On Thu, Nov 5, 2009 at 10:03 AM, David Lum <david....@nwea.org> wrote:
> We had problems with GPO’s working unless NewSID was used.

  Was the machine a domain member when you cloned it?

> Here's my understanding:

  Here's mine...  ;-)

> Each machine has its own SID

  Correct.  This is generated at install time, or if you run a SID
scrambler like NEWSID.

  The "built-in" security principals, like "Administrator", are
derived from the machine SID.  (Specifically, by appending a
well-known RID to the machine SID.)

> Each domain has a domain SID

  Correct.  Additionally, all Domain Controllers use that SID as their
machine SID.

> Join machine to domain and the "machines domain SID" is MachineSID +
> DomainSID

  Incorrect.

  There is no special "machine SID" associated with a domain.  There
*is* a machine trust account for each machine in the domain.  Those
accounts are assigned SIDs, just like users are.  It is not derived
from the machine SID.  A machine trust account SID is
indistinguishable from a regular user account's SID.

  Here are some examples (sanitized) from our domain at %WORK%, where
suppose our domain is "CORP" and my PC is "WS189".

\\WS189       = S-1-5-21-3000008-600007-80005
\\CORP        = S-1-5-21-10000008-10000001-600003
\\CORP\BSCOTT = S-1-5-21-10000008-10000001-600003-1279
\\CORP\WS189$ = S-1-5-21-10000008-10000001-600003-1507

  Note that domain controllers also have machine trust accounts in the domain:

\\DC1       = S-1-5-21-10000008-10000001-600003
\\DC2       = S-1-5-21-10000008-10000001-600003
\\CORP\DC1$ = S-1-5-21-10000008-10000001-600003-1006
\\CORP\DC2$ = S-1-5-21-10000008-10000001-600003-1466

- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to