Mistyped the Inherited/ inherit ACE flags there, but you get my point -kind of makes sense in English.

I'm guessing, as I'm not in a position to test, that perhaps GPPREP adds the necessary ACE(s) to the aforementioned container, resulting in an ACE set with the INHERIT flag, which means that child objects will inherit this ACE (unless NO_PROPOGATE is set, which is isn't).


--Paul

----- Original Message ----- From: "Paul Williams" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Wednesday, November 22, 2006 10:31 AM
Subject: Re: [ActiveDir] Enterprise Domain Controllers group missing...


I imagine you used the version of ADPREP that ships with Windows Server 2003 SP1?

I believe you need to run ADPREP /DOMAINPREP /GPPREP.

This will add the inheritable ACEs to CN=Policies,CN=System,DC=...

Allow: NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS Read is an inherited ACE.


Re. EDCs.

ENTERPRISE_DOMAIN_CONTROLLERS Security Principal is available with Windows 2000. The new Security Principals added by 2003 are:

     . LocalService

     . NetworkService

     . NTLM Authentication

     . Other Organization

     . Remote Interactive Logon

     . SChannel Authentication

     . This Organization



These group memberships are also modified:

. The Network Servers group is added to the Performance Monitoring Users group.

. The Enterprise Domain Controllers group is added to the Windows Authorization Access group.




See the link from Steve for more info. on this. 2003 RTM added new Sec Prins. 2003 SP1 also added some, IIRC. Therefore ensure your PDCe is running k3 SP1.


--Paul


----- Original Message ----- From: <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Wednesday, November 22, 2006 2:04 AM
Subject: [ActiveDir] Enterprise Domain Controllers group missing...



- We recently upgraded the schema in one forest from Windows 2000 to
Windows 2003.

- We now receive the following error when trying to access group policies, "The Enterprise Domain Controllers group does not have read access to this
GPO. The Enterprise Domain Controllers group must have read access on all
GPO's in the domain in order for Group Policy Modelling to function
properly. To learn more about this issue and how you can correct it, click
Help.".

- I can confirm we do not have an "Enterprise Domain Controllers" group in
any of the domains.

- I have found the following article "
http://technet2.microsoft.com/WindowsServer/en/library/b44ba1b5-9f85-4bee-84c9-1994921658cd1033.mspx?mfr=true
" which shows how to fix the GPO issue using
"GrantPermissionOnAllGPOs.wsf"...but this assumes we actually have the
group  "Enterprise Domain Controllers" available. From further reading I
see this group has a specific SID of S-1-5-9 so I can not simply create a
new group.

- Does anyone have any idea how the group "Enterprise Domain Controllers"
can be recreated with the correct SID of S-1-5-9 so that we can run the
script "GrantPermissionOnAllGPOs.wsf" to fix the group policy problem?

Thanks in advance,

Matt Duguid
Systems Engineer for Identity Services
Department of Internal Affairs

Phone: +64 4 4748028 (wellington)
Mobile: +64 21 1713290
Fax: +64 4 4748894
Address: Level 4, 47 Boulcott Street, Wellington CBD
E-mail: [EMAIL PROTECTED]
Web: http://www.dia.govt.nz/

List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/[email protected]/


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/[email protected]/

Reply via email to