--- title: Special Identities (Windows 10) description: Special Identities ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security ms.date: 04/19/2017 --- # Special Identities **Applies to** - Windows Server 2016 This reference topic for the IT professional describes the special identity groups (which are sometimes referred to as security groups) that are used in Windows access control. Special identity groups are similar to Active Directory security groups as listed in the users and built-in containers. Special identity groups can provide an efficient way to assign access to resources in your network. By using special identity groups, you can: - Assign user rights to security groups in Active Directory. - Assign permissions to security groups for the purpose of accessing resources. Servers that are running the supported Windows Server operating systems designated in the **Applies To** list at the beginning of this topic include several special identity groups. These special identity groups do not have specific memberships that can be modified, but they can represent different users at different times, depending on the circumstances. Although the special identity groups can be assigned rights and permissions to resources, the memberships cannot be modified or viewed. Group scopes do not apply to special identity groups. Users are automatically assigned to these special identity groups whenever they sign in or access a particular resource. For information about security groups and group scope, see [Active Directory Security Groups](active-directory-security-groups.md). The special identity groups are described in the following tables. - [Anonymous Logon](#bkmk-anonymouslogon) - [Authenticated User](#bkmk-authenticateduser) - [Batch](#bkmk-batch) - [Creator Group](#bkmk-creatorgroup) - [Creator Owner](#bkmk-creatorowner) - [Dialup](#bkmk-dialup) - [Digest Authentication](#bkmk-digestauth) - [Enterprise Domain Controllers](#bkmk-entdcs) - [Everyone](#bkmk-everyone) - [Interactive](#bkmk-interactive) - [Local Service](#bkmk-localservice) - [LocalSystem](#bkmk-localsystem) - [Network](#bkmk-network) - [Network Service](#bkmk-networkservice) - [NTLM Authentication](#bkmk-ntlmauth) - [Other Organization](#bkmk-otherorganization) - [Principal Self](#bkmk-principalself) - [Remote Interactive Logon](#bkmk-remoteinteractivelogon) - [Restricted](#bkmk-restrictedcode) - [SChannel Authentication](#bkmk-schannelauth) - [Service](#bkmk-service) - [Terminal Server User](#bkmk-terminalserveruser) - [This Organization](#bkmk-thisorg) - [Window Manager\\Window Manager Group](#bkmk-windowmanager) ## Anonymous Logon Any user who accesses the system through an anonymous logon has the Anonymous Logon identity. This identity allows anonymous access to resources, such as a web page that is published on corporate servers. The Anonymous Logon group is not a member of the Everyone group by default.
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-7 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-11 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
[Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight [Add workstations to domain](/windows/device-security/security-policy-settings/add-workstations-to-domain): SeMachineAccountPrivilege [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-3 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-3-1 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-3-0 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-1 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-64-21 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-9 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights Assignment |
[Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight [Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-1-0 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
[Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight [Act as part of the operating system](/windows/device-security/security-policy-settings/act-as-part-of-the-operating-system): SeTcbPrivilege [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-4 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-19 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default user rights |
[Adjust memory quotas for a process](/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process): SeIncreaseQuotaPrivilege [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege [Change the system time](/windows/device-security/security-policy-settings/change-the-system-time): SeSystemtimePrivilege [Change the time zone](/windows/device-security/security-policy-settings/change-the-time-zone): SeTimeZonePrivilege [Create global objects](/windows/device-security/security-policy-settings/create-global-objects): SeCreateGlobalPrivilege [Generate security audits](/windows/device-security/security-policy-settings/generate-security-audits): SeAuditPrivilege [Impersonate a client after authentication](/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication): SeImpersonatePrivilege [Replace a process level token](/windows/device-security/security-policy-settings/replace-a-process-level-token): SeAssignPrimaryTokenPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-18 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-2 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-20 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
[Adjust memory quotas for a process](/windows/device-security/security-policy-settings/adjust-memory-quotas-for-a-process): SeIncreaseQuotaPrivilege [Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege [Create global objects](/windows/device-security/security-policy-settings/create-global-objects): SeCreateGlobalPrivilege [Generate security audits](/windows/device-security/security-policy-settings/generate-security-audits): SeAuditPrivilege [Impersonate a client after authentication](/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication): SeImpersonatePrivilege [Restore files and directories](/windows/device-security/security-policy-settings/restore-files-and-directories): SeRestorePrivilege [Replace a process level token](/windows/device-security/security-policy-settings/replace-a-process-level-token): SeAssignPrimaryTokenPrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-64-10 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-1000 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-10 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-14 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-12 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-64-14 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-6 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
[Create global objects](/windows/device-security/security-policy-settings/create-global-objects): SeCreateGlobalPrivilege [Impersonate a client after authentication](/windows/device-security/security-policy-settings/impersonate-a-client-after-authentication): SeImpersonatePrivilege |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-13 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
S-1-5-15 |
Object Class |
Foreign Security Principal |
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
None |
Attribute | Value |
---|---|
Well-Known SID/RID |
|
Object Class |
|
Default Location in Active Directory |
cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
[Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege [Increase a process working set](/windows/device-security/security-policy-settings/increase-a-process-working-set): SeIncreaseWorkingSetPrivilege |