>>>>>> Its not viewable/searchable under ADUC even with advanced features turned on >>> That is an incorrect statement. Maybe... maybe not... Unless you have actually looked at that directory instance you cannot possibly know for sure. You can expect it should follow a certain pattern you have perceived in the past, but you can't be 100% sure it is the case for every instance. I can show a bitmap right now that shows that group doesn't exist in FSPs... All that proves is that my test directory doesn't have it and your test directory does have it. Enterprise Domain Controllers is a well known security principal, it lives initially in the configuration container with other well known security principals in the.... WellKnown Security Principals container. That container isn't viewable from ADUC... It doesn't become something you can view as an actual object in ADUC until it gets added to a group in a domain NC - specifically/usually the group Windows Authorization Access Group. Even if added, someone could delete it and then something has to re-add the Well Known Security Principal to a group again to get the FSP to be created and add it to the Authorization Access Group for things to be right. Also note that if someone is looking for the name of the group, like they would with any normal regular group, that will obviously fail because the name in the domain NC is a SID, not the group name. This isn't a normal case, it is a very specific special implementation. There are special little implementation details all throughout AD that you don't know about until you actually encounter them. I would not be suprised by even experienced admins to be tripped up on this one. It isn't worth really knowing about unless you have had a reason to have to know about it. joe -- O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm
_____ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Akomolafe, Deji Sent: Wednesday, November 22, 2006 1:12 AM To: [email protected] Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... >>> Its not viewable/searchable under ADUC even with advanced features turned on That is an incorrect statement. Sincerely, _____ (, / | /) /) /) /---| (/_ ______ ___// _ // _ ) / |_/(__(_) // (_(_)(/_(_(_/(__(/_ (_/ /) (/ Microsoft MVP - Directory Services <x-excid://32770000/uri:http://www.akomolafe.com> www.akomolafe.com - we know IT -5.75, -3.23 Do you now realize that Today is the Tomorrow you were worried about Yesterday? -anon _____ From: [EMAIL PROTECTED] Sent: Tue 11/21/2006 9:35 PM To: [email protected] Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... Hi there, I finally found out where this group was...it is available from Windows 2000 AD forwards and is found at CN=Enterprise Domain Controllers,CN=WellKnown Security Principals,CN=Configuration,DC=x,DC=x,DC=x. Its not viewable/searchable under ADUC even with advanced features turned on but you can use it to apply security on an AD object. Cheers everyone for your assistance... ;-) Matt Duguid Systems Engineer for Identity Services Department of Internal Affairs Phone: +64 4 4748028 (wellington) Mobile: +64 21 1713290 Fax: +64 4 4748894 Address: Level 4, 47 Boulcott Street, Wellington CBD E-mail: [EMAIL PROTECTED] Web: http://www.dia.govt.nz/ |---------+----------------------------------> | | | | | | | | | | | Steve Linehan | | | <[EMAIL PROTECTED]| | | > | | | Sent by: | | | [EMAIL PROTECTED]| | | tivedir.org | | | | | | | | | 22/11/2006 03:33 p.m. | | | Please respond to | | | ActiveDir | | | | |---------+----------------------------------> >--------------------------------------------------------------------------- -----------------------------------| | | | To: "[email protected]" <[email protected]> | | cc: | | Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... | >--------------------------------------------------------------------------- -----------------------------------| Sorry read and responded to this to fast you should have an Enterprise Domain Controllers group however it becomes a member of "Windows Authorization Access group" after the PDC upgrade. You will be missing some of the other Groups and Security Principals listed in that section until the PDC is upgraded. Thanks, -Steve ________________________________________ From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Steve Linehan [EMAIL PROTECTED] Sent: Tuesday, November 21, 2006 8:17 PM To: [email protected] Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... You have to upgrade or install one of the servers in each domain to Windows Server 2003 and then transfer the PDC Emulator role to the upgraded or added Windows Server 2003 box. When a Windows Server 2003 box takes over the PDC Emulator FSMO role it will create these new security principals. This is documented under the section titled "Windows Server 2003 Well Known Security Principals" in the following link: http://technet2.microsoft.com/WindowsServer/en/library/795229a5-8a74-4edb-a2 f4-d5794d31c2a71033.mspx . Thanks, -Steve ________________________________________ From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] [EMAIL PROTECTED] Sent: Tuesday, November 21, 2006 8:04 PM To: [email protected] Subject: [ActiveDir] Enterprise Domain Controllers group missing... - We recently upgraded the schema in one forest from Windows 2000 to Windows 2003. - We now receive the following error when trying to access group policies, "The Enterprise Domain Controllers group does not have read access to this GPO. The Enterprise Domain Controllers group must have read access on all GPO's in the domain in order for Group Policy Modelling to function properly. To learn more about this issue and how you can correct it, click Help.". - I can confirm we do not have an "Enterprise Domain Controllers" group in any of the domains. - I have found the following article " http://technet2.microsoft.com/WindowsServer/en/library/b44ba1b5-9f85-4bee-84 c9-1994921658cd1033.mspx?mfr=true " which shows how to fix the GPO issue using "GrantPermissionOnAllGPOs.wsf"...but this assumes we actually have the group "Enterprise Domain Controllers" available. From further reading I see this group has a specific SID of S-1-5-9 so I can not simply create a new group. - Does anyone have any idea how the group "Enterprise Domain Controllers" can be recreated with the correct SID of S-1-5-9 so that we can run the script "GrantPermissionOnAllGPOs.wsf" to fix the group policy problem? Thanks in advance, Matt Duguid Systems Engineer for Identity Services Department of Internal Affairs Phone: +64 4 4748028 (wellington) Mobile: +64 21 1713290 Fax: +64 4 4748894 Address: Level 4, 47 Boulcott Street, Wellington CBD E-mail: [EMAIL PROTECTED] Web: http://www.dia.govt.nz/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/
