Yep, as sucky as a method as it is it is something that has been floating around as *a* method for years and years to work out the Windows security related uses. I know I started mentioning it to folks once I noticed non-security groups maintained their SID. I find causing temporary easy to reverse pain much more desirable than deleting it and finding slightly longer lived pain.
For the general question though, actually chasing down everywhere a group is used is a tremendously difficult task and I am not aware of any tool that can do it for every single possible use. The solution is truly to have very good process around the use of groups and a tight support definition around their use. This is one of the reasons why I like local and domain local resource groups, the scope is naturally limited. So, you may ask where all can the groups be used? The answer is anywhere that a SID or a DN can be specified. To name a few... 1. Windows Security Descriptors - this includes any kernel securable objects that can accept a security descriptor as well as many other objects that have "customized" ACL-like definitions like the customSD for event logs. A partial list of the "official" securable objects off the top of my head: O Active Directory Objects O SAM Objects (users and groups on member machines) O File System Objects (files/directories) O Threads/Processes O Synchronization objects (mutexes, events, semaphores, timers) O Job Objects O Network shares O Printers O Services O As of 2003 SP1 the Service Control Manager itself O Registry keys O Windows Desktops and Windows Stations O Access tokens O File Mapping objects O Pipes (named or anonymous) Basically anything that allows you to pass in a SECURITY_ATTRIBUTES structure when creating the object plus more.... 2. Microsoft supplied Windows based applications. This includes things like ADAM, SQL Server, Exchange, SharePoint, etc etc etc ad nauseum. 3. Third party applications that run on Windows and were written "properly" to take advantage of Windows security. This list could be long and wide, there are hundreds of thousands of Windows applications out there. 4. Third party applications that run on Windows and were written incorrectly to take advantage of Windows security. These apps don't use Windows security descriptors, they use custom security structures but rely on SIDs or GUIDs (if they are smart) or names or DNs otherwise. 5. Ditto #4 but running on non-Windows platforms. 6. Applications that use the groups for something other than security. For instance an IM app that uses groups for contact lists or an email app using groups for mail distribution. Numbers 3-6 are exceptionally hard to trace because in all but limited cases, it is pretty much guaranteed no well known well used interface is available to enumerate this info. You are completely dependent on how well you understand your environment and how well you know the underpinnings of what is running in that environment. 7. Any attribute in AD or ADAM or in fact any directory that takes a DN, GUID, Text, or SID. As an example here, in an Exchange/LCS enabled R2 Forest there are 195 DN NON-Backlink type attributes alone, roughly 20 SID attributes, who knows how many GUID attributes (they aren't marked as GUIDs, you get to guess...), hundreds of string types, etc. 8. Cross forest uses which are represented through FSPs in the foreign forests. 9. Privileges/Rights (in GPOs or security policy files) This is just the stuff I can think of off the top of my head between writing this and smoothing out the moving parts in AdMod for general release. I am sure there is more. It is something that I have sat down and thought about multiple times through the years and have code in various stages of development to try and generate reports or running databases of the current use of security principals. If anyone tells you they can give you a comprehensive list and you have anything but the simplest Windows only environment which is well locked down by process/procedure (i.e. you don't even need the list) you can probably assume they are trying to sell you the moon or they don't actually understand the scope of the issue. I would generally assume the latter because there are quite a few folks who think they understand Windows security that really don't[1]. I often am not sure if I understand it. :) joe [1] Try not to attribute to malice that which is adequately ascribed to ignorance. ;) -- O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Patrick Parker Sent: Thursday, September 07, 2006 12:08 PM To: ActiveDir.org Subject: RE: [ActiveDir] Is a Global Security group being used? We met with the Microsoft Identity and Access Management product group recently and this was mentioned as the method used internally. Patrick Patrick Parker . The Dot Net Factory . (877) 996-4276 . [EMAIL PROTECTED] EmpowerID for Microsoft Active Directory & ADAM – Manage . Collaborate . Empower Patrick Parker . The Dot Net Factory . (877) 996-4276 . [EMAIL PROTECTED] EmpowerID for Microsoft Active Directory – Manage . Collaborate . Empower -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Mark Parris Sent: Thursday, September 07, 2006 11:41 AM To: ActiveDir.org Subject: Re: [ActiveDir] Is a Global Security group being used? The question was "a way" - not "the best way". This method was actually suggested by MS at TechED one year, so I am not totally insane. -----Original Message----- From: "Laura A. Robinson" <[EMAIL PROTECTED]> Date: Wed, 06 Sep 2006 13:44:53 To:<[email protected]> Subject: RE: [ActiveDir] Is a Global Security group being used? While that's an interesting approach, unless this is a very small environment (as in, there's no help desk that's going to be baffled by the screaming and no multi-gazillionaire CXOs who are going to be doing the screaming), that might not be such a good idea. ;-) Laura > -----Original Message----- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Mark Parris > Sent: Wednesday, September 06, 2006 1:18 PM > To: ActiveDir.org > Subject: Re: [ActiveDir] Is a Global Security group being used? > > Change it to a Distribution Group and see who screams - if anyone does > change it back to a security group again. > > M. > > -----Original Message----- > From: "Figueroa, Johnny" <[EMAIL PROTECTED]> > Date: Wed, 6 Sep 2006 09:43:58 > To:<[email protected]> > Subject: [ActiveDir] Is a Global Security group being used? > > Does anyone have a way to determine if a domain global group is being > used?. Will auditing on the DCs tell me this? > > Thanks in advance. > > Johnny Figueroa > > .ІÿÁŠŠƒ²§²B§Ã¶v®Š§²rz§Ã¶v®—± List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx .+w֧B+v*rz+v*汫 [EMAIL PROTECTED]) List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.activedir.org/ml/threads.aspx
