Permissions: A Primer, or: DACL, SACL, Owner, SID and ACE Explained

Updated: 2021-06-22 Every object that can have a security descriptor (SD) is a securable object that may be protected by permissions. All named and several unnamed Windows objects are securable and can have SDs, although this is not widely known. There does not even exist a GUI for manipulating the SDs of many object types! Have you ever tried to kill a system process in Task Manager and got the message “Access denied”? This is due to the fact that this process’ SD does not allow even administrators to kill the process. But it is, of course, possible, as an administrator, to obtain the necessary permissions, provided a GUI or some other tool is available.
Windows Internals

Citrix User Profile Manager: How Registry Exclusion Lists Can Mess Up Group Policy Processing

The documentation of Citrix User Profile Manager (UPM, for short) recommends excluding the following registry keys from processing: HKEY_CURRENT_USER\Software\Policies HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies The net effect of this is that the Citrix profiles managed by UPM do not contain any policy settings. The reasoning behind this being: Policies are reapplied anyway during the next logon, so there is no reason to waste CPU cycles on synchronizing such “redundant” information.
User Profiles

How to Build a State of the Art Backup System for Your Personal Data

Like most people, I have been accumulating personal data over the decades. While some of it is not too important, other pieces are priceless, especially my pictures and videos. Losing those files would be a nightmare. That kept me searching for the ideal backup mechanism for several years. Although I would not dare say I have found the perfect solution, I have learned a lot in the process and can give solid recommendations. Hence this article.
Miscellaneous

Mozy - Computer Upgrade / Data Migration - Lessons Learned

My familiy and me generate data all the time, mostly pictures and videos. I store it all on a PC in my small home network. That PC acts as a file server and, as all servers, needs to be backed up. The mere thought of losing all that information gives me the creeps. After initially copying all data to an external USB drive using an advanced rsync algorithm I switched to a more secure method - at least, that was my plan. Storing data offsite on the internet provides the benefit of not losing priceless photographs and videos when desaster strikes your home. Reading about the online backup service mozy.com, which offers unlimited storage capacity for a mere $ 4.95 per month, I signed up immediately and underwent the painful procedure of uploading roughly 180 GB during several months to mozy. That went relatively well, the client software had only small problems now and then. When all my files were uploaded, I was content. Until I decided to upgrade the hard drive of my home “server” hosting all my data.
Miscellaneous

Mandatory Profiles - The Good, the Bad and the Ugly

This article is part of Helge’s Profile Toolkit, a set of posts explaining the knowledge and tools required to tame Windows user profiles. A mandatory profile is a special type of roaming profile. As with a roaming profile, a mandatory profile is copied from its network location to the local machine during logon. But during logoff, changes are not copied back. Instead, the local copy of the mandatory profile is reset to its initial state at the next logon. In essence, mandatory profiles are read-only roaming profiles. This has advantages, but also severe drawbacks.
User Profiles

How to Prevent Users from Changing Permissions on File Servers

On file servers in corporate environments one typically does not want users to change permissions, even on their own files. It might seem that it would be sufficient to simply grant change permissions instead of full control, but unfortunately that is not the case. The problem is that whenever a new file gets created, the user creating the file will be its owner. And owners can always change permissions, regardless of the contents of the DACL.
Tips and Tools

Internet Explorer in Protected Mode - How the Low Integrity Environment Gets Created

Ever wondered what lies beneath the covers of Protected Mode Internet Explorer? Short answer, long explanation: mandatory integrity control (MIC). Recap: Mandatory Integrity Control During the development of Vista the developers at Microsoft felt that the traditional ACL-based mechanism to control access to system resources was not enough. The ACL model grants all processes run by a user specific permissions on system resources like files and registry keys. While this is a powerful thing and well-suited for “normal” applications, programs like Internet Explorer are under much heavier attack by malware than, say, your average text editor. Once an IE process has been corrupted by exploiting a security hole, the attacking software can write to any location on the system the currently logged on user has access to. Not good.
Windows Internals

Enter ProfileNurse - Your Skilled Profile Care Professional

Enter ProfileNurse - Your Skilled Profile Care Professional
Enter ProfileNurse - Your Skilled Profile Care ProfessionalUser profiles can be bitchy. A single misbehaving profile is bad enough, but what if you have hundreds or thousands of them? Most admins have a boatload of profiles strewn across file servers, and no way of knowing anything about them because they are lacking the management tools. That’s where ProfileNurse comes in, a free tool for offline profile management. It can not only manipulate arbitrary settings stored in profiles but also gather different kinds of information about each profile on a file server.
User Profiles

How to Reduce the Size of Roaming Profiles

This article is part of Helge’s Profile Toolkit, a set of posts explaining the knowledge and tools required to tame Windows user profiles. Roaming user profiles tend to grow over time, which is sometimes referred to as profile bloat. In and by itself, profile growth is not a problem. Users of desktop PCs who log on the the same machine every day will not even notice that they have huge profiles ready to follow them around the network. Their locally cached copy of the roaming profile is always current. No need to fetch anything from a file server during logon.
User Profiles

VMware vs. Microsoft: Why Memory Overcommitment is Useful in Production and Why Microsoft Denies it

In the ongoing virtualization war much has been written (pro and con) about the value of memory overcommitment, a feature VMware ESX has and Microsoft Hyper-V is lacking (XenServer, too, for that matter). But only few people take a look at what the term overcommitment actually means. In this article I will explain how overcommitment works, why it greatly benefits VDI installations and why Microsoft denies exactly this.
Virtualization & Containers