If querying objectsid in K3 or ADAM you don't need -binenc, even for non-well knowns. :) Any other SID field though will require it that I am aware of. The quickest way to find a SID in objectsid or sidhistory with adfind is through the adsid shortcut like so adfind -sc adsid:s-1-5-9 joe -- O'Reilly Active Directory Third Edition - http://www.joeware.net/win/ad3e.htm
_____ From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Wednesday, November 22, 2006 9:53 AM To: [email protected] Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... Just for future reference the easiest way to identify where an object is if you have a SID is to use adfind with the -binenc option: adfind -binenc -b dc=FOO,dc=BAR -f objectSID=S-1-5-9 You'll find the full path to the object under >objectCategory: While the binenc option isn't strictly needed for this example, as well known security principals apparently don't need to be encoded, it does not hurt and it's a good habit to get into because you WILL need it for many SID searches =) Thanks, Andrew Fidel [EMAIL PROTECTED] Sent by: [EMAIL PROTECTED] 11/22/2006 12:35 AM Please respond to [email protected] To [email protected] cc Subject RE: [ActiveDir] Enterprise Domain Controllers group missing... Hi there, I finally found out where this group was...it is available from Windows 2000 AD forwards and is found at CN=Enterprise Domain Controllers,CN=WellKnown Security Principals,CN=Configuration,DC=x,DC=x,DC=x. Its not viewable/searchable under ADUC even with advanced features turned on but you can use it to apply security on an AD object. Cheers everyone for your assistance... ;-) Matt Duguid Systems Engineer for Identity Services Department of Internal Affairs Phone: +64 4 4748028 (wellington) Mobile: +64 21 1713290 Fax: +64 4 4748894 Address: Level 4, 47 Boulcott Street, Wellington CBD E-mail: [EMAIL PROTECTED] Web: http://www.dia.govt.nz/ |---------+----------------------------------> | | | | | | | | | | | Steve Linehan | | | <[EMAIL PROTECTED]| | | > | | | Sent by: | | | [EMAIL PROTECTED]| | | tivedir.org | | | | | | | | | 22/11/2006 03:33 p.m. | | | Please respond to | | | ActiveDir | | | | |---------+----------------------------------> >--------------------------------------------------------------------------- -----------------------------------| | | | To: "[email protected]" <[email protected]> | | cc: | | Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... | >--------------------------------------------------------------------------- -----------------------------------| Sorry read and responded to this to fast you should have an Enterprise Domain Controllers group however it becomes a member of "Windows Authorization Access group" after the PDC upgrade. You will be missing some of the other Groups and Security Principals listed in that section until the PDC is upgraded. Thanks, -Steve ________________________________________ From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of Steve Linehan [EMAIL PROTECTED] Sent: Tuesday, November 21, 2006 8:17 PM To: [email protected] Subject: RE: [ActiveDir] Enterprise Domain Controllers group missing... You have to upgrade or install one of the servers in each domain to Windows Server 2003 and then transfer the PDC Emulator role to the upgraded or added Windows Server 2003 box. When a Windows Server 2003 box takes over the PDC Emulator FSMO role it will create these new security principals. This is documented under the section titled "Windows Server 2003 Well Known Security Principals" in the following link: http://technet2.microsoft.com/WindowsServer/en/library/795229a5-8a74-4edb-a2 f4-d5794d31c2a71033.mspx . Thanks, -Steve ________________________________________ From: [EMAIL PROTECTED] [EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] [EMAIL PROTECTED] Sent: Tuesday, November 21, 2006 8:04 PM To: [email protected] Subject: [ActiveDir] Enterprise Domain Controllers group missing... - We recently upgraded the schema in one forest from Windows 2000 to Windows 2003. - We now receive the following error when trying to access group policies, "The Enterprise Domain Controllers group does not have read access to this GPO. The Enterprise Domain Controllers group must have read access on all GPO's in the domain in order for Group Policy Modelling to function properly. To learn more about this issue and how you can correct it, click Help.". - I can confirm we do not have an "Enterprise Domain Controllers" group in any of the domains. - I have found the following article " http://technet2.microsoft.com/WindowsServer/en/library/b44ba1b5-9f85-4bee-84 c9-1994921658cd1033.mspx?mfr=true " which shows how to fix the GPO issue using "GrantPermissionOnAllGPOs.wsf"...but this assumes we actually have the group "Enterprise Domain Controllers" available. From further reading I see this group has a specific SID of S-1-5-9 so I can not simply create a new group. - Does anyone have any idea how the group "Enterprise Domain Controllers" can be recreated with the correct SID of S-1-5-9 so that we can run the script "GrantPermissionOnAllGPOs.wsf" to fix the group policy problem? Thanks in advance, Matt Duguid Systems Engineer for Identity Services Department of Internal Affairs Phone: +64 4 4748028 (wellington) Mobile: +64 21 1713290 Fax: +64 4 4748894 Address: Level 4, 47 Boulcott Street, Wellington CBD E-mail: [EMAIL PROTECTED] Web: http://www.dia.govt.nz/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/ List info : http://www.activedir.org/List.aspx List FAQ : http://www.activedir.org/ListFAQ.aspx List archive: http://www.mail-archive.com/[email protected]/
