What is the recommened steps to remove objects so Unknown Account permissions don't show up on other AD objects or resources?

What is the recommended steps to remove AD accounts?
We see a lot of permissions on objects that have unknown accounts showing as "S-23234235-12564124..."

Are these because an account was deleted and permissions not removed? If so, what is the proper procedure so this mess doesn't occur, or is this normal to happen?
Scotch TechITAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Kevin StanushApplication DeveloperCommented:
AD has no mechanism to remove the permissions from objects when you remove an account, as there isn't any way to know where/what objects the user was assigned permissions to.  That is one reason its best to assign permissions to groups instead of individual users.

Some GUI displays will removed deleted SID entries, so where/how are you viewing this information?  Is it on a file/directory security display?

Also, if the object is from a trusted domain with a broken trust, you will also see an unresolved SID, so you might need to research to see if the domain portion of the sid is the local domain or not before removing it.
0
Peter HutchisonSenior Network Systems SpecialistCommented:
Ideally you would use groups to apply permissions to resources whether its files, folders, or other objects.

Groups are less likely to be added and removed as often as individual accounts, and it would minimise the occurrence of orphaned SIDs from showing. But it would not guarantee from SIDs from appearing in the future.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Tom CieslikIT EngineerCommented:
Also if your computer was a member of other domain before or had some local user that was removed, you'll see this.
You can delete unknown users.
0
Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Shaun VermaakTechnical SpecialistCommented:
Do your domain SIDs start with S-23234235-1256412? Where do you see these stale permissions, GPO objects?
0
Scotch TechITAuthor Commented:
We see these permissions on AD objects such as users. I believe they're being inherited from above.
0
Shaun VermaakTechnical SpecialistCommented:
Did you try subinacl tool?
subinacl.exe /help /cleandeletedsidsfrom

Open in new window

https://serverfault.com/questions/198163/how-to-clean-up-orphaned-sids-in-aces-in-ad
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Active Directory

From novice to tech pro — start learning today.