role (also known as the flexible single master operations role or the FSMO role) runs a thread every hour to check the access control lists (ACLs) on the following groups and all of the member objects of these groups:

    * Enterprise Admins
    * Schema Admins
    * Domain Admins
    * Administrators
    * Domain Controllers
    * Cert Publishers
    * Backup Operators
    * Replicator Server Operators
    * Account Operators
    * Print Operators

If a user account is a member of one of these administrative groups because of its membership with a distribution group, the user account's ACL is checked when the thread is run and may be reset to match the ACL of the AdminSDHolder thread. If you use the repadmin /showmeta user distinguished name command to view the user account, you see that the ntSecurityDescriptor attribute is set within one hour after the last time you changed the ACL on the user account. The user account also contains the AdminCount attribute.

go thorugh below URLS it may help

http://support.microsoft.com/?kbid=318180

Go through below URL in details about Understanding AdminSDHolder and Protected Groups in 2008

http://policelli.com/blog/archive/2009/11/06/understanding-adminsdholder-and-protected-groups/

Author

Commented:
Hi Ahmed786,

Thanks, I suspect this is the issue, however the troubleshooting, diagnosis and fix is going to be more complex.

The account which is been removed is a local account on a member server, not a domain account. I am unable to use repadmin to diagnose the problem as a local account doesn't have a distinguished name??

also repadmin is only available on the PDC, not the member server.

The local account is been removed from a local group, all the documentation, including the Active Directory Technical Specification references this background task (AdminSDHolder) is protecting the AD and removing domain accounts with elevated domain rights. Not local user accounts under local groups.

How do I get this process to ignore this non-domain account?
Unlock this solution and get a sample of our free trial.
(No credit card required)
UNLOCK SOLUTION

Author

Commented:
fixed it myself
Unlock the solution to this question.
Thanks for using Experts Exchange.

Please provide your email to receive a sample view!

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.