1 # Add default primary groups (domain users, domain guests, domain computers &
2 # domain controllers) - needed for the users to find valid primary groups
5 dn: CN=Domain Users,CN=Users,${DOMAINDN}
8 description: All domain users
9 objectSid: ${DOMAINSID}-513
10 sAMAccountName: Domain Users
11 isCriticalSystemObject: TRUE
13 dn: CN=Domain Guests,CN=Users,${DOMAINDN}
16 description: All domain guests
17 objectSid: ${DOMAINSID}-514
18 sAMAccountName: Domain Guests
19 isCriticalSystemObject: TRUE
21 dn: CN=Domain Computers,CN=Users,${DOMAINDN}
24 description: All workstations and servers joined to the domain
25 objectSid: ${DOMAINSID}-515
26 sAMAccountName: Domain Computers
27 isCriticalSystemObject: TRUE
29 dn: CN=Domain Controllers,CN=Users,${DOMAINDN}
32 description: All domain controllers in the domain
33 objectSid: ${DOMAINSID}-516
35 sAMAccountName: Domain Controllers
36 isCriticalSystemObject: TRUE
40 dn: CN=Administrator,CN=Users,${DOMAINDN}
42 description: Built-in account for administering the computer/domain
43 userAccountControl: 66048
44 objectSid: ${DOMAINSID}-500
46 accountExpires: 9223372036854775807
47 sAMAccountName: Administrator
48 userPassword:: ${ADMINPASS_B64}
49 isCriticalSystemObject: TRUE
51 dn: CN=Guest,CN=Users,${DOMAINDN}
53 description: Built-in account for guest access to the computer/domain
54 userAccountControl: 66082
56 objectSid: ${DOMAINSID}-501
58 isCriticalSystemObject: TRUE
60 dn: CN=krbtgt,CN=Users,${DOMAINDN}
63 objectClass: organizationalPerson
65 description: Key Distribution Center Service Account
66 showInAdvancedViewOnly: TRUE
67 userAccountControl: 514
68 objectSid: ${DOMAINSID}-502
70 accountExpires: 9223372036854775807
71 sAMAccountName: krbtgt
72 servicePrincipalName: kadmin/changepw
73 userPassword:: ${KRBTGTPASS_B64}
74 isCriticalSystemObject: TRUE
78 dn: CN=Enterprise Read-Only Domain Controllers,CN=Users,${DOMAINDN}
81 description: Members of this group are Read-Only Domain Controllers in the enterprise
82 objectSid: ${DOMAINSID}-498
83 sAMAccountName: Enterprise Read-Only Domain Controllers
84 groupType: -2147483640
85 isCriticalSystemObject: TRUE
87 dn: CN=Domain Admins,CN=Users,${DOMAINDN}
90 description: Designated administrators of the domain
91 member: CN=Administrator,CN=Users,${DOMAINDN}
92 objectSid: ${DOMAINSID}-512
94 sAMAccountName: Domain Admins
95 isCriticalSystemObject: TRUE
97 dn: CN=Cert Publishers,CN=Users,${DOMAINDN}
100 description: Members of this group are permitted to publish certificates to the Active Directory
101 objectSid: ${DOMAINSID}-517
102 sAMAccountName: Cert Publishers
103 groupType: -2147483644
104 isCriticalSystemObject: TRUE
106 dn: CN=Schema Admins,CN=Users,${DOMAINDN}
109 description: Designated administrators of the schema
110 member: CN=Administrator,CN=Users,${DOMAINDN}
111 objectSid: ${DOMAINSID}-518
113 sAMAccountName: Schema Admins
114 groupType: -2147483640
115 isCriticalSystemObject: TRUE
117 dn: CN=Enterprise Admins,CN=Users,${DOMAINDN}
120 description: Designated administrators of the enterprise
121 member: CN=Administrator,CN=Users,${DOMAINDN}
122 objectSid: ${DOMAINSID}-519
124 sAMAccountName: Enterprise Admins
125 groupType: -2147483640
126 isCriticalSystemObject: TRUE
128 dn: CN=Group Policy Creator Owners,CN=Users,${DOMAINDN}
131 description: Members in this group can modify group policy for the domain
132 member: CN=Administrator,CN=Users,${DOMAINDN}
133 objectSid: ${DOMAINSID}-520
134 sAMAccountName: Group Policy Creator Owners
135 isCriticalSystemObject: TRUE
137 dn: CN=Read-Only Domain Controllers,CN=Users,${DOMAINDN}
140 description: Members of this group are Read-Only Domain Controllers in the domain
141 objectSid: ${DOMAINSID}-521
143 sAMAccountName: Read-Only Domain Controllers
144 isCriticalSystemObject: TRUE
146 dn: CN=RAS and IAS Servers,CN=Users,${DOMAINDN}
149 description: Servers in this group can access remote access properties of users
150 objectSid: ${DOMAINSID}-553
151 sAMAccountName: RAS and IAS Servers
152 groupType: -2147483644
153 isCriticalSystemObject: TRUE
155 dn: CN=Allowed RODC Password Replication Group,CN=Users,${DOMAINDN}
158 description: Members in this group can have their passwords replicated to all read-only domain controllers in the domain.
159 objectSid: ${DOMAINSID}-571
160 sAMAccountName: Allowed RODC Password Replication Group
161 groupType: -2147483644
162 isCriticalSystemObject: TRUE
164 dn: CN=Denied RODC Password Replication Group,CN=Users,${DOMAINDN}
167 description: Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain.
168 objectSid: ${DOMAINSID}-572
169 sAMAccountName: Denied RODC Password Replication Group
170 groupType: -2147483644
171 isCriticalSystemObject: TRUE
173 # Add foreign security principals
175 dn: CN=S-1-5-4,CN=ForeignSecurityPrincipals,${DOMAINDN}
177 objectClass: foreignSecurityPrincipal
180 dn: CN=S-1-5-9,CN=ForeignSecurityPrincipals,${DOMAINDN}
182 objectClass: foreignSecurityPrincipal
185 dn: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
187 objectClass: foreignSecurityPrincipal
190 dn: CN=S-1-5-20,CN=ForeignSecurityPrincipals,${DOMAINDN}
192 objectClass: foreignSecurityPrincipal
195 # Add builtin objects
197 dn: CN=Administrators,CN=Builtin,${DOMAINDN}
200 description: Administrators have complete and unrestricted access to the computer/domain
201 member: CN=Domain Admins,CN=Users,${DOMAINDN}
202 member: CN=Enterprise Admins,CN=Users,${DOMAINDN}
203 member: CN=Administrator,CN=Users,${DOMAINDN}
204 objectSid: S-1-5-32-544
206 sAMAccountName: Administrators
207 systemFlags: -1946157056
208 groupType: -2147483643
209 isCriticalSystemObject: TRUE
211 dn: CN=Users,CN=Builtin,${DOMAINDN}
214 description: Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications
215 member: CN=Domain Users,CN=Users,${DOMAINDN}
216 member: CN=S-1-5-4,CN=ForeignSecurityPrincipals,${DOMAINDN}
217 member: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
218 objectSid: S-1-5-32-545
219 sAMAccountName: Users
220 systemFlags: -1946157056
221 groupType: -2147483643
222 isCriticalSystemObject: TRUE
224 dn: CN=Guests,CN=Builtin,${DOMAINDN}
227 description: Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted
228 member: CN=Domain Guests,CN=Users,${DOMAINDN}
229 member: CN=Guest,CN=Users,${DOMAINDN}
230 objectSid: S-1-5-32-546
231 sAMAccountName: Guests
232 systemFlags: -1946157056
233 groupType: -2147483643
234 isCriticalSystemObject: TRUE
236 dn: CN=Account Operators,CN=Builtin,${DOMAINDN}
239 description: Members can administer domain user and group accounts
240 objectSid: S-1-5-32-548
242 sAMAccountName: Account Operators
243 systemFlags: -1946157056
244 groupType: -2147483643
245 isCriticalSystemObject: TRUE
247 dn: CN=Server Operators,CN=Builtin,${DOMAINDN}
250 description: Members can administer domain servers
251 objectSid: S-1-5-32-549
253 sAMAccountName: Server Operators
254 systemFlags: -1946157056
255 groupType: -2147483643
256 isCriticalSystemObject: TRUE
258 dn: CN=Print Operators,CN=Builtin,${DOMAINDN}
261 description: Members can administer domain printers
262 objectSid: S-1-5-32-550
264 sAMAccountName: Print Operators
265 systemFlags: -1946157056
266 groupType: -2147483643
267 isCriticalSystemObject: TRUE
269 dn: CN=Backup Operators,CN=Builtin,${DOMAINDN}
272 description: Backup Operators can override security restrictions for the sole purpose of backing up or restoring files
273 objectSid: S-1-5-32-551
275 sAMAccountName: Backup Operators
276 systemFlags: -1946157056
277 groupType: -2147483643
278 isCriticalSystemObject: TRUE
280 dn: CN=Replicator,CN=Builtin,${DOMAINDN}
283 description: Supports file replication in a domain
284 objectSid: S-1-5-32-552
286 sAMAccountName: Replicator
287 systemFlags: -1946157056
288 groupType: -2147483643
289 isCriticalSystemObject: TRUE
291 dn: CN=Pre-Windows 2000 Compatible Access,CN=Builtin,${DOMAINDN}
294 description: A backward compatibility group which allows read access on all users and groups in the domain
295 member: CN=S-1-5-11,CN=ForeignSecurityPrincipals,${DOMAINDN}
296 objectSid: S-1-5-32-554
297 sAMAccountName: Pre-Windows 2000 Compatible Access
298 systemFlags: -1946157056
299 groupType: -2147483643
300 isCriticalSystemObject: TRUE
302 dn: CN=Remote Desktop Users,CN=Builtin,${DOMAINDN}
305 description: Members in this group are granted the right to logon remotely
306 objectSid: S-1-5-32-555
307 sAMAccountName: Remote Desktop Users
308 systemFlags: -1946157056
309 groupType: -2147483643
310 isCriticalSystemObject: TRUE
312 dn: CN=Network Configuration Operators,CN=Builtin,${DOMAINDN}
315 description: Members in this group can have some administrative privileges to manage configuration of networking features
316 objectSid: S-1-5-32-556
317 sAMAccountName: Network Configuration Operators
318 systemFlags: -1946157056
319 groupType: -2147483643
320 isCriticalSystemObject: TRUE
322 dn: CN=Incoming Forest Trust Builders,CN=Builtin,${DOMAINDN}
325 description: Members of this group can create incoming, one-way trusts to this forest
326 objectSid: S-1-5-32-557
327 sAMAccountName: Incoming Forest Trust Builders
328 systemFlags: -1946157056
329 groupType: -2147483643
330 isCriticalSystemObject: TRUE
332 dn: CN=Performance Monitor Users,CN=Builtin,${DOMAINDN}
335 description: Members of this group have remote access to monitor this computer
336 objectSid: S-1-5-32-558
337 sAMAccountName: Performance Monitor Users
338 systemFlags: -1946157056
339 groupType: -2147483643
340 isCriticalSystemObject: TRUE
342 dn: CN=Performance Log Users,CN=Builtin,${DOMAINDN}
345 description: Members of this group have remote access to schedule logging of performance counters on this computer
346 member: CN=S-1-5-20,CN=ForeignSecurityPrincipals,${DOMAINDN}
347 objectSid: S-1-5-32-559
348 sAMAccountName: Performance Log Users
349 systemFlags: -1946157056
350 groupType: -2147483643
351 isCriticalSystemObject: TRUE
353 dn: CN=Windows Authorization Access Group,CN=Builtin,${DOMAINDN}
356 description: Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects
357 member: CN=S-1-5-9,CN=ForeignSecurityPrincipals,${DOMAINDN}
358 objectSid: S-1-5-32-560
359 sAMAccountName: Windows Authorization Access Group
360 systemFlags: -1946157056
361 groupType: -2147483643
362 isCriticalSystemObject: TRUE
364 dn: CN=Terminal Server License Servers,CN=Builtin,${DOMAINDN}
367 description: Terminal Server License Servers
368 objectSid: S-1-5-32-561
369 sAMAccountName: Terminal Server License Servers
370 systemFlags: -1946157056
371 groupType: -2147483643
372 isCriticalSystemObject: TRUE
374 dn: CN=Distributed COM Users,CN=Builtin,${DOMAINDN}
377 description: Members are allowed to launch, activate and use Distributed COM objects on this machine.
378 objectSid: S-1-5-32-562
379 sAMAccountName: Distributed COM Users
380 systemFlags: -1946157056
381 groupType: -2147483643
382 isCriticalSystemObject: TRUE
384 dn: CN=Cryptographic Operators,CN=Builtin,${DOMAINDN}
387 description: Members are authorized to perform cryptographic operations.
388 objectSid: S-1-5-32-569
389 sAMAccountName: Cryptographic Operators
390 systemFlags: -1946157056
391 groupType: -2147483643
392 isCriticalSystemObject: TRUE
394 dn: CN=Event Log Readers,CN=Builtin,${DOMAINDN}
397 description: Members of this group can read event logs from local machine.
398 objectSid: S-1-5-32-573
399 sAMAccountName: Event Log Readers
400 systemFlags: -1946157056
401 groupType: -2147483643
402 isCriticalSystemObject: TRUE
404 dn: CN=Certificate Service DCOM Access,CN=Builtin,${DOMAINDN}
407 description: Members of this group are allowed to connect to Certification Authorities in the enterprise.
408 objectSid: S-1-5-32-574
409 sAMAccountName: Certificate Service DCOM Access
410 systemFlags: -1946157056
411 groupType: -2147483643
412 isCriticalSystemObject: TRUE
414 # Add well known security principals
416 dn: CN=WellKnown Security Principals,${CONFIGDN}
418 objectClass: container
419 systemFlags: -2147483648
421 dn: CN=Anonymous Logon,CN=WellKnown Security Principals,${CONFIGDN}
423 objectClass: foreignSecurityPrincipal
426 dn: CN=Authenticated Users,CN=WellKnown Security Principals,${CONFIGDN}
428 objectClass: foreignSecurityPrincipal
431 dn: CN=Batch,CN=WellKnown Security Principals,${CONFIGDN}
433 objectClass: foreignSecurityPrincipal
436 dn: CN=Creator Group,CN=WellKnown Security Principals,${CONFIGDN}
438 objectClass: foreignSecurityPrincipal
441 dn: CN=Creator Owner,CN=WellKnown Security Principals,${CONFIGDN}
443 objectClass: foreignSecurityPrincipal
446 dn: CN=Dialup,CN=WellKnown Security Principals,${CONFIGDN}
448 objectClass: foreignSecurityPrincipal
451 dn: CN=Digest Authentication,CN=WellKnown Security Principals,${CONFIGDN}
453 objectClass: foreignSecurityPrincipal
454 objectSid: S-1-5-64-21
456 dn: CN=Enterprise Domain Controllers,CN=WellKnown Security Principals,${CONFIGDN}
458 objectClass: foreignSecurityPrincipal
461 dn: CN=Everyone,CN=WellKnown Security Principals,${CONFIGDN}
463 objectClass: foreignSecurityPrincipal
466 dn: CN=Interactive,CN=WellKnown Security Principals,${CONFIGDN}
468 objectClass: foreignSecurityPrincipal
471 dn: CN=Local Service,CN=WellKnown Security Principals,${CONFIGDN}
473 objectClass: foreignSecurityPrincipal
476 dn: CN=Network,CN=WellKnown Security Principals,${CONFIGDN}
478 objectClass: foreignSecurityPrincipal
481 dn: CN=Network Service,CN=WellKnown Security Principals,${CONFIGDN}
483 objectClass: foreignSecurityPrincipal
486 dn: CN=NTLM Authentication,CN=WellKnown Security Principals,${CONFIGDN}
488 objectClass: foreignSecurityPrincipal
489 objectSid: S-1-5-64-10
491 dn: CN=Other Organization,CN=WellKnown Security Principals,${CONFIGDN}
493 objectClass: foreignSecurityPrincipal
494 objectSid: S-1-5-1000
496 dn: CN=Proxy,CN=WellKnown Security Principals,${CONFIGDN}
498 objectClass: foreignSecurityPrincipal
501 dn: CN=Remote Interactive Logon,CN=WellKnown Security Principals,${CONFIGDN}
503 objectClass: foreignSecurityPrincipal
506 dn: CN=Restricted,CN=WellKnown Security Principals,${CONFIGDN}
508 objectClass: foreignSecurityPrincipal
511 dn: CN=SChannel Authentication,CN=WellKnown Security Principals,${CONFIGDN}
513 objectClass: foreignSecurityPrincipal
514 objectSid: S-1-5-64-14
516 dn: CN=Self,CN=WellKnown Security Principals,${CONFIGDN}
518 objectClass: foreignSecurityPrincipal
521 dn: CN=Service,CN=WellKnown Security Principals,${CONFIGDN}
523 objectClass: foreignSecurityPrincipal
526 dn: CN=Terminal Server User,CN=WellKnown Security Principals,${CONFIGDN}
528 objectClass: foreignSecurityPrincipal
531 dn: CN=This Organization,CN=WellKnown Security Principals,${CONFIGDN}
533 objectClass: foreignSecurityPrincipal
536 dn: CN=Well-Known-Security-Id-System,CN=WellKnown Security Principals,${CONFIGDN}
538 objectClass: foreignSecurityPrincipal