NT AUTHORITY\Authenticated Users

Posted on 2013-11-11
Medium Priority
Last Modified: 2013-11-11
Who exactly is NT AUTHORITY\Authenticated Users? I am trying to risk assess who can access a certain folder and this group appears, but I cant find it in AD, who is in it? Why would you need to add that group to a particular folder ACL? Will removing it break anything?
Question by:pma111
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
LVL 18

Expert Comment

by:Emmanuel Adebayo
ID: 39638670
Authenticated Users includes all users whose identities were authenticated when they logged on.



Author Comment

ID: 39638682
Sorry I dont really understand that - does it mean every user in the domain?
LVL 18

Expert Comment

by:Emmanuel Adebayo
ID: 39638691
Yes these are the users that are autehnticated by your Active directory.

Author Comment

ID: 39638724
So in a nutshell if one of your folders grants read access to NT AUTHORITY\Authenticated Users - then every user in the network can access it?
LVL 18

Accepted Solution

Emmanuel Adebayo earned 2000 total points
ID: 39638858
Yes, you are right.

You allow this account permission to your folder only when you are convinced that you are willing to grant whatever permission was set to all who can successfully log on to the domain network because the permission will allow access to this account for everyone in the domain. If you find that you don't want to grant premission to everyone for that folder, i suggest  you remove it.


Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses
Course of the Month12 days, 13 hours left to enroll

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question