
Then clean up the original affected user accounts (this is what we recommend) Create separate dedicated admin accounts for users’ privileged access and excluding those admin accounts from self-service reset. Remove the user accounts or groups from the protected groups.Strategies here, from most to least recommended: You will need to remove the membership in the protected groups. Each of these groups is protected in AD, which is how our IT Helpdesk Group and its members ended up being affected by AdminSDHolder.

Here we see the IT Helpdesk group is nested in both Account Operators and (somewhat more alarmingly) Domain Admins. However, if you do get to some of the default protected groups, the results will look something like this: Clear the adminCount attribute and reset permissions on the group and move on to user account cleanup.

You can also use PowerShell to search for any user account in your AD Scopes that has inheritance disabled: get-aduser -searchbase -filter * -properties ntsecuritydescriptor | whereĪgain, if you end up with an empty list when you query the group, that means the cleanup was already done. If the result is True then inheritance is disabled if it is False, then inheritance is enabled. You can also use the Active Directory PowerShell module to check directly if security inheritance is disabled: get-aduser -properties ntsecuritydescriptor | select -expand ntsecuritydescriptor | select areaccessrulesprotected Enable Advanced Settings, open the properties of the user account, and click the Advanced… button in the Security tab to see if inheritance is enabled or disabled. You can check if an individual service account has security inheritance disabled in AD Users and Computers. Identifying Accounts with Security Inheritance Disabled
#FOLDER PERMISSIONS RESET TO DEFAULT BY ITSELF SERVER 2012 PASSWORD#
Those users will encounter errors when attempting to enroll or reset their passwords, and you may see additional errors in the event logs of your Password Reset or Gatekeeper server. This works great for normal user accounts however, for any accounts where security inheritance is disabled, our service account will not be able to interact with those user accounts. We do this so we can operate on user accounts in your Active Directory without requiring Domain Admin or other high privilege group membership that would introduce additional security risk.

When you add an OU or OUs to your management scope, we delegate extremely granular permissions for our service account to the user accounts within that OU. Specops Password Reset, Specops Password Sync, uReset, and Specops Authentication all use low privilege service accounts in Active Directory.
