[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

2008 Server Loosing Local Account from Folder Security

Posted on 2011-04-21
6
Medium Priority
?
225 Views
Last Modified: 2012-05-11
We have a production environment used for a software as a service solution.

It is made up of a single domain controller and multiple member servers. All are operating Server 2008.

We have a need on each of the servers to allow a local user account access to a certain folder on each of the servers. The account is in the user group.

The account is  added to the folders security tab and the security attributes granted. (Full Control)

The security settings remain following log off / log on, reboots and gpupdate's. However each morning we come in and notice this account has been removed from the folder (security) of each server. Other security permissions applied to other accounts are not affected.

Can anyone advise why this is been removed each day and how we can 'make it stick'



0
Comment
Question by:csnmeexchange
  • 4
  • 2
6 Comments
 
LVL 9

Expert Comment

by:Ahmed786
ID: 35439830
Check in your 2008 scheduled task, some might be running in the background as a policy or as a script.
0
 

Author Comment

by:csnmeexchange
ID: 35440127
Ahmed786: Thanks. No, there are no scheduled tasks running which influence policy.

0
 
LVL 9

Expert Comment

by:Ahmed786
ID: 35465490
Sorry for late reply as i was on leave.

An Active Directory domain controller that holds the primary domain controller (PDC) operations master role (also known as the flexible single master operations role or the FSMO role) runs a thread every hour to check the access control lists (ACLs) on the following groups and all of the member objects of these groups:

    * Enterprise Admins
    * Schema Admins
    * Domain Admins
    * Administrators
    * Domain Controllers
    * Cert Publishers
    * Backup Operators
    * Replicator Server Operators
    * Account Operators
    * Print Operators

If a user account is a member of one of these administrative groups because of its membership with a distribution group, the user account's ACL is checked when the thread is run and may be reset to match the ACL of the AdminSDHolder thread. If you use the repadmin /showmeta user distinguished name command to view the user account, you see that the ntSecurityDescriptor attribute is set within one hour after the last time you changed the ACL on the user account. The user account also contains the AdminCount attribute.

go thorugh below URLS it may help

http://support.microsoft.com/?kbid=318180

Go through below URL in details about Understanding AdminSDHolder and Protected Groups in 2008

http://policelli.com/blog/archive/2009/11/06/understanding-adminsdholder-and-protected-groups/
0
Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.

 

Author Comment

by:csnmeexchange
ID: 35465877
Hi Ahmed786,

Thanks, I suspect this is the issue, however the troubleshooting, diagnosis and fix is going to be more complex.

The account which is been removed is a local account on a member server, not a domain account. I am unable to use repadmin to diagnose the problem as a local account doesn't have a distinguished name??

also repadmin is only available on the PDC, not the member server.

The local account is been removed from a local group, all the documentation, including the Active Directory Technical Specification references this background task (AdminSDHolder) is protecting the AD and removing domain accounts with elevated domain rights. Not local user accounts under local groups.

How do I get this process to ignore this non-domain account?
0
 

Accepted Solution

by:
csnmeexchange earned 0 total points
ID: 35466245
Resolved, I was using a GPO to enforce security permissions over certain folders. This must have been wiping out non-standard permissions which were not defined in the GPO.

Switched to using a domain account and added domain account to GPO managed folder security.
0
 

Author Closing Comment

by:csnmeexchange
ID: 35499620
fixed it myself
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question