--- title: Active Directory Security Groups (Windows 10) description: Active Directory Security Groups ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.date: 04/19/2017 --- # Active Directory Security Groups **Applies to** - Windows Server 2016 This reference topic for the IT professional describes the default Active Directory security groups. ## There are two forms of common security principals in Active Directory: user accounts and computer accounts. These accounts represent a physical entity (a person or a computer). User accounts can also be used as dedicated service accounts for some applications. Security groups are used to collect user accounts, computer accounts, and other groups into manageable units. In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. For Active Directory, there are two types of administrative responsibilities: - **Service administrators** Responsible for maintaining and delivering Active Directory Domain Services (AD DS), including managing domain controllers and configuring the AD DS. - **Data administrators** Responsible for maintaining the data that is stored in AD DS and on domain member servers and workstations. ## About Active Directory groups Groups are used to collect user accounts, computer accounts, and other groups into manageable units. Working with groups instead of with individual users helps simplify network maintenance and administration. There are two types of groups in Active Directory: - **Distribution groups** Used to create email distribution lists. - **Security groups** Used to assign permissions to shared resources. ### Distribution groups Distribution groups can be used only with email applications (such as Exchange Server) to send email to collections of users. Distribution groups are not security enabled, which means that they cannot be listed in discretionary access control lists (DACLs). ### Security groups Security groups can provide an efficient way to assign access to resources on your network. By using security groups, you can: - Assign user rights to security groups in Active Directory. User rights are assigned to a security group to determine what members of that group can do within the scope of a domain or forest. User rights are automatically assigned to some security groups when Active Directory is installed to help administrators define a person’s administrative role in the domain. For example, a user who is added to the Backup Operators group in Active Directory has the ability to back up and restore files and directories that are located on each domain controller in the domain. This is possible because, by default, the user rights **Backup files and directories** and **Restore files and directories** are automatically assigned to the Backup Operators group. Therefore, members of this group inherit the user rights that are assigned to that group. You can use Group Policy to assign user rights to security groups to delegate specific tasks. For more information about using Group Policy, see [User Rights Assignment](/windows/device-security/security-policy-settings/user-rights-assignment). - Assign permissions to security groups for resources. Permissions are different than user rights. Permissions are assigned to the security group for the shared resource. Permissions determine who can access the resource and the level of access, such as Full Control. Some permissions that are set on domain objects are automatically assigned to allow various levels of access to default security groups, such as the Account Operators group or the Domain Admins group. Security groups are listed in DACLs that define permissions on resources and objects. When assigning permissions for resources (file shares, printers, and so on), administrators should assign those permissions to a security group rather than to individual users. The permissions are assigned once to the group, instead of several times to each individual user. Each account that is added to a group receives the rights that are assigned to that group in Active Directory, and the user receives the permissions that are defined for that group. Like distribution groups, security groups can be used as an email entity. Sending an email message to the group sends the message to all the members of the group. ### Group scope Groups are characterized by a scope that identifies the extent to which the group is applied in the domain tree or forest. The scope of the group defines where the group can be granted permissions. The following three group scopes are defined by Active Directory: - Universal - Global - Domain Local **Note** In addition to these three scopes, the default groups in the **Builtin** container have a group scope of Builtin Local. This group scope and group type cannot be changed. The following table lists the three group scopes and more information about each scope for a security group. **Group scopes**
Scope | Possible Members | Scope Conversion | Can Grant Permissions | Possible Member of |
---|---|---|---|---|
Universal |
Accounts from any domain in the same forest Global groups from any domain in the same forest Other Universal groups from any domain in the same forest |
Can be converted to Domain Local scope Can be converted to Global scope if the group does not contain any other Universal groups |
On any domain in the same forest or trusting forests |
Other Universal groups in the same forest Domain Local groups in the same forest or trusting forests Local groups on computers in the same forest or trusting forests |
Global |
Accounts from the same domain Other Global groups from the same domain |
Can be converted to Universal scope if the group is not a member of any other global group |
On any domain in the same forest, or trusting domains or forests |
Universal groups from any domain in the same forest Other Global groups from the same domain Domain Local groups from any domain in the same forest, or from any trusting domain |
Domain Local |
Accounts from any domain or any trusted domain Global groups from any domain or any trusted domain Universal groups from any domain in the same forest Other Domain Local groups from the same domain Accounts, Global groups, and Universal groups from other forests and from external domains |
Can be converted to Universal scope if the group does not contain any other Domain Local groups |
Within the same domain |
Other Domain Local groups from the same domain Local groups on computers in the same domain, excluding built-in groups that have well-known SIDs |
Default Security Group | Windows Server 2016 | Windows Server 2012 R2 | Windows Server 2012 | Windows Server 2008 R2 |
---|---|---|---|---|
[Access Control Assistance Operators](#bkmk-acasstops) |
Yes |
Yes |
Yes |
|
[Account Operators](#bkmk-accountoperators) |
Yes |
Yes |
Yes |
Yes |
[Administrators](#bkmk-admins) |
Yes |
Yes |
Yes |
Yes |
[Allowed RODC Password Replication Group](#bkmk-allowedrodcpwdrepl) |
Yes |
Yes |
Yes |
Yes |
[Backup Operators](#bkmk-backupoperators) |
Yes |
Yes |
Yes |
Yes |
[Certificate Service DCOM Access](#bkmk-certificateservicedcomaccess) |
Yes |
Yes |
Yes |
Yes |
[Cert Publishers](#bkmk-certpublishers) |
Yes |
Yes |
Yes |
Yes |
[Cloneable Domain Controllers](#bkmk-cloneabledomaincontrollers) |
Yes |
Yes |
Yes |
|
[Cryptographic Operators](#bkmk-cryptographicoperators) |
Yes |
Yes |
Yes |
Yes |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Yes |
Yes |
Yes |
Yes |
[Distributed COM Users](#bkmk-distributedcomusers) |
Yes |
Yes |
Yes |
Yes |
[DnsUpdateProxy](#bkmk-dnsupdateproxy) |
Yes |
Yes |
Yes |
Yes |
[DnsAdmins](#bkmk-dnsadmins) |
Yes |
Yes |
Yes |
Yes |
[Domain Admins](#bkmk-domainadmins) |
Yes |
Yes |
Yes |
Yes |
[Domain Computers](#bkmk-domaincomputers) |
Yes |
Yes |
Yes |
Yes |
[Domain Controllers](#bkmk-domaincontrollers) |
Yes |
Yes |
Yes |
Yes |
[Domain Guests](#bkmk-domainguests) |
Yes |
Yes |
Yes |
Yes |
[Domain Users](#bkmk-domainusers) |
Yes |
Yes |
Yes |
Yes |
[Enterprise Admins](#bkmk-entadmins) |
Yes |
Yes |
Yes |
Yes |
[Enterprise Read-only Domain Controllers](#bkmk-entrodc) |
Yes |
Yes |
Yes |
Yes |
[Event Log Readers](#bkmk-eventlogreaders) |
Yes |
Yes |
Yes |
Yes |
[Group Policy Creator Owners](#bkmk-gpcreatorsowners) |
Yes |
Yes |
Yes |
Yes |
[Guests](#bkmk-guests) |
Yes |
Yes |
Yes |
Yes |
[Hyper-V Administrators](#bkmk-hypervadministrators) |
Yes |
Yes |
Yes |
|
[IIS_IUSRS](#bkmk-iis-iusrs) |
Yes |
Yes |
Yes |
Yes |
[Incoming Forest Trust Builders](#bkmk-inforesttrustbldrs) |
Yes |
Yes |
Yes |
Yes |
[Key Admins](#key-admins) |
Yes |
|||
[Network Configuration Operators](#bkmk-networkcfgoperators) |
Yes |
Yes |
Yes |
Yes |
[Performance Log Users](#bkmk-perflogusers) |
Yes |
Yes |
Yes |
Yes |
[Performance Monitor Users](#bkmk-perfmonitorusers) |
Yes |
Yes |
Yes |
Yes |
[Pre–Windows 2000 Compatible Access](#bkmk-pre-ws2kcompataccess) |
Yes |
Yes |
Yes |
Yes |
[Print Operators](#bkmk-printoperators) |
Yes |
Yes |
Yes |
Yes |
[Protected Users](#bkmk-protectedusers) |
Yes |
Yes |
||
[RAS and IAS Servers](#bkmk-rasandias) |
Yes |
Yes |
Yes |
Yes |
[RDS Endpoint Servers](#bkmk-rdsendpointservers) |
Yes |
Yes |
Yes |
|
[RDS Management Servers](#bkmk-rdsmanagementservers) |
Yes |
Yes |
Yes |
|
[RDS Remote Access Servers](#bkmk-rdsremoteaccessservers) |
Yes |
Yes |
Yes |
|
[Read-only Domain Controllers](#bkmk-rodc) |
Yes |
Yes |
Yes |
Yes |
[Remote Desktop Users](#bkmk-remotedesktopusers) |
Yes |
Yes |
Yes |
Yes |
[Remote Management Users](#bkmk-remotemanagementusers) |
Yes |
Yes |
Yes |
|
[Replicator](#bkmk-replicator) |
Yes |
Yes |
Yes |
Yes |
[Schema Admins](#bkmk-schemaadmins) |
Yes |
Yes |
Yes |
Yes |
[Server Operators](#bkmk-serveroperators) |
Yes |
Yes |
Yes |
Yes |
[Storage Replica Administrators](#storage-replica-administrators) |
Yes |
|||
[System Managed Accounts Group](#system-managed-accounts-group) |
Yes |
|||
[Terminal Server License Servers](#bkmk-terminalserverlic) |
Yes |
Yes |
Yes |
Yes |
[Users](#bkmk-users) |
Yes |
Yes |
Yes |
Yes |
[Windows Authorization Access Group](#bkmk-winauthaccess) |
Yes |
Yes |
Yes |
Yes |
[WinRMRemoteWMIUsers_](#bkmk-winrmremotewmiusers-) |
Yes |
Yes |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-579 |
Type |
BuiltIn Local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-548 |
Type |
BuiltIn Local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-544 |
Type |
BuiltIn Local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
Administrator, Domain Admins, Enterprise Admins |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Adjust memory quotas for a process](/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process): SeIncreaseQuotaPrivilege [Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight [Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight [Allow log on through Remote Desktop Services](/windows/device-security/security-policy-settings/allow-log-on-through-remote-desktop-services): SeRemoteInteractiveLogonRight [Back up files and directories](/windows/device-security/security-policy-settings/back-up-files-and-directories): SeBackupPrivilege [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege [Change the system time](/windows/device-security/security-policy-settings/change-the-system-time): SeSystemTimePrivilege [Change the time zone](/windows/device-security/security-policy-settings/change-the-time-zone): SeTimeZonePrivilege [Create a pagefile](/windows/device-security/security-policy-settings/create-a-pagefile): SeCreatePagefilePrivilege [Create global objects](/windows/device-security/security-policy-settings/create-global-objects): SeCreateGlobalPrivilege [Create symbolic links](/windows/device-security/security-policy-settings/create-symbolic-links): SeCreateSymbolicLinkPrivilege [Debug programs](/windows/device-security/security-policy-settings/debug-programs): SeDebugPrivilege [Enable computer and user accounts to be trusted for delegation](/windows/device-security/security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation): SeEnableDelegationPrivilege [Force shutdown from a remote system](/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system): SeRemoteShutdownPrivilege [Impersonate a client after authentication](/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication): SeImpersonatePrivilege [Increase scheduling priority](/windows/device-security/security-policy-settings/increase-scheduling-priority): SeIncreaseBasePriorityPrivilege [Load and unload device drivers](/windows/device-security/security-policy-settings/load-and-unload-device-drivers): SeLoadDriverPrivilege [Log on as a batch job](/windows/device-security/security-policy-settings/log-on-as-a-batch-job): SeBatchLogonRight [Manage auditing and security log](/windows/device-security/security-policy-settings/manage-auditing-and-security-log): SeSecurityPrivilege [Modify firmware environment values](/windows/device-security/security-policy-settings/modify-firmware-environment-values): SeSystemEnvironmentPrivilege [Perform volume maintenance tasks](/windows/device-security/security-policy-settings/perform-volume-maintenance-tasks): SeManageVolumePrivilege [Profile system performance](/windows/device-security/security-policy-settings/profile-system-performance): SeSystemProfilePrivilege [Profile single process](/windows/device-security/security-policy-settings/profile-single-process): SeProfileSingleProcessPrivilege [Remove computer from docking station](/windows/device-security/security-policy-settings/remove-computer-from-docking-station): SeUndockPrivilege [Restore files and directories](/windows/device-security/security-policy-settings/restore-files-and-directories): SeRestorePrivilege [Shut down the system](/windows/device-security/security-policy-settings/shut-down-the-system): SeShutdownPrivilege [Take ownership of files or other objects](/windows/device-security/security-policy-settings/take-ownership-of-files-or-other-objects): SeTakeOwnershipPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-571 |
Type |
Domain local |
Default container |
CN=Users DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-551 |
Type |
Builtin local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight [Back up files and directories](/windows/device-security/security-policy-settings/back-up-files-and-directories): SeBackupPrivilege [Log on as a batch job](/windows/device-security/security-policy-settings/log-on-as-a-batch-job): SeBatchLogonRight [Restore files and directories](/windows/device-security/security-policy-settings/restore-files-and-directories): SeRestorePrivilege [Shut down the system](/windows/device-security/security-policy-settings/shut-down-the-system): SeShutdownPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-<domain>-574 |
Type |
Domain Local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-517 |
Type |
Domain Local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-522 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-569 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-572 |
Type |
Domain local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
[Cert Publishers](#bkmk-certpublishers) [Domain Admins](#bkmk-domainadmins) [Domain Controllers](#bkmk-domaincontrollers) [Enterprise Admins](#bkmk-entadmins) Group Policy Creator Owners krbtgt [Read-only Domain Controllers](#bkmk-rodc) [Schema Admins](#bkmk-schemaadmins) |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
|
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-562 |
Type |
Builtin Local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-1103 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-1102 |
Type |
Domain local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-512 |
Type |
Domain Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Administrator |
Default member of |
[Administrators](#bkmk-admins) [Denied RODC Password ReplicationGroup](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Administrators](#bkmk-admins) See [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-515 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
All computers joined to the domain, excluding domain controllers |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes (but not required) |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-516 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Computer accounts for all domain controllers of the domain |
Default member of |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
No |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-514 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Guest |
Default member of |
[Guests](#bkmk-guests) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Can be moved out but it is not recommended |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Guests](#bkmk-guests) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-513 |
Type |
Domain Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Administrator krbtgt |
Default member of |
[Users](#bkmk-users) |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Users](#bkmk-users) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<root domain>-519 |
Type |
Universal (if Domain is in Native-Mode) else Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Administrator |
Default member of |
[Administrators](#bkmk-admins) [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Administrators](#bkmk-admins) See [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-498 |
Type |
Universal |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
|
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-573 |
Type |
Builtin local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<domain>-520 |
Type |
Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Administrator |
Default member of |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
No |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-546 |
Type |
Builtin Local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
Guest |
Default member of |
[Domain Guests](#bkmk-domainguests) Guest |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-578 |
Type |
Builtin local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
None |
Default member of |
No |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-568 |
Type |
BuiltIn Local |
Default container |
CN=BuiltIn, DC=<domain>, DC= |
Default members |
IUSR |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
|
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-557 |
Type |
BuiltIn local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-556 |
Type |
BuiltIn local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-559 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
[Log on as a batch job](/windows/device-security/security-policy-settings/log-on-as-a-batch-job): SeBatchLogonRight |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-558 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-554 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
If you choose the Pre–Windows 2000 Compatible Permissions mode, Everyone and Anonymous are members, and if you choose the Windows 2000-only permissions mode, Authenticated Users are members. |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-550 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight [Load and unload device drivers](/windows/device-security/security-policy-settings/load-and-unload-device-drivers): SeLoadDriverPrivilege [Shut down the system](/windows/device-security/security-policy-settings/shut-down-the-system): SeShutdownPrivilege |
Attribute | Value |
---|---|
Well-known SID/RID |
S-1-5-21-<domain>-525 |
Type |
Domain Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-service admins? |
No |
Default user rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-553 |
Type |
Domain local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-553 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-577 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-575 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-555 |
Type |
Builtin Local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-521 |
Type |
|
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
See [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-580 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-552 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-<root domain>-518 |
Type |
Universal (if Domain is in Native-Mode) else Global |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
Administrator |
Default member of |
[Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
See [Denied RODC Password Replication Group](#bkmk-deniedrodcpwdrepl) |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-549 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
Yes |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
[Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight [Back up files and directories](/windows/device-security/security-policy-settings/back-up-files-and-directories): SeBackupPrivilege [Change the system time](/windows/device-security/security-policy-settings/change-the-system-time): SeSystemTimePrivilege [Change the time zone](/windows/device-security/security-policy-settings/change-the-time-zone): SeTimeZonePrivilege [Force shutdown from a remote system](/windows/device-security/security-policy-settings/force-shutdown-from-a-remote-system): SeRemoteShutdownPrivilege [Restore files and directories](/windows/device-security/security-policy-settings/restore-files-and-directories): Restore files and directories SeRestorePrivilege [Shut down the system](/windows/device-security/security-policy-settings/shut-down-the-system): SeShutdownPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-561 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Safe to move out of default container? |
Cannot be moved |
Protected by ADMINSDHOLDER? |
No |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-545 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
Authenticated Users [Domain Users](#bkmk-domainusers) INTERACTIVE |
Default member of |
Domain Users (this membership is due to the fact that the Primary Group ID of all user accounts is Domain Users.) |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
No |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-32-560 |
Type |
Builtin local |
Default container |
CN=Builtin, DC=<domain>, DC= |
Default members |
Enterprise Domain Controllers |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Cannot be moved |
Safe to delegate management of this group to non-Service admins? |
Yes |
Default user rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-21-<domain>-1000 |
Type |
Domain local |
Default container |
CN=Users, DC=<domain>, DC= |
Default members |
None |
Default member of |
None |
Protected by ADMINSDHOLDER? |
No |
Safe to move out of default container? |
Yes |
Safe to delegate management of this group to non-Service admins? |
|
Default User Rights |
None |