
- PowerShell Wiki
- IT Administration Forum
- PowerShell Forum
- Community Forum
- Site-Wide Activity
- PowerShell Group
- Earning as 4sysops member
- Member Ranks
- Member Leaderboard – This Month
- Member Leaderboard – This Year
- Member Leaderboard – All-time
- Author Leaderboard – Last 30 Days
- Author Leaderboard – This Year
- Cloud Computing
- Write for 4sysops
- Security options in Windows Server 2016: Accounts and UAC
4sysops - The online community for SysAdmins and DevOps


Interactive logon
User account control.
- Recent Posts

- Kill Windows a process with Tskill and Taskkill - Mon, Mar 13 2023
- Cannot delete a file or folder - Wed, Feb 22 2023
- Analyze Windows memory usage with RAMMap - Fri, Feb 3 2023
Security policy settings control various aspects of system protection, as explained in my post User rights assignment in Windows Server 2016 . Settings available in Security Options allow you to configure things related to user accounts, interactive logon, network access, network security, and the UAC feature. Today, I will cover settings related to interactive user behavior and built-in accounts. You should add these to your security baseline group policies and apply them on all computers.
Each setting uses the following format:
Name of the setting —Recommended value or values
The built-in Administrator account is often a target of attackers because it is a well-known account with complete control of the system. Furthermore, the account lockout policy does not apply to this account, so brute-force attacks will not lock it. Despite the fact you can rename the account with the Accounts: Rename administrator account setting, the recommended approach is to disable this account. Enumerating user account names is one of the first steps attackers undertake.
Note that in case of issues like a broken domain trust, you will need to reboot the system to safe mode, where the account is always enabled, or have another local account with administrator privileges available.
Accounts: Block Microsoft accounts —Users can't add or log on with Microsoft accounts
Users should be able to use only accounts your organization provides. This option will prevent access to Microsoft online accounts.
Accounts: Guest account status —Disabled
Even though the Guest account has no rights by default, it is a best practice to disable it completely and rename it with the Accounts: Rename guest account option.
TIP: Renaming the Guest account to Administrator is a good trick on attackers—they think they are trying to hack the Administrator account, but in reality, they are hacking an account with no permissions. This may slow down an attack.
Accounts: Limit local account use of blank passwords to console logon only —Enabled
There may be some leftover local accounts with no passwords, which is far from secure. Enabling this setting ensures no one can use such accounts for Remote Desktop Protocol (RDP) connections or network access to a share. Physical access to the keyboard (or VMware console) is required to use such accounts.

Settings related to built in accounts
Interactive logon: Do not display last user name —Disabled
Normally, when Windows boots up, it shows the username of the last logged-on user. The username is sensitive information. An attacker could use it to discover your naming convention and then guess other usernames.
Interactive logon: Do not require CTRL+ALT+DEL —Disabled
This well-known key combination prevents exploits that present users with a fake logon screen, capturing entered credentials.
Interactive logon: Number of previous logons to cache (in case domain controller is not available) —2
Cached logons are stored on the local filesystem. If an attacker gains access to the filesystem, he can also find these cached logons. It is not very common that a domain-joined server can't reach domain controllers to authenticate a user.
Interactive logon: Require Domain Controller authentication to unlock workstation —Enabled
Enabling this setting ensures that changes to user accounts apply to users already logged on. For example, disabling a user account means no one can use it any longer to unlock a previously logged-on session. If you are working offline, this setting is not applied.
User Account Control: Admin Approval Mode for the Built-in Administrator account —Enabled
User Account Control: Run all administrators in Admin Approval Mode —Enabled
These two settings control whether UAC is enabled or not. By default, the first option is set to disabled; if you are logged on as Administrator, everything is running with elevated privileges. It is a best practice to enable UAC for the Administrator account also.
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode —Prompt for consent on the secure desktop
User Account Control: Switch to the secure desktop when prompting for elevation —Enabled
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop —Disabled
Configuring all three settings as above ensures that the system will always switch to the secure desktop (a dimmed screen with a prompt). Malware can spoof a standard elevation prompt—once you enter your elevated credentials, the attacker has them.

Secure desktop prompt
User Account Control: Detect application installations and prompt for elevation —Enabled
Some malware may look like a trusted program. When you permit it, it will try to install the malicious code. Enabling this setting will display another prompt, allowing you to mitigate damage.
User Account Control: Behavior of the elevation prompt for standard users —Automatically deny elevation requests
Subscribe to 4sysops newsletter!

Error message for a standard user
As you can see, many security settings are available in Windows Server 2016. A clean installation leaves many of them not configured for high security. I highly recommend changing them, especially those related to built-in accounts and the UAC feature. By doing so, you are making your server more secure.

Want to write for 4sysops? We are looking for new authors.
4sysops members can earn and read without ads!
- Windows Server security features and best practices
- User rights assignment in Windows Server 2016
- Security options in Windows Server 2016: Network security

Restrict logon time for Active Directory users

Show or hide users on the logon screen with Group Policy

Manage BitLocker centrally with AppTec360 EMM

Local password manager with Bitwarden unified

Recommended security settings and new group policies for Microsoft Edge (from 107 on)

Save and access the BitLocker recovery key in the Microsoft account

Manage Windows security and optimization features with Microsoft’s free PC Manager

IIS and Exchange Server security with Windows Extended Protection (WEP)

Remove an old Windows certificate authority

Find the source of AD account lockouts

Unlock AD accounts with PowerShell

Privacy: Disable cloud-based spell checker in Google Chrome and Microsoft Edge

PsLoggedOn: View logged-on users in Windows

Controlled folder access: Configure ransomware protection with Group Policy and PowerShell

Self-service password reset with ManageEngine ADSelfService Plus

Find Active Directory accounts configured for DES and RC4 Kerberos encryption

List Windows processes with PsList

Smart App Control: Protect Windows 11 against ransomware

Encrypt email in Outlook with Microsoft 365

Split-brain DNS deployment using Windows Server DNS policy
Leave a reply click here to cancel the reply.
Please enclose code in pre tags
Your email address will not be published. Required fields are marked *
Notify me of followup comments via e-mail. You can also subscribe without commenting.
Receive new post notifications

Subscribe to Newsletter
Follow 4sysops.
Please ask IT administration questions in the forums . Any other messages are welcome.
Log in with your credentials
or Create an account
Forgot your details?
Create account.
Receive news updates via email from this site
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
How to grant users rights to manage services
- 4 minutes to read
- 3 contributors
This article describes how to grant users rights to manage services.
Applies to: Windows Server 2003 Original KB number: 325349
This article describes how to grant users the authority to manage system services in Windows Server 2003.
By default, only members of the Administrators group can start, stop, pause, resume, or restart a service. This article describes methods that you can use to grant the appropriate rights to users to manage services.
Method 1: Use Group Policy
You can use Group Policy to change permissions on system services. For additional information, click the following article number to view the article in the Microsoft Knowledge Base: 324802 HOW TO: Configure Group Policies to Set Security for System Services in Windows Server 2003
Method 2: Use Security Templates
To use security templates to change permissions on system services, create a security template following these steps:
Click Start , click Run , type mmc in the Open box, and then click OK .
On the File menu, click Add/Remove Snap-in .
Click Add , click Security Configuration and Analysis , click Add , click Close , and then click OK .
In the console tree, right-click Security Configuration and Analysis , and then click Open Database .
Specify a name and location for the database, and then click Open .
In the Import Template dialog box that appears, click the security template that you want to import, and then click Open .
In the console tree, right-click Security Configuration and Analysis , and then click Analyze Computer Now .
In the Perform Analysis dialog box that appears, accept the default path for the log file that is displayed in the Error log file path box or specify the location that you want, and then click OK .
After the analysis is complete, configure the service permissions as follows:
- In the console tree, click System Services .
- In the right pane, double-click the service whose permissions you want to change.
- Click to select the Define this policy in the database check box, and then click Edit Security .
- To configure permissions for a new user or group, click Add . In the Select Users, Computers, or Groups dialog box, type the name of the user or group that you want to set permissions for, and then click OK .
- In the Permissions for User or Group list, configure the permissions that you want for the user or group. When you add a new user or group, the Allow check box next to the Start, stop and pause permission is selected by default. This setting permits the user or group to start, stop, and pause the service.
- Click OK two times.
To apply the new security settings to the local computer, right-click Security Configuration and Analysis , and then click Configure Computer Now .
You can use also the Secedit command-line tool to configure and analyze system security. For more information about Secedit, click Start , and then click Run . Type cmd in the Open box, and then click OK . At the command prompt, type secedit /? , and then press ENTER. Note that when you use this method to apply settings, all the settings in the template are reapplied, and this may override other previously configured file, registry, or service permissions.
Method 3: Use Subinacl.exe
The final method for assigning rights to manage services involves the use of the Subinacl.exe utility from the Windows 2000 Resource Kit. The syntax is as follows:
SUBINACL /SERVICE \\MachineName\ServiceName /GRANT=[DomainName]UserName[=Access]
The user who runs this command must have administrator rights for it to complete successfully.
If MachineName is omitted, the local machine is assumed.
If DomainName is omitted, the local machine is searched for the account.
Although the syntax example indicates a user name, this will work for user groups too.
The values that Access can take are as follows:
F : Full Control R : Generic Read W : Generic Write X : Generic eXecute L : Read controL Q : Query Service Configuration S : Query Service Status E : Enumerate Dependent Services C : Service Change Configuration T : Start Service O : Stop Service P : Pause/Continue Service I : Interrogate Service U : Service User-Defined Control Commands
If Access is omitted, "F (Full Control)" is assumed.
Subinacl supports similar functionality in relation to files, folders, and registry keys. For more information, see the Windows 2000 Resource Kit .
Automating Multiple Changes
With Subinacl, there is no option that you can specify that will set the required access for all services on a particular computer. However, the following sample script demonstrates one way that Method 3 can be extended to automate the task:
Save the script as a .vbs file, such as "Services.vbs," and call it as follows:
CSRIPT Services.vbs DomainName ComputerName UserName Access
Comment out or remove the line 'Wscript.Echo ...' if no feedback is required.
This sample does no error checking; therefore, use it carefully.
The Windows 2000 Resource Kit documentation mentions another utility (svcacls.exe) that performs the same service management rights manipulation as Subinacl. This is a documentation error.
Was this page helpful?
Additional resources
- IT Resources
- Windows Server
- System Center
- Microsoft Edge
- Exchange Server
- SharePoint Products
- Skype for Business
- See all products »
- Channel 9 Video
- Evaluation Center
- Learning Resources
- Microsoft Tech Companion App
- Microsoft Technical Communities
- Microsoft Virtual Academy
- Script Center
- Server and Tools Blogs
- TechNet Blogs
- TechNet Flash Newsletter
- TechNet Gallery
- TechNet Library
- TechNet Magazine
- TechNet Wiki
- Windows Sysinternals
- Virtual Labs
- Cloud and Datacenter
- Virtualization
- Service Packs
- Security Bulletins
- Windows Update
- Windows Server 2016
- System Center 2016
- Windows 10 Enterprise
- SQL Server 2016
- See all trials »
Related Sites
- Microsoft Download Center
- Microsoft Evaluation Center
- Expert-led, virtual classes
- Training Catalog
- Class Locator
- Free Windows Server 2012 courses
- Free Windows 8 courses
- SQL Server training
- Microsoft Official Courses On-Demand
Certifications
- Certification overview
- Special offers
- MCSE Cloud Platform and Infrastructure
- MCSE: Mobility
- MCSE: Data Management and Analytics
- MCSE Productivity
Other resources
- Microsoft Events
- Exam Replay
- Born To Learn blog
- Find technical communities in your area
- Azure training
- Official Practice Tests
Support options
- For business
- For developers
- For IT professionals
- For technical support
- Support offerings
More support
- Microsoft Premier Online
- TechNet Forums
- MSDN Forums
- Security Bulletins & Advisories
Not an IT pro?
- Microsoft Customer Support
- Microsoft Community Forums
- Forums home
- Browse forums users
- Remove From My Forums
Cannot modify User Rights Assignment wthin the local security policy on a Server 2016 server (Datacenter)
I try to assign Debug programs to some account (by running secpol.msc), but Add User or Group button is disabled, and it says:
"This setting is not compatible with computers running Windows 2000 Service Pack 1 or earlier. Apply Group Policy Objects containing this setting only to computers running a later version of the operating system."
All replies
As far as the warning goes it is a standard warning that you're about to push out a policy that may not affect some of your domain members.
However the point is you are trying to edit a local security policy. And you cannot edit this User Rights Assignment policy because this setting is being managed by a domain-based Group Policy. In this case, the domain Group Policy setting has precedence and you are prevented from modifying the policy via Local Group Policy.
To modify this policy, either:
- Modify the policy in the applicable domain Group Policy Object.
- Prevent any domain-based GPOs from specifying this setting, then edit the computer's Local Group Policy.
Group policy objects (GPO) – Used in Active Directory domains to configure and regularly reapply security settings to multiple computers.
Local security policy (secpol.msc) – Used to configure a single (local) computer. Note that this is a one-time action. If another administrator changes these settings, you will need to manually change them back to the required state.
- Proposed as answer by Daisy Zhou Microsoft contingent staff Monday, December 9, 2019 7:51 AM
Please remember to mark the replies as answers if they help. If you have feedback for TechNet Subscriber Support, contact [email protected] .
sorry for late. I just have time to working on this. I know the polocy is controlled by Domain Controller now.
I use LsaAddAccountRights to add rights and LsaEnumerateAccountRights to enumerate rights, but it seems only work for local rights. I'm looking for a way to find the actually effective permissions for a user by API.

- NIST 800-53
- Common Controls Hub
The Allow log on locally user right must only be assigned to the Administrators group.
Add User or Group button is grayed out in User Rights Assignment

Logon failure: The user has not been granted the requested logon type at this computer

1] Modify default Domain Controller Policy setting
2] enable add user or group button in user rights assignment, what are some of the settings available in the user rights assignment, how do i add a user to logon locally, where are user rights assignments stored.
You can configure the User Rights Assignment settings in the following location within the Group Policy Management Console (GPMC) under Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment , or on the local device by using the Local Group Policy Editor (gpedit. msc).

[email protected]
Stack Exchange Network
Stack Exchange network consists of 181 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Server Fault is a question and answer site for system and network administrators. It only takes a minute to sign up.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Users have full control, but gets "you need permission.." errors
Windows Server 2016 Standard... department/group's users were getting read permission errors within their department folder, gave them full control on folder and subs, then they got write permissions error ("You require permission from ZPICTURES\admin-zp to make changes to this file"), then gave each user in group full control of folder and subs, but still getting the same error message when trying to write or modify anywhere within ("You require permission from...").
I'm really confused now as this configuration works on another group's folder (actually, with just full control to group instead of all users). How do I fix this group's permission configuration so the group's users have write permissions?
- permissions
- windows-server-2016
2 Answers 2
- When you make a permission change the users need to logout and log back in for the changes to take effect.
- I would advise against giving full control. That allows users to change permissions and take ownership of files. Modify rights should be sufficient for the vast majority of user's needs when it comes to shares.
- Other users could have the files locked if they are accessing the same exact files.
- In Windows Deny is Deny. If a user has deny anywhere from any group or explicit permission then they are denied that right. Go to the security -> advanced -> effective permissions on a file and see what that tells you.
- 2 When you make a permission change the users need to logout and log back in for the changes to take effect - That isn't technically correct. Changes to security group membership requires a new logon. Changes to NTFS permissions do not. If the users were already members of the security group in question and their access token reflected that, then changes to the NTFS permissions for that group would be effective immediately. No log out and log on is required. – joeqwerty Nov 15, 2016 at 18:46
- 2 In Windows Deny is Deny. If a user has deny anywhere from any group or explicit permission then they are denied that right - As a point of clarification, an explicit Allow takes precedence over an inherited Deny. – joeqwerty Nov 15, 2016 at 18:48
You were already introduced to the main concepts of NTFS permissions in the answer by @JBaldridge above which haven't changed much since early days on NTFS/Windows server. I would only add a few things:
- Watch out how you access folder, locally or over the network. It the latter is the case, then you have to take into account Share permissions. You have to consider both Share and NTFS permissions: having write on NTFS level won't allow you to write data over the network when Share permission is Read only. Think about Share Permissions as a funnel which comes into play only when folder is accessed over the network.
- In case keeping in mind to level of permissions is too much of a hassle for you then well tried approach is always grant Full Control to Authenticated Users on share level, and tailor your permissions on NTFS level only - this makes admin life a bit easier. If just checked default sharing permissions in Server 2016 and it gives Full Control to Everyone + Administrators by default.
- Worth reiterating: Explicit deny always win, no matter how many grants/allows you add.
- Keep in mind order of precedence to understand effective NTFS permissions permissions are evaluated in this order and evaluation stops on a first match: 1) Explicit Deny 2) Explicit Allow 3) Inherited Deny 4) Inherited Allow
And last but not least make use of Effective Access to verify what level of access specific user or group have. It's available for you in Advanced Security Settings for folder, see picture below demonstrating UI of this feature (I guess picure should give you quite good understanding of what you can do with this feature):

- 2 Worth reiterating: Deny always win, no matter how many grants/allows you add - That's not correct. An explicit Allow has precedence over an inherited Deny. – joeqwerty Nov 15, 2016 at 20:13
- 2 It took me to re-read your note before getting your point. Order of processing goes from child up to to the three and it stops at first deny or if there is no such on first allow, so explicit allow on object will win over inherited one. I will edit my answer to say explicit deny always win which seems to be a bit more correct maybe? – Mikhail Nov 15, 2016 at 21:12
- Right, I just wanted to provide some clarification. Thanks. – joeqwerty Nov 15, 2016 at 21:28
Your Answer
Sign up or log in, post as a guest.
Required, but never shown
By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged permissions windows-server-2016 or ask your own question .
- The Overflow Blog
- Building an API is half the battle: Q&A with Marco Palladino from Kong
- Developers think AI assistants will be everywhere, but aren’t sure how to...
- Featured on Meta
- We've added a "Necessary cookies only" option to the cookie consent popup
- The Stack Exchange reputation system: What's working? What's not?
Hot Network Questions
- Do MEMS or optical gyroscope record Earth's rotational and revolutional angular velocities?
- Is this Lunarri race balanced?
- Can the positive root of this polynomial be expressed elementarily?
- Did mechanical hard drives often malfunction in high elevation places such as Bogota?
- How useful is a caliper for a home-based bike workshop?
- What does the phrase 'play of' mean?
- Looking for a possible trilogy from the 2000s
- What's an adjective/phrase for "as a matter of principle"?
- What if a student doesn't understand a question because of differences in dialect?
- A melody is built from both notes and chords
- Opamp with unbalanced rails
- Is "Lenin’s Testament" authentic?
- What if you could shut off the pull of gravity on your body?
- Preparing a flow chart for thesis outline in TeX
- Would it be possible for a planet to orbit around a trinary star system in a figure 8 orbit?
- Is it possible to have seasonality at 24, 12, 8 periods in hourly based wind power data?
- Trace shows Linux has worse error than Windows in 1/(-1.)^1.2
- "Hierba" or "Yerba" - which is gramatically correct?
- This is a fun little word puzzle based on a fun little number puzzle
- Chain rule mismatch
- Is the cabin pressure "worse" at the back of the cabin than in front?
- Is it OK practice to start a car while it's on jackstands?
- How can I heat my buildings without fire in a low-fantasy setting?
- Is the L2 norm positive definite?
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
- Stack Overflow Public questions & answers
- Stack Overflow for Teams Where developers & technologists share private knowledge with coworkers
- Talent Build your employer brand
- Advertising Reach developers & technologists worldwide
- About the company
Collectives™ on Stack Overflow
Find centralized, trusted content and collaborate around the technologies you use most.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Powershell: Export User Rights Assignment
I'm new to PowerShell (PS). Currently I'm using windows server 2012 and I'm interested to know whether there is any way to export User Rights Assignment into a txt file. I tried
The above should should export it.
So, I get this: Current Output . Is there any way to export User Rights Assignment and make it look like (even with using batch files): Expected Output .
P.S Is There anyway to output those values in console? So i would be enable to redirect them to a txt file.
- 1 Please edit the description and clearly explain the difference between the two links you have pasted. That will make the problem clear to the readers. Even when the link is removed, readers will still have access to the problem description. – phoenix Feb 11, 2016 at 16:52
- Sorry link got changed in edit – jonjoli Feb 11, 2016 at 17:06
- 1 I could probably try to help you but my company blocks all file download sites so I can't view any of the links you posted. – Squashman Feb 11, 2016 at 18:57
- should just post them? – Ojs Feb 11, 2016 at 19:04
- @jonjoli - See my updated answer. – Bill_Stewart Feb 16, 2016 at 21:23
3 Answers 3
Here's a PowerShell script that outputs usable objects with translated names and SIDs:

- 1 sorry for late response but that gives the same output as "secedit /export /areas USER_RIGHTS /cfg d:\policies.txt" – jonjoli Feb 12, 2016 at 11:16
- It outputs the data as objects, not as text, so no, the output is not "the same". Perhaps you need to clarify your question. – Bill_Stewart Feb 12, 2016 at 13:37
- how to make it ouput as txt? – jonjoli Feb 12, 2016 at 13:46
- What do you mean? Please update your question with what you want the output to look like (no links please - please paste an example directly into your question). – Bill_Stewart Feb 12, 2016 at 15:41
- 1 You are in luck in this case. I think I understand. See updated answer. – Bill_Stewart Feb 12, 2016 at 18:52
in addition to Eric's change i also needed to add a try catch to one of the functions in Bill_Stewart's post. if the SID being translated is from an object that no longer exists this will return the SID instead of sending an error for translate.
Great script overall. Thank you for your efforts. One change I needed to make however to get it to output all principals assigned a right was to change the regex to '^(Se\S+) = (.+)' so that principals that were already resolved with a space in the name such as 'Domain users' were matched. Before that it would just report 'Domain.'
To save the output to a file, add a >> filename after the closing bracket of the last foreach-object Ex: } } >> 'outFile.txt'
or to output as delimited file (e.g., csv) use the following:
} | convertto-csv -delimiter '~' -notypeinformation >> 'outFile.txt'
Hope this helps.
Your Answer
Sign up or log in, post as a guest.
Required, but never shown
By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged windows shell powershell batch-file or ask your own question .
- The Overflow Blog
- Building an API is half the battle: Q&A with Marco Palladino from Kong
- Developers think AI assistants will be everywhere, but aren’t sure how to...
- Featured on Meta
- We've added a "Necessary cookies only" option to the cookie consent popup
- The Stack Exchange reputation system: What's working? What's not?
- Launching the CI/CD and R Collectives and community editing features for...
- The [amazon] tag is being burninated
- Staging Ground Beta 1 Recap, and Reviewers needed for Beta 2
- Temporary policy: ChatGPT is banned
Hot Network Questions
- Best way to highlight the main result in a mathematical paper
- What does the phrase 'play of' mean?
- Is it OK practice to start a car while it's on jackstands?
- Reducing 120 VAC to 24 VAC with a 5.1 Ω, 6.5 W resistor
- Relationship between z-score and the normal distribution
- What's a good word to describe someone who is prone to sudden changes of mood?
- Theoretical Computer Science vs other Sciences?
- What's an adjective/phrase for "as a matter of principle"?
- Are designs explained in academic publications considered to be in public domain if there isn't yet a patent application about it?
- Why are accelerator beam neutrino experiments built an angle off the beam direction?
- Why are most US news programs silent about Iran-Saudi deal announced at Beijing on March 10th?
- Recommendations for getting into sheaves with emphasis on differential geometry and algebraic topology
- Called Dr. in government setting?
- Trace shows Linux has worse error than Windows in 1/(-1.)^1.2
- Why did my flight leave the gear down for the first 10 minutes of flight?
- How to write ~2.1 in LaTex?
- Is the cabin pressure "worse" at the back of the cabin than in front?
- broker cancelled life insurance policy without authorization
- Is there a bug in Eigensystem[]?
- Novel about an Indiana Jones type character rescuing mummies from Mexican banditos
- How can I protect /dev/sdX against accidental formatting?
- Is it legal for a company to require you to delete your account to unsubscribe from marketing emails?
- When to use a ROC Curve vs. a Precision Recall Curve?
- Short film involving a young man who has died and is performing good deeds to score enough points to reach Heaven
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
- About the Authors
Managing “Logon As a Service” Permissions Using Group Policy or PowerShell
In Windows, you can use the “ Log on as a service ” Group Policy option to allow services to run under user accounts, and not in the context of a Local System, Local Service, or Network Service.
This policy allows certain accounts to start a process as a Windows service on behalf of a user. When this process starts, it is registered as a service.
The “Log on as a service” user right allows to start Windows network services that run continuously on the computer under the user account, even if no one is logged into the console of the computer (server). Also, this method allows you to safely start third-party services for which you don’t want to grant Local System privileges. It is much safer to run third-party services on behalf of non-admin user. The risk of using service accounts to run services is reduced because only local users with administrator permissions can install and configure Windows services.
Enable Logon as a Service Group Policy Option
Run the local (gpedit.msc) or domain (gpmc.msc) Group Policy Editor and go to the following GPO section: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment. Find the Log on as a service policy.
Note that in Windows Server 2022, 2019, 2016, and Windows 10, the “NT SERVICE\ALL SERVICES” group is added to this policy by default.
When installing the Hyper-V role in Windows , the “NT VIRTUAL MACHINES\Virtual Machines” group (SID S-1-5-83-0) is additionally added. When installing web server IIS with the .NET Framework, then the IIS APPPOOL.NET v4.5 account is added.
Installing the IIS Web Server with .NET Framework adds the “IIS APPPOOL\.NET v4.5” and “IIS APPOOL\DefaultAppPool” accounts.

Hint . You can also change the local Logon as a service policy through Local Security Policy console. To do this, open the Windows Control Panel > Local Security Policy > Security Settings > Local Policies > User Rights Assignments (or run the secpol.msc command) and modify the policy.
Double-click on the Logon as a service policy, click the Add User or Group button and specify the account or group to which you want to grant the permissions to run Windows services.

To apply the new settings, run the gpupdate command :
How to Start a Service Under a Specific Account?
Now you can start the service management console (services.msc), and try to configure the launch of any service from behalf of a user account: select service > Properties > Log on tab > Log on as > This account > select account and set a password.
A message appears:
The account .\admin has been granted the Log On As A Service right.

When using this policy, make sure that the user or group is not added to another policy called “ Deny log on as a service ”. In this policy, you can specify which user accounts are not allowed to run services. If the user is simultaneously added to the “Deny log on as a service” and “ Logon as a service” policies, the deny policy will take precedence. Those, when the service starts, a message appears:
Services Windows could not start the xxxx service on Local Computer.Error 1069: The service did not start due to a logon failure.

You can also change the account under which a particular service runs from the command line. You can activate this task using the built-in sc.exe console tool. To start the MyWallService service under the ca_srvsvc domain account, run the command:
* Where userpassword5 – is the service account password.
If you entered everything correctly, a message will appear:
[SC] ChangeServiceConfig SUCCESS.

You can also use PowerShell to set user account credentials in service settings. In this example, we will use the Service Management API via WMI (only applies to Windows PowerShell 2.x – 5.1):
Note that WMI allows you to change the credentials to run a service remotely. Just replace [computername] with the name of the remote computer where you want to configure the service or use a dot (.) if you want to change the credentials on the local computer.
To remotely change only the password of the account under which the service is running, use the following PowerShell script:
The following UserAccountControl attributes are typically enabled for a service account in Active Directory:
- Password never expires.
- User cannot change password.

Hint . In modern versions of Windows Server in an Active Directory domain, it is preferable to use special types of service accounts: Managed Service Accounts ( MSA , object of type msDS-ManagedServiceAccount) or Group Managed Service Accounts ( gMSA , object of type msDS-GroupManagedServiceAccount). These are special types of AD objects created specifically to securely run system services, scripts, and scheduler jobs. For these service accounts, a complex password is generated in Active Directory and automatically changed every 30 days (by default). Such service accounts can independently change their passwords in Active Directory. In this case, the password is not stored on the local computer (cannot be retrieved from LSAS process), it cannot be used for interactive login, and the secure Kerberos protocol is used for authentication ( Getting Started with Group Managed Service Accounts ).
It is advisable to minimize the number of user accounts to which you grant the “Logon as a service” permissions. To minimize security risks, you should disable interactive and remote interactive sessions for service accounts. This is often described in best practices.

Cyril Kardashevsky
I enjoy technology and developing websites. Since 2012 I'm running a few of my own websites, and share useful content on gadgets, PC administration and website promotion.
Manage and Disable Windows Defender Using PowerShell
How to get user attributes from active directory, you may also like, how to get windows 10 user login history..., how to reset onedrive sync in windows, icacls: list and manage folder and file permissions..., how to fix user profile cannot be loaded..., get-service: checking windows services status with powershell, removing old and unused drivers from driver store..., how to delete swapfile.sys in windows 10/11, how to fix error 0x80070057, how to delete com port in use, using select-object cmdlet in powershell.
It should really be noted that by creating a GPO, all existing entries in the “Log on as a service” policy will get overwritten with whatever is in the group policy. If you have SQL servers, or other servers that use service accounts that have already installed software/apps, those will be removed in place of what is in your group policy.
Thank you. Literally NO ONE in Enterprise IT understands this about most of the stuff in the USer Rights Assignment of Group Policy. I’ve fixed so many outages due to admins settings this via GPO across many servers and overwriting what’s already set in there by x, y, z application that was installed who put accounts in there. Admins just blindly follow along application documentation or posts like this. I’m so tired of it.
– Angry Sr. Systems Admin LOL
Been like this for 20 years now.
Microsoft really needs to add switches for append, remove and replace for setting group policy objects, or just remove these from GPO management altogether as it’s half baked.
Please follow this up with how to set Logon As a Service for a user or group policy on Windows Server 2016 Core – there is no GUI, no control panel, no gpedit.msc, no gpmc.msc, no services.msc, etc etc.
For example, to setup Jenkins requires a user account with Logon As a Service enabled. Thank you
Leave a Comment Cancel Reply
Save my name, email, and website in this browser for the next time I comment.
This site uses Akismet to reduce spam. Learn how your comment data is processed .

Learn [Solve IT]
Hands-on on Windows, macOS, Linux, Azure, GCP, AWS
How to configure log on as a batch job permissions on any server
Log on as a batch job. This security setting allows a user to be logged on by means of a batch-queue facility and is provided only for compatibility with older versions of Windows. For example, when a user submits a job by means of the task scheduler, the task scheduler logs that user on as a batch user rather than as an interactive user. Default: Administrators and Backup Operators. Please visit the following links for more on Group Policy Objects and GPO . To learn more about these switches, see “ All about GPUpdate Switches: GPUpdate vs GPUpdate /force “, what is Registry Editor and how to access the registry hives , and how to search through Windows Registry , what is Registry Editor and how to access the registry hives and how to search through Windows Registry .
To do this, search for the “secpol.msc” from the windows search as shown below, or alternatively, launch the run dialog wizard and enter “secpol.msc” and hit ok. Regardless of the step, you chose to use, this will open the Local Security Policy console. “
Note: You can also access this from the Group Policy Management Editor dialog box, under Computer Configuration , expand Policies, Windows Settings , Security Settings , and Local Policies , and then click User Rights Assignment

Locate the Local Policies , and then click User Rights Assignment . On the right pane of the window, double-click on log on as a batch job

This will open up the Log on as a batch job Properties window. Click on Add Users or Group as shown below.

This will open up the wizard below to select users, computers, service accounts or groups. Since we are interested in adding an MBAM service account, when I am done, I will click on OK.

As you can see, the service account has been added. Click on Ok to close this window.

As you can see the policy has been configured and that is all that needs to be done.

I hope you found this blog post helpful. If you have any questions, please let me know in the comment session.
Thank you for reading this post. Kindly share it with others.
Windows OS Hub / Windows 10 / Allow or Prevent Non-Admin Users from Reboot/Shutdown Windows
Allow or Prevent Non-Admin Users from Reboot/Shutdown Windows
How to allow or prevent shutdown/reboot option in windows via gpo, allow remote shutdown/restart without admin permissions, disable (hide) shutdown or restart options from windows, how to find out who restarted/shutdown a windows server.
You can set the permissions to restart or shutdown Windows using the Shut down the system parameter in the GPO section Computer Configuration -> Policies -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment. This GPO option allows you to specify which locally logged-on users can shut down an operating system.
Please note that the default restart/shutdown permissions for desktop versions Windows 10/11 and Windows Server editions are different.
Open the Local Group Policy Editor ( gpedit.msc ) and navigate to the section specified above. As you can see, the members of local groups Administrators , Users and Backup Operators have the permissions to shutdown/reboot a computer running Windows 10 or 11 .

On Windows Server 2022/2019/2016 , only Administrators or Backup Operators can shut down or restart the server. It is reasonable, since in most cases a non-admin user must not have the privileges to shutdown a server (even accidentally). Just imagine an RDS farm host that is often shuts down since users accidentally click on the “Shutdown” button in the Start menu…
On Active Directory domain controllers, the rights to shut down Windows are delegated to:
- Administrators
- Backup Operators
- Server Operators
- Print Operators
If the user does not have permissions to restart/shutdown the operating system, then an error will appear when running the following command:
shutdown –r –t 0

You can manually grant permissions to shut down the computer locally using the legacy ntrights tool from the Windows Server 2003 Resource Kit:
ntrights +r SeShutdownPrivilege -u woshub\j.smith
To prevent user from shutting down or restarting Windows:
ntrights -r SeShutdownPrivilege -u woshub\j.smith
Or, vice versa, you can prevent users of workstations running the desktop Windows 10/11 edition from restarting the computer that performs some kind of server function. In this case, just remove Users group from the local policy Shut down the system .
In the same way, you can prevent (or allow) shutdown/reboot operations for non-admin users on all computers in a specific Organizational Unit (OU) of an Active Directory domain using a domain GPO.
- Create the grpAllowRestartComputers user group in AD, to whom you want to grant the permissions to restart computers. You can create a new group using the ADUC snap-in ( dsa.msc ) or the New-ADGroup PowerShell cmdlet . Add users to the group;

- Set the GPO name ( gpoAllowReboot ) and edit it;
- Navigate to Computer Configuration -> Policies -> Windows Settings -> Security Settings -> User Rights Assignment;

- Update the GPO settings on the target computers and check the resulting GPO settings with the rsop.msc snap-in. Users in your group can now shut down or reboot this host;

To do it, add a user account to the Force shutdown from a remote system Group Policy option in the same GPO section ( User Rights Assignment ).
By default, only administrators can shutdown/restart the server remotely. Add a user account to the policy.

ntrights +r SeRemoteShutdownPrivilege -u woshub\j.smith
After that, the user will get the SeRemoteShutdown privilege and will be able to restart the server remotely using the command:
Or using the Restart-Computer PowerShell cmdlet:
Restart-Computer –ComputerName hamb-rds01 –Force
If WinRM (Windows Remote Management) is enabled on the remote computer, you can use WSman instead of WMI to connect:
Restart-Computer -ComputerName hamb-rds01 -Protocol WSMan
If the user does not have permission to connect to WMI namespace, an error will appear:
You can use Group Policy to hide the Shutdown, Restart, Sleep and Hibernate options from the sign-in screen and Start Menu. This GPO option is called Remove and Prevent Access to the Shut Down, Restart, Sleep, and Hibernate commands and is located under User Configuration -> Administrative Templates -> Start Menu and Taskbar

After you enable this policy, a user will be able only to disconnect the current session or use the logoff command. The Shutdown, Sleep and Restart buttons will become unavailable.

You can use some registry tweaks to hide only a specific item from the Power/Shutdown menu in Windows. For example, you want to hide only the “Shut down” option in the Start menu, but keep “Restart”.
- Open the Registry Editor ( regedit.exe );
- Go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Start\HideShutDown ;

REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Start\HideShutDown" /v "value" /t REG_DWORD /d 1 /f
Or using PowerShell:
Set-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\PolicyManager\default\Start\HideShutDown" -Name "value" -Value 1
Also, you can hide other options in Start Menu and Windows sign-in screen:
- Hide only Restart option in Windows: REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Start\HideRestart " /v "value" /t REG_DWORD /d 1 /f
- Hide Hibernate option from Start Menu in Windows: R EG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Start\HideHibernate" /v "value" /t REG_DWORD /d 1 /f
- Hide Sleep from Start Menu: REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Start\HideSleep" /v "value" /t REG_DWORD /d 1 /f
- To completely disable the Power button and remove the “Shut down or sign out” option from WinX menu: REG ADD "HKLM\SOFTWARE\Microsoft\PolicyManager\default\Start\HidePowerButton" /v "value" /t REG_DWORD /d 1 /f
Please note that in Windows Server 2019/2022, after assigning restart permission to a user, an error may appear:

In this case, you need to enable the UAC parameter “User Account Control: Run all administrators in Admin Approval Mode” in the GPO:
If you have granted permission to reboot a computer for a non-admin user, you may want to know who restarted a Windows Server : a user or one of the administrators.
Use the Event Viewer ( eventvwr.msc ) to search for shutdown logs in Windows. Go to Windows Logs -> System and filter the current log by the Event ID 1074 .

As you can see, there are server restart events in the log in chronological order. The event description includes the restart time, the reason, and the user account that restarted the host.

You can get information about recent Windows shutdown events using the same Event ID 1076 :
Use the following simple PowerShell script to list the last ten computer restart and shutdown events. This list contains the names of the users and processes from which the reboot was initiated.
Get-EventLog -LogName System | where {$_.EventId -eq 1074} |select-object -first 10 | ForEach-Object { $rv = New-Object PSObject | Select-Object Date, User, Action, process, Reason, ReasonCode if ($_.ReplacementStrings[4]) { $rv.Date = $_.TimeGenerated $rv.User = $_.ReplacementStrings[6] $rv.Process = $_.ReplacementStrings[0] $rv.Action = $_.ReplacementStrings[4] $rv.Reason = $_.ReplacementStrings[2] $rv } } | Select-Object Date, Action, Reason, User, Process |ft

Fix: Can’t Extend Volume in Windows
Fix: windows needs your current credentials pop-up message, related reading, clear cache and temp files in user profiles..., prevent users from creating new groups in microsoft..., internet time synchronization failed on windows, copy/paste not working in remote desktop (rdp) clipboard, how to disable ntlm authentication in windows domain.
So sad that there’s no option to disable only shutdown. I have a need to allow user to restart their machines but not shutdown.
FYI you can hide shutdown from the start menu using HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PolicyManager\default\Start\HideShutDown
Thanks, but even so an advanced user would know to turn it off using other ways.
Thank you MT.. this helped..
On Windows 11, this did work, however, a user who is blocked from restarting/shutting down in this way, can still press Control-Alt-Delete and has the restart/shutdown option in the lower right hand corner. Is there a way to remove that, too?
I just actually tried it from a “non-privileged” account. The good news is that although the options appear, they don’t actually work. 🙃
Leave a Comment Cancel Reply
Notify me of followup comments via e-mail. You can also subscribe without commenting.
Current [email protected] *
Leave this field empty
Stack Exchange Network
Stack Exchange network consists of 181 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.
Super User is a question and answer site for computer enthusiasts and power users. It only takes a minute to sign up.
Q&A for work
Connect and share knowledge within a single location that is structured and easy to search.
Can't edit Local Security Policy
I'm trying to add users to the Access this computer from the network User Rights Assignment policy but the 'Add' button is disabled:

I'm connecting to the machine via RDP using the local Administrator account (not a domain user). I've also tried to do the same with a domain user that is in the Administrators group but the result is the same.
How can I add a user to this policy?
The machine is running Windows 7.
- remote-desktop
- administrator
- group-policy

- You need to be using a domain user in the Administrator user group – Ramhound Aug 27, 2015 at 12:38
- I am using it (the built-in account..), but I login via RDP. does it matter? – etaiso Aug 27, 2015 at 12:38
- Your not using one, you indicated your using the local Administrator account, you need to be using a user connected to the domain with Administrator permissions. – Ramhound Aug 27, 2015 at 12:44
- I also tried that . it's the same – etaiso Aug 27, 2015 at 12:46
- Update your question; If I had know that; I could have saved time responding. – Ramhound Aug 27, 2015 at 12:51
You cannot edit this User Rights Assignment policy because this setting is being managed by a domain-based Group Policy. In this case, the domain Group Policy setting has precedence and you are prevented from modifying the policy via Local Group Policy.
To modify this policy, either:
- Modify the policy in the applicable domain Group Policy Object.
- Prevent any domain-based GPOs from specifying this setting, then edit the computer's Local Group Policy.
- where can I find this policy in the GPO? – marijnr Jun 13, 2018 at 13:15
- 1 Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment – I say Reinstate Monica Jun 13, 2018 at 13:16
Your Answer
Sign up or log in, post as a guest.
Required, but never shown
By clicking “Post Your Answer”, you agree to our terms of service , privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged windows security remote-desktop administrator group-policy or ask your own question .
- The Overflow Blog
- Building an API is half the battle: Q&A with Marco Palladino from Kong
- Developers think AI assistants will be everywhere, but aren’t sure how to...
- Featured on Meta
- We've added a "Necessary cookies only" option to the cookie consent popup
- The Stack Exchange reputation system: What's working? What's not?
Hot Network Questions
- Movie where a man is abducted by beings believed to be aliens and finds out they were from the future
- Opamp with unbalanced rails
- If electric field inside a conductor is always zero, then why do free electrons move?
- Why is crystal frequency often multiplied inside a microcontroller?
- How useful is a caliper for a home-based bike workshop?
- Why are most US news programs silent about Iran-Saudi deal announced at Beijing on March 10th?
- Is it legal for a company to require you to delete your account to unsubscribe from marketing emails?
- Is there a RAW or optional rule for how a player could discover what type of skill check needs to be made?
- Can magnetic fields be produced in other ways besides from a moving charge?
- How did the Virgin Birth of Jesus prove to be a “sign” as prophesied in Is 7:14?
- Reducing 120 VAC to 24 VAC with a 5.1 Ω, 6.5 W resistor
- What's a good word to describe someone who is prone to sudden changes of mood?
- Would a spider familiar be able to press the button on the immovable rod whilst swinging from a rope tied to said rod?
- What is the concept of hole in semiconductor physics?
- Why does `cat` with no argument read from standard input?
- Looking for a possible trilogy from the 2000s
- Where is the extra hour? Eurostar London to Paris is 2hr 30m but departure is 3hrs 30m before arrival
- Would it be possible for a planet to orbit around a trinary star system in a figure 8 orbit?
- How can I protect /dev/sdX against accidental formatting?
- Is "throw an ape" an expression?
- Is this Lunarri race balanced?
- Why are accelerator beam neutrino experiments built an angle off the beam direction?
- How can I make the rules of my Faerie Portal free from contradiction?
- Is this the correct usage of "consensus"?
Your privacy
By clicking “Accept all cookies”, you agree Stack Exchange can store cookies on your device and disclose information in accordance with our Cookie Policy .
The user rights that are required by Update.exe
Introduction.
Some Microsoft software updates use Update.exe as the Setup program. Update.exe version 5.4.1.0 and later versions require that the user who installs the software update is an administrator with certain user rights. This article lists those user rights requirements. If a user does not have the required user rights and tries to install a software update package that uses Update.exe, they may receive the following error message:
You do not have permission to update <OS name>. Please contact your system administrator.
If the software update installation was performed in unattended mode by specifying either the /quiet or /passive command-line switches, this error message is displayed in the installation log. By default, the installation log is located at %systemroot%/KB ###### .log, where ###### is the number of the Microsoft Knowledge Base article for the fix that was applied.
More Information
To determine whether a software update uses Update.exe as the Setup program for packages released after July 2004, examine the Installer Engine value on the Version tab of the Properties dialog box for the software update package. For packages released before July 2004, you must extract the package contents to determine which installer is used and what version it is. For additional information about how to do this, click the following article number to view the article in the Microsoft Knowledge Base:
832475 Description of the new features in the package installer for Windows software updates The following table lists the user rights required by Update.exe.
For additional information about earlier versions of Update.exe and Debug programs that require that administrators have rights, click the following article number to view the article in the Microsoft Knowledge Base:
830846 Windows Product Updates may stop responding or may use most or all the CPU resources To determine the missing user right, examine the installation log file. The installation log file contains the following similar error messages:
2.744: d:\aab949b8ae7e35434dde6b\update\update.exe (version X.X.X.X ) 2.744: Failed To Enable SE_SECURITY_PRIVILEGE 2.754: Setup encountered an error: You do not have permission to update OS_name . Please contact your system administrator. 2.764: You do not have permission to update OS_name .
Note OS_name represents the operating system name. SE_SECURITY_PRIVILEGE represents the missing user right. X.X.X.X represents the version number. To view and modify user rights, follow these steps:
Start the Group Policy Editor in either your local or your domain environment. For more information about how to do this, visit the following Microsoft Web site:
http://www.microsoft.com/windows/windows2000/en/advanced/help/gpedit_start.htm
Under Computer Configuration , click Windows Settings .
Click Security Settings , click Local Policies , and then click User Rights Assignments .
To assign the policies listed earlier, right-click the policy, click Properties , and then add the user.

Need more help?
Want more options.
Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Microsoft 365 subscription benefits

Microsoft 365 training

Microsoft security

Accessibility center
Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Ask the Microsoft Community

Microsoft Tech Community

Windows Insiders
Microsoft 365 Insiders
Was this information helpful?
Thank you for your feedback.
¿No tiene una cuenta? Cree una .
Restablecer contraseña
- Resultados de la búsqueda
How to define/grant the required user rights/permissions for a Backup Exec Service Account (BESA)
Description.
Backup Selection browse fails with error "Failure to browse server"

Error Message
Backup Selection browse fails with error "Failure to browse 'server'. Failed to log on to Microsoft Windows."
Connection with server failed. Hit <F5> to retry when trying to edit/create a backup job on Windows 2008 server
[ A ] The password set for the Backup Exec System Logon Account (Network -> Logon Accounts) or the Backup Exec Service Account (BESA) does not match to the password set in Active Directory or for the local administrator user account section. [ B ] If the BESA does not have the right to Logon as a batch job . By default this policy is applied to Administrators and the Backup Operators group. This user right is defined in the default Domain Controller's Group Policy object (GPO) and in the Local Security Policy of workstations & servers and it allows a user to be logged on by means of a batch-queue facility. For more information on this user right, refer to: http://technet.microsoft.com/en-us/library/cc780182(WS.10).aspx [ C ] If the BESA is included in Deny logon as a batch job policy. 'Deny logon as a batch job' determines which accounts are prevented from being able to log on as a batch job. This policy setting supercedes the Log on as a batch job policy setting if a user account is subject to both policies.
Solution
Note : Backup Exec Service account can be set to a user with local administrator rights.
- Act as part of the operating system [ a.k.a. TcbPrivilege ].
- Backup files and directories (provides rights to backup files and directories) [ a.k.a. BackupPrivilege ] .
- Create a token object (which can be used to access any local resources) [ a.k.a. TokenRightPrivilege].
- Log on as a batch job (allows a user to be logged on by means of a batch-queue facility) [ a.k.a. BatchLogonRight ].
- Log on as a service [ a.k.a. ServiceLogonRight ].
- Manage auditing and security log [ a.k.a. AuditPrivilege ].
- Restore files and directories (provides rights to restore files and directories [ a.k.a. RestorePrivilege ].
- Take ownership of files and other objects [ a.k.a TakeOwnershipPrivilege ].
For Windows 2016 / 2019
For Windows 2008 / 2008 R2 / 2012 / 2012 R2
For Windows 2003 / 2003 R2
For Windows 2016 / 2019 :
1. Go to Start | Programs | Administrative Tools | Group Policy Management .
2. From the left pane, expand Domains | Domain_Name | Group Policy Objects .
3. Right click on Default Domain Controllers Policy and click on Edit.
Ensure that the group policy being edited is set to Enforced or else the changes would not apply.

4. From the left pane, expand Computer Configuration and go to Policies | Windows Settings | Security Settings | Local Policies | User Rights Assignments .
5. From the right pane, right-click Log on as a batch Job --> Properties.

6. Click Add user or Group .

7. For the Add user or Group window, click Browse

8. Type the desired user account to act as your Backup Exec System Account, then click Browse and then click Ok .

9. Back in the "Group Policy Management Editor" note that your Backup Exec System Account now has " Log on as a batch Job " privilege.
10. Repeat steps 1 through 9 for any additional policies.
[ C ] Make sure the BESA is NOT included in the ' Deny Logon as a Batch' or 'Deny Logon as a service' because the deny supersedes the allow and even adding the account under 'Logon as a Batch' or 'Logon as a service' would not resolve the issue.

Refresh the group policy Click Start > Run and type gpupdate /target: computer /force ( this will force update the Group Policy )
For Windows 2008 / 2008 R2 / 2012 / 2012 R2 : 1. Go to Start | Programs | Administrative Tools | Group Policy Management. 2. From the left pane, expand Domains | Domain_Name | Group Policy Objects. 3. Right click on Default Domain Controllers Policy and click on Edit.

5. From the right pane, right-click Create a token object.

6. Click " Add user or Group".

9. Back in the "Group Policy Management Editor" note that your Backup Exec System Account now has "Create a token object" privilege.
6. Repeat steps 1 through 9 for any additional policies.
[ C ] Make sure the BESA is NOT included in the ' Deny Logon as a Batch' or 'Deny Logon as a service' because the deny supersedes the allow and even adding the account under 'Logon as a Batch' or 'Logon as a service' would not resolve the issue. ( Figure 4 )
[ D ] Make sure BESA has all the required permissions
1. Check the permissions for the Backup Exec System Account ( BESA ) which shows under Network - Logon Accounts . Make sure it is a member of the local administrator group (built in admins) if applicable, and/or domain admins. Remove this account from any groups that do not have full administrative rights. 2. If performing the above steps do not resolve the issue, create a new user account in active directory and add it to the following groups only if a domain admin can be used else in case of a non DC a local user account part of the Local administrators group can also be used.
- Domain Admins (Primary Group)
- Local Admins or Administrators
- Remove Domain Users from the list.
Then use this new account for Backup Exec services, add it under Network - Logon Accounts and make that as a default account. Note: This applies to Windows Server 2008/R2 (Domain controller and member servers) as well. [ E ] Make sure all Backup Exec services are started.
Artículos relacionados
¿fue útil este contenido.
Puntuación enviada. Proporcione comentarios adicionales (opcional)::
You are using Microsoft Internet Explorer!
Related articles, article languages.

Translated Content
Please note that this document is a translation from English, and may have been machine-translated. It is possible that updates have been made to the original version after this document was translated and published. Veritas does not guarantee the accuracy regarding the completeness of the translation. You may also refer to the English Version of this knowledge base article for up-to-date information.

IMAGES
VIDEO
COMMENTS
User rights assignments are settings applied to the local device. They allow users to perform various system tasks, such as local logon, remote logon, accessing the server from network, shutting down the server, and so on. In this section, I will explain the most important settings and how they should be configured.
Security policy settings control various aspects of system protection, as explained in my post User rights assignment in Windows Server 2016. Settings available in Security Options allow you to configure things related to user accounts, interactive logon, network access, network security, and the UAC feature. Today, I will cover settings ...
You can configure the user rights assignment settings in the following location within the Group Policy Management Console (GPMC) under Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment, or on the local device by using the Local Group Policy Editor (gpedit.msc).
To configure permissions for a new user or group, click Add. In the Select Users, Computers, or Groups dialog box, type the name of the user or group that you want to set permissions for, and then click OK. In the Permissions for User or Group list, configure the permissions that you want for the user or group.
I think we configure Computer Configuration ->Policies -> Windows Settings -> Security Settings -> Local Policies -> User Rights Assignment->Debug programs on domain Group policy Object. We can try to logon this server to check which group policy object we configure this Debug programs. For computer configuration: 1.
The Allow log on locally user right must only be assigned to the Administrators group. The Allow log on locally user right must only be assigned to the Administrators group. Overview Details
On a Domain Controller, click Start > Run.; Type gpmc.msc and hit Enter to load the GPMC console.; In the left pane of GPMC, click the domain name to expand it. Select the policy you want to check ...
I would advise against giving full control. That allows users to change permissions and take ownership of files. Modify rights should be sufficient for the vast majority of user's needs when it comes to shares. Other users could have the files locked if they are accessing the same exact files. In Windows Deny is Deny.
Currently I'm using windows server 2012 and I'm interested to know whether there is any way to export User Rights Assignment into a txt file. I tried secedit /export /areas USER_RIGHTS /cfg d:\policies.txt The above should should export it. So, I get this: Current Output.
Run the local (gpedit.msc) or domain (gpmc.msc) Group Policy Editor and go to the following GPO section: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment. Find the Log on as a service policy. ADVERTISEMENT
3 Answers. Sorted by: 9. You can use AccessChk in accomplish this task. Accesschk "domain\user" -a * will list all the permissions of a given domain user. You can call this program within a PowerShell script, concatenate the results into a text file, then filter out just the permissions you want to know about. Share.
Locate the Local Policies, and then click User Rights Assignment. On the right pane of the window, double-click on log on as a batch job This will open up the Log on as a batch job Properties window. Click on Add Users or Group as shown below. This will open up the wizard below to select users, computers, service accounts or groups.
On Windows Server 2022/2019/2016, only Administrators or Backup Operators can shut down or restart the server. It is reasonable, since in most cases a non-admin user must not have the privileges to shutdown a server (even accidentally). ... (User Rights Assignment). By default, only administrators can shutdown/restart the server remotely. Add a ...
You cannot edit this User Rights Assignment policy because this setting is being managed by a domain-based Group Policy. In this case, the domain Group Policy setting has precedence and you are prevented from modifying the policy via Local Group Policy. To modify this policy, either: Modify the policy in the applicable domain Group Policy Object.
User Rights Assignment policies govern the methods by which a user can log on to a system. User rights are applied at the local device level, and they allow users to perform tasks on a device or in a domain. User rights include logon rights and permissions. Logon rights control who is authorized to log on to a device and how they can log on.
832475 Description of the new features in the package installer for Windows software updates. The following table lists the user rights required by Update.exe. Group Policy Object Display Name. Required by Update.exe. Description. Back up files and directories. Required. You must have this user right to perform backup operations.
5. From the right pane, right-click Create a token object. 6. Click " Add user or Group". 7. For the "Add user or Group" window, click Browse. 8. Type the desired user account to act as your Backup Exec System Account, then click Browse and then click Ok. 9.
5. From the right pane, right-click Create a token object. 6. Click " Add user or Group". 7. For the "Add user or Group" window, click Browse. 8. Type the desired user account to act as your Backup Exec System Account, then click Browse and then click Ok. 9.