nt authority\authenticated users

Posted on 2014-02-18
Last Modified: 2014-02-20
what exactly does the group in the title of the message represent in the case of a domain joined windows server? how does it compare to groups like domain users/everyone?
Question by:pma111
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 35

Accepted Solution

Seth Simmons earned 167 total points
ID: 39868365
this should explain the difference between the three

Differences between Authenticated Users, Domain Users, and Everyone groups
LVL 23

Assisted Solution

by:Patrick Bogers
Patrick Bogers earned 167 total points
ID: 39868367
Everyone is everyone (accounts and computers). Authenticated users are authenticated via a domain controller.

Assisted Solution

Sylvain_piv earned 166 total points
ID: 39868385
Technet Source :

SID: S-1-5-11
Name: Authenticated Users
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!


Author Comment

ID: 39868392
But essentially its everyone in the domain so if a folder is open to that group its widely accessible..
LVL 23

Expert Comment

by:Patrick Bogers
ID: 39868461
The folder can be visible to all but not necessarely accessable.

Author Comment

ID: 39868464
They have read and execute permissions (the aforementioned group)

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question