diff options
author | Raghuram Subramani <raghus2247@gmail.com> | 2022-09-04 05:04:04 -0400 |
---|---|---|
committer | Raghuram Subramani <raghus2247@gmail.com> | 2022-09-04 05:04:04 -0400 |
commit | f914e816092f02a4bbed779ad91a6641e7cc2122 (patch) | |
tree | 1c7dd2f7f2946ac4d80cb6f3147cbd5ec0b2b4af /support/domaindump/domain_groups.html | |
parent | 869200611b92f0dee181a89ffb8f3f9123794d43 (diff) |
add rooms
Diffstat (limited to 'support/domaindump/domain_groups.html')
-rw-r--r-- | support/domaindump/domain_groups.html | 82 |
1 files changed, 82 insertions, 0 deletions
diff --git a/support/domaindump/domain_groups.html b/support/domaindump/domain_groups.html new file mode 100644 index 0000000..e9c5ec4 --- /dev/null +++ b/support/domaindump/domain_groups.html @@ -0,0 +1,82 @@ +<!DOCTYPE html> +<html> +<head><meta charset="UTF-8"><style type="text/css">tbody th { + border: 1px solid #000; +} +tbody td { + border: 1px solid #ababab; + border-spacing: 0px; + padding: 4px; + border-collapse: collapse; +} +body { + font-family: verdana; +} +table { + font-size: 13px; + border-collapse: collapse; + width: 100%; +} +tbody tr:nth-child(odd) td { + background-color: #eee; +} +tbody tr:hover td { + background-color: lightblue; +} +thead td { + font-size: 19px; + font-weight: bold; + padding: 10px 0px; +} +</style></head><body><table><thead><tr><td colspan="7" id="cn_Domain_groups">Domain groups</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>Member of groups</th><th>description</th><th>Created on</th><th>Changed on</th><th>SID</th></tr> +<tr><td>Shared Support Accounts</td><td>Shared Support Accounts</td><td> </td><td> </td><td>05/28/22 11:11:32</td><td>05/28/22 11:12:04</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1103">1103</abbr></td></tr> +<tr><td>DnsUpdateProxy</td><td>DnsUpdateProxy</td><td> </td><td>DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers).</td><td>05/28/22 11:05:17</td><td>05/28/22 11:05:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1102">1102</abbr></td></tr> +<tr><td>DnsAdmins</td><td>DnsAdmins</td><td> </td><td>DNS Administrators Group</td><td>05/28/22 11:05:17</td><td>05/28/22 11:05:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1101">1101</abbr></td></tr> +<tr><td>Enterprise Key Admins</td><td>Enterprise Key Admins</td><td> </td><td>Members of this group can perform administrative actions on key objects within the forest.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-527">527</abbr></td></tr> +<tr><td>Key Admins</td><td>Key Admins</td><td> </td><td>Members of this group can perform administrative actions on key objects within the domain.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-526">526</abbr></td></tr> +<tr><td>Protected Users</td><td>Protected Users</td><td> </td><td>Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 for more information.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-525">525</abbr></td></tr> +<tr><td>Cloneable Domain Controllers</td><td>Cloneable Domain Controllers</td><td> </td><td>Members of this group that are domain controllers may be cloned.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-522">522</abbr></td></tr> +<tr><td>Enterprise Read-only Domain Controllers</td><td>Enterprise Read-only Domain Controllers</td><td> </td><td>Members of this group are Read-Only Domain Controllers in the enterprise</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-498">498</abbr></td></tr> +<tr><td>Read-only Domain Controllers</td><td>Read-only Domain Controllers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members of this group are Read-Only Domain Controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-521">521</abbr></td></tr> +<tr><td>Denied RODC Password Replication Group</td><td>Denied RODC Password Replication Group</td><td> </td><td>Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-572">572</abbr></td></tr> +<tr><td>Allowed RODC Password Replication Group</td><td>Allowed RODC Password Replication Group</td><td> </td><td>Members in this group can have their passwords replicated to all read-only domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-571">571</abbr></td></tr> +<tr><td>Terminal Server License Servers</td><td>Terminal Server License Servers</td><td> </td><td>Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-561">561</abbr></td></tr> +<tr><td>Windows Authorization Access Group</td><td>Windows Authorization Access Group</td><td> </td><td>Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-560">560</abbr></td></tr> +<tr><td>Incoming Forest Trust Builders</td><td>Incoming Forest Trust Builders</td><td> </td><td>Members of this group can create incoming, one-way trusts to this forest</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-557">557</abbr></td></tr> +<tr><td>Pre-Windows 2000 Compatible Access</td><td>Pre-Windows 2000 Compatible Access</td><td> </td><td>A backward compatibility group which allows read access on all users and groups in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-554">554</abbr></td></tr> +<tr><td>Account Operators</td><td>Account Operators</td><td> </td><td>Members can administer domain user and group accounts</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-548">548</abbr></td></tr> +<tr><td>Server Operators</td><td>Server Operators</td><td> </td><td>Members can administer domain servers</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-549">549</abbr></td></tr> +<tr><td>RAS and IAS Servers</td><td>RAS and IAS Servers</td><td> </td><td>Servers in this group can access remote access properties of users</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-553">553</abbr></td></tr> +<tr><td>Group Policy Creator Owners</td><td>Group Policy Creator Owners</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members in this group can modify group policy for the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-520">520</abbr></td></tr> +<tr><td>Domain Guests</td><td>Domain Guests</td><td><a href="domain_users_by_group.html#cn_Guests" title="CN=Guests,CN=Builtin,DC=support,DC=htb">Guests</a></td><td>All domain guests</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-514">514</abbr></td></tr> +<tr><td>Domain Users</td><td>Domain Users</td><td><a href="domain_users_by_group.html#cn_Users" title="CN=Users,CN=Builtin,DC=support,DC=htb">Users</a></td><td>All domain users</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-513">513</abbr></td></tr> +<tr><td>Domain Admins</td><td>Domain Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a>, <a href="domain_users_by_group.html#cn_Administrators" title="CN=Administrators,CN=Builtin,DC=support,DC=htb">Administrators</a></td><td>Designated administrators of the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-512">512</abbr></td></tr> +<tr><td>Cert Publishers</td><td>Cert Publishers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members of this group are permitted to publish certificates to the directory</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-517">517</abbr></td></tr> +<tr><td>Enterprise Admins</td><td>Enterprise Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a>, <a href="domain_users_by_group.html#cn_Administrators" title="CN=Administrators,CN=Builtin,DC=support,DC=htb">Administrators</a></td><td>Designated administrators of the enterprise</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-519">519</abbr></td></tr> +<tr><td>Schema Admins</td><td>Schema Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Designated administrators of the schema</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-518">518</abbr></td></tr> +<tr><td>Domain Controllers</td><td>Domain Controllers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>All domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-516">516</abbr></td></tr> +<tr><td>Domain Computers</td><td>Domain Computers</td><td> </td><td>All workstations and servers joined to the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-515">515</abbr></td></tr> +<tr><td>Storage Replica Administrators</td><td>Storage Replica Administrators</td><td> </td><td>Members of this group have complete and unrestricted access to all features of Storage Replica.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-582">582</abbr></td></tr> +<tr><td>Remote Management Users</td><td>Remote Management Users</td><td> </td><td>Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:12:04</td><td><abbr title="S-1-5-32-580">580</abbr></td></tr> +<tr><td>Access Control Assistance Operators</td><td>Access Control Assistance Operators</td><td> </td><td>Members of this group can remotely query authorization attributes and permissions for resources on this computer.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-579">579</abbr></td></tr> +<tr><td>Hyper-V Administrators</td><td>Hyper-V Administrators</td><td> </td><td>Members of this group have complete and unrestricted access to all features of Hyper-V.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-578">578</abbr></td></tr> +<tr><td>RDS Management Servers</td><td>RDS Management Servers</td><td> </td><td>Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-577">577</abbr></td></tr> +<tr><td>RDS Endpoint Servers</td><td>RDS Endpoint Servers</td><td> </td><td>Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-576">576</abbr></td></tr> +<tr><td>RDS Remote Access Servers</td><td>RDS Remote Access Servers</td><td> </td><td>Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-575">575</abbr></td></tr> +<tr><td>Certificate Service DCOM Access</td><td>Certificate Service DCOM Access</td><td> </td><td>Members of this group are allowed to connect to Certification Authorities in the enterprise</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-574">574</abbr></td></tr> +<tr><td>Event Log Readers</td><td>Event Log Readers</td><td> </td><td>Members of this group can read event logs from local machine</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-573">573</abbr></td></tr> +<tr><td>Cryptographic Operators</td><td>Cryptographic Operators</td><td> </td><td>Members are authorized to perform cryptographic operations.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-569">569</abbr></td></tr> +<tr><td>IIS_IUSRS</td><td>IIS_IUSRS</td><td> </td><td>Built-in group used by Internet Information Services.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-568">568</abbr></td></tr> +<tr><td>Distributed COM Users</td><td>Distributed COM Users</td><td> </td><td>Members are allowed to launch, activate and use Distributed COM objects on this machine.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-562">562</abbr></td></tr> +<tr><td>Performance Log Users</td><td>Performance Log Users</td><td> </td><td>Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-559">559</abbr></td></tr> +<tr><td>Performance Monitor Users</td><td>Performance Monitor Users</td><td> </td><td>Members of this group can access performance counter data locally and remotely</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-558">558</abbr></td></tr> +<tr><td>Network Configuration Operators</td><td>Network Configuration Operators</td><td> </td><td>Members in this group can have some administrative privileges to manage configuration of networking features</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-556">556</abbr></td></tr> +<tr><td>Remote Desktop Users</td><td>Remote Desktop Users</td><td> </td><td>Members in this group are granted the right to logon remotely</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-555">555</abbr></td></tr> +<tr><td>Replicator</td><td>Replicator</td><td> </td><td>Supports file replication in a domain</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-552">552</abbr></td></tr> +<tr><td>Backup Operators</td><td>Backup Operators</td><td> </td><td>Backup Operators can override security restrictions for the sole purpose of backing up or restoring files</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-551">551</abbr></td></tr> +<tr><td>Print Operators</td><td>Print Operators</td><td> </td><td>Members can administer printers installed on domain controllers</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-550">550</abbr></td></tr> +<tr><td>Guests</td><td>Guests</td><td> </td><td>Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted</td><td>05/28/22 11:01:56</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-546">546</abbr></td></tr> +<tr><td>Users</td><td>Users</td><td> </td><td>Users are prevented from making accidental or intentional system-wide changes and can run most applications</td><td>05/28/22 11:01:56</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-545">545</abbr></td></tr> +<tr><td>Administrators</td><td>Administrators</td><td> </td><td>Administrators have complete and unrestricted access to the computer/domain</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-544">544</abbr></td></tr> +</tbody> +</table></body></html>
\ No newline at end of file |