NTFS permission issue - Domain Admins group

Hi,

I am a member of the "Domain Admins" group in AD (we've got MS Windows 2008 Servers).

The group "Domain Admins" has full NTFS Permissions to our Data File Server's D: Drive and all it's subfolders.

When I login to the File Server and I click on any folder under d: it comes up with "Access Denied".

If I right-click, properties on the folder and go to the "NTFS" TAB it shows a message "To continue, you must be an administrative user with permissions to view the object's security properties" and gives a "continue" button, when I click this button it does show me the permissions of the folder and in there the "Domain Admins" group has full rights to the folder (inherited from the root of the drive, and is set to "this folder, subfolder and files")...

For what it's worth I did switch on Folder Enumeration but this should only hide folders where I've got no permissions and not deny access to visible folders where I've got full rights.

When I add myself directly to the folder with full rights it works fine, but somehow it's ignoring the fact that I am a member of Domain Admins and should through that membership have full rights to the content of the folder.

Any ideas on this strange phenomenon for 500 points... ?

Thanks,
Reinhard
Reinhard RensburgInfrastructure ManagerAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Elmar KoschkaSenior System EngineerCommented:
You tried to disable UAC and Reboot ?!
0
Reinhard RensburgInfrastructure ManagerAuthor Commented:
Hi Elmar-H,

This is on the File Server itself where all the users' directories and shared directories are located, wouldn't want to disable UAC on the Server unless there's a good reason for this.

The "click continue" to view the permissions is not the thing botherhing me but rather the fact that I am a Domain Admin and cannot see data where "domain admins" have full rights.

Thanks,
Reinhard
0
Elmar KoschkaSenior System EngineerCommented:
yes shure, but for testing short deactivate uac.
0
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

awender2Commented:
Obviously you don't have full access. If you click on the continue button, you are added to the security tab, even if you were not added before.

Try it with some folder where you set access to just one user. If you click on continue, you'll be added.
0
oBdACommented:
The "issue" is definitely UAC. UAC strips away the Administrator SID from your security token (except for the default admin account) while you're not working with elevated rights, so when you browse to a folder in Explorer, your membership in Domain Admins is worth nothing (that's what UAC is all about).
The "Click to continue" should, well, "bother" you--don't click it, it will add your account explicitly to the ACL; on a larger file structure, this can take quite some time, and might leave you with unintended permissions.
Ways around this:
Don't use "Domain Admins" (exclusively) to control full access; create a domain local group "FileAdmins" or whatever, give this group Full Access for the whole structure, and add the user accounts (or a global group with file admin accounts other than "Domain Admins") to this group.
Use a command window started with "Run as administrator"
Use an Explorer Clone; unlike Windows Explorer, you can start them using "Run as administrator", then you'll have full access as well as a GUI. Personally, I like FreeCommander (http://www.freecommander.com/), but there are others as well.
Disable UAC (which, according to your former comment, is not an option ...)
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Reinhard RensburgInfrastructure ManagerAuthor Commented:
Dear oBdA,

Thank you so much for the detailed reply, that is exactly what I needed to know, all makes 100% sense now.

You are 100% correct, when I used to login as the real "Administrator" account (that came STD with AD) it never used to give me issues browsing the file structure, so the UAC is definitely the cause of this.

In your opinion is it not a "security risk" disabling UAC on Member Servers and Domain controllers? I would think it must be because it's there for a reason, so I'd rather go the other route you mentioned whereby I create local groups on the Servers and give them full rigts to the file structure then add my account to that group, sounds the safest to me.

Thanks again for the detailed explaination in your previous post, much appreciated.

Reinhard.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2008

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.