diff options
Diffstat (limited to 'source4/setup')
-rwxr-xr-x | source4/setup/provision | 6 | ||||
-rw-r--r-- | source4/setup/provision.ldif | 459 | ||||
-rw-r--r-- | source4/setup/provision_templates.ldif | 3 | ||||
-rw-r--r-- | source4/setup/provision_users.ldif | 459 |
4 files changed, 467 insertions, 460 deletions
diff --git a/source4/setup/provision b/source4/setup/provision index 90363fcf20..dc542f59f0 100755 --- a/source4/setup/provision +++ b/source4/setup/provision @@ -27,7 +27,8 @@ ok = GetOptions(ARGV, options, 'nogroup=s', 'wheel=s', 'users=s', - 'quiet'); + 'quiet', + 'blank'); if (ok == false) { println("Failed to parse options: " + options.ERROR); return -1; @@ -72,6 +73,7 @@ provision [options] --wheel GROUPNAME choose 'wheel' privileged group --users GROUPNAME choose 'users' group --quiet Be quiet + --blank do not add users or groups, just the structure You must provide at least a realm and domain @@ -106,6 +108,6 @@ for (r in options) { message("Provisioning for %s in realm %s\n", subobj.DOMAIN, subobj.REALM); message("Using administrator password: %s\n", subobj.ADMINPASS); -provision(subobj, message); +provision(subobj, message, options["blank"] != undefined); message("All OK\n"); return 0; diff --git a/source4/setup/provision.ldif b/source4/setup/provision.ldif index 01dbc6366a..b2d0848946 100644 --- a/source4/setup/provision.ldif +++ b/source4/setup/provision.ldif @@ -23,6 +23,7 @@ nextRid: 1001 pwdProperties: 1 pwdHistoryLength: 24 objectSid: ${DOMAINSID} +oEMInformation: Provisioned by Samba4: ${LDAPTIME} serverState: 1 nTMixedDomain: 1 msDS-Behavior-Version: 0 @@ -172,464 +173,6 @@ modifiedCount: 1 objectCategory: CN=Builtin-Domain,CN=Schema,CN=Configuration,${BASEDN} isCriticalSystemObject: TRUE -dn: CN=Administrator,CN=Users,${BASEDN} -objectClass: top -objectClass: person -objectClass: organizationalPerson -objectClass: user -cn: Administrator -description: Built-in account for administering the computer/domain -uSNCreated: 1 -memberOf: CN=Group Policy Creator Owners,CN=Users,${BASEDN} -memberOf: CN=Domain Admins,CN=Users,${BASEDN} -memberOf: CN=Enterprise Admins,CN=Users,${BASEDN} -memberOf: CN=Schema Admins,CN=Users,${BASEDN} -memberOf: CN=Administrators,CN=Builtin,${BASEDN} -uSNChanged: 1 -userAccountControl: 0x10200 -objectSid: ${DOMAINSID}-500 -adminCount: 1 -accountExpires: -1 -sAMAccountName: Administrator -isCriticalSystemObject: TRUE -unicodePwd: ${ADMINPASS} -unixName: ${ROOT} - -dn: CN=Guest,CN=Users,${BASEDN} -objectClass: top -objectClass: person -objectClass: organizationalPerson -objectClass: user -cn: Guest -description: Built-in account for guest access to the computer/domain -uSNCreated: 1 -memberOf: CN=Guests,CN=Builtin,${BASEDN} -uSNChanged: 1 -userAccountControl: 0x10222 -primaryGroupID: 514 -objectSid: ${DOMAINSID}-501 -sAMAccountName: Guest -isCriticalSystemObject: TRUE - -dn: CN=Administrators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Administrators -description: Administrators have complete and unrestricted access to the computer/domain -member: CN=Domain Admins,CN=Users,${BASEDN} -member: CN=Enterprise Admins,CN=Users,${BASEDN} -member: CN=Administrator,CN=Users,${BASEDN} -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-544 -adminCount: 1 -sAMAccountName: Administrators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -unixName: ${WHEEL} -privilege: SeSecurityPrivilege -privilege: SeBackupPrivilege -privilege: SeRestorePrivilege -privilege: SeSystemtimePrivilege -privilege: SeShutdownPrivilege -privilege: SeRemoteShutdownPrivilege -privilege: SeTakeOwnershipPrivilege -privilege: SeDebugPrivilege -privilege: SeSystemEnvironmentPrivilege -privilege: SeSystemProfilePrivilege -privilege: SeProfileSingleProcessPrivilege -privilege: SeIncreaseBasePriorityPrivilege -privilege: SeLoadDriverPrivilege -privilege: SeCreatePagefilePrivilege -privilege: SeIncreaseQuotaPrivilege -privilege: SeChangeNotifyPrivilege -privilege: SeUndockPrivilege -privilege: SeManageVolumePrivilege -privilege: SeImpersonatePrivilege -privilege: SeCreateGlobalPrivilege -privilege: SeEnableDelegationPrivilege -privilege: SeInteractiveLogonRight -privilege: SeNetworkLogonRight -privilege: SeRemoteInteractiveLogonRight - - -dn: CN=Users,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Users -description: Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications -member: CN=Domain Users,CN=Users,${BASEDN} -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-545 -sAMAccountName: Users -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Guests,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Guests -description: Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted -member: CN=Domain Guests,CN=Users,${BASEDN} -member: CN=Guest,CN=Users,${BASEDN} -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-546 -sAMAccountName: Guests -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -unixName: ${NOGROUP} - -dn: CN=Print Operators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Print Operators -description: Members can administer domain printers -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-550 -adminCount: 1 -sAMAccountName: Print Operators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -privilege: SeLoadDriverPrivilege -privilege: SeShutdownPrivilege -privilege: SeInteractiveLogonRight - -dn: CN=Backup Operators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Backup Operators -description: Backup Operators can override security restrictions for the sole purpose of backing up or restoring files -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-551 -adminCount: 1 -sAMAccountName: Backup Operators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -privilege: SeBackupPrivilege -privilege: SeRestorePrivilege -privilege: SeShutdownPrivilege -privilege: SeInteractiveLogonRight - -dn: CN=Replicator,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Replicator -description: Supports file replication in a domain -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-552 -adminCount: 1 -sAMAccountName: Replicator -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Remote Desktop Users,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Remote Desktop Users -description: Members in this group are granted the right to logon remotely -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-555 -sAMAccountName: Remote Desktop Users -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Network Configuration Operators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Network Configuration Operators -description: Members in this group can have some administrative privileges to manage configuration of networking features -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-556 -sAMAccountName: Network Configuration Operators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Performance Monitor Users,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Performance Monitor Users -description: Members of this group have remote access to monitor this computer -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-558 -sAMAccountName: Performance Monitor Users -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Performance Log Users,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Performance Log Users -description: Members of this group have remote access to schedule logging of performance counters on this computer -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-559 -sAMAccountName: Performance Log Users -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=${NETBIOSNAME},OU=Domain Controllers,${BASEDN} -objectClass: top -objectClass: person -objectClass: organizationalPerson -objectClass: computer -cn: ${NETBIOSNAME} -uSNCreated: 1 -uSNChanged: 1 -objectGUID: ${HOSTGUID} -userAccountControl: 532480 -lastLogon: 127273269057298624 -localPolicyFlags: 0 -pwdLastSet: 127258826171655328 -primaryGroupID: 516 -objectSid: ${DOMAINSID}-1000 -accountExpires: 9223372036854775807 -sAMAccountName: ${NETBIOSNAME}$ -sAMAccountType: 805306369 -operatingSystem: Samba -operatingSystemVersion: 4.0 -dNSHostName: ${DNSNAME} -isCriticalSystemObject: TRUE -unicodePwd: ${MACHINEPASS} -servicePrincipalName: HOST/${DNSNAME} -servicePrincipalName: HOST/${NETBIOSNAME} -msDS-KeyVersionNumber: 1 - -dn: CN=krbtgt,CN=Users,${BASEDN} -objectClass: top -objectClass: person -objectClass: organizationalPerson -objectClass: user -cn: krbtgt -description: Key Distribution Center Service Account -uSNCreated: 1 -uSNChanged: 1 -showInAdvancedViewOnly: TRUE -userAccountControl: 514 -pwdLastSet: 127258826179466560 -objectSid: ${DOMAINSID}-502 -adminCount: 1 -accountExpires: 9223372036854775807 -sAMAccountName: krbtgt -sAMAccountType: 805306368 -servicePrincipalName: kadmin/changepw -isCriticalSystemObject: TRUE -unicodePwd: ${KRBTGTPASS} - -dn: CN=Domain Computers,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Domain Computers -description: All workstations and servers joined to the domain -uSNCreated: 1 -uSNChanged: 1 -objectSid: ${DOMAINSID}-515 -sAMAccountName: Domain Computers -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Domain Controllers,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Domain Controllers -description: All domain controllers in the domain -uSNCreated: 1 -uSNChanged: 1 -objectSid: ${DOMAINSID}-516 -adminCount: 1 -sAMAccountName: Domain Controllers -isCriticalSystemObject: TRUE - -dn: CN=Schema Admins,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Schema Admins -description: Designated administrators of the schema -member: CN=Administrator,CN=Users,${BASEDN} -uSNCreated: 1 -uSNChanged: 1 -objectSid: ${DOMAINSID}-518 -adminCount: 1 -sAMAccountName: Schema Admins -isCriticalSystemObject: TRUE -unixName: ${WHEEL} - -dn: CN=Enterprise Admins,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Enterprise Admins -description: Designated administrators of the enterprise -member: CN=Administrator,CN=Users,${BASEDN} -uSNCreated: 1 -memberOf: CN=Administrators,CN=Builtin,${BASEDN} -uSNChanged: 1 -objectSid: ${DOMAINSID}-519 -adminCount: 1 -sAMAccountName: Enterprise Admins -isCriticalSystemObject: TRUE -unixName: ${WHEEL} - -dn: CN=Cert Publishers,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Cert Publishers -description: Members of this group are permitted to publish certificates to the Active Directory -uSNCreated: 1 -uSNChanged: 1 -groupType: 0x80000004 -sAMAccountType: 0x20000000 -objectSid: ${DOMAINSID}-517 -sAMAccountName: Cert Publishers -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Domain Admins,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Domain Admins -description: Designated administrators of the domain -member: CN=Administrator,CN=Users,${BASEDN} -uSNCreated: 1 -memberOf: CN=Administrators,CN=Builtin,${BASEDN} -uSNChanged: 1 -objectSid: ${DOMAINSID}-512 -adminCount: 1 -sAMAccountName: Domain Admins -isCriticalSystemObject: TRUE -unixName: ${WHEEL} - -dn: CN=Domain Users,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Domain Users -description: All domain users -uSNCreated: 1 -memberOf: CN=Users,CN=Builtin,${BASEDN} -uSNChanged: 1 -objectSid: ${DOMAINSID}-513 -sAMAccountName: Domain Users -isCriticalSystemObject: TRUE -unixName: ${USERS} - -dn: CN=Domain Guests,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Domain Guests -description: All domain guests -uSNCreated: 1 -memberOf: CN=Guests,CN=Builtin,${BASEDN} -uSNChanged: 1 -objectSid: ${DOMAINSID}-514 -sAMAccountName: Domain Guests -isCriticalSystemObject: TRUE - -dn: CN=Group Policy Creator Owners,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: Group Policy Creator Owners -description: Members in this group can modify group policy for the domain -member: CN=Administrator,CN=Users,${BASEDN} -uSNCreated: 1 -uSNChanged: 1 -objectSid: ${DOMAINSID}-520 -sAMAccountName: Group Policy Creator Owners -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -unixName: ${WHEEL} - -dn: CN=RAS and IAS Servers,CN=Users,${BASEDN} -objectClass: top -objectClass: group -cn: RAS and IAS Servers -description: Servers in this group can access remote access properties of users -instanceType: 4 -uSNCreated: 1 -uSNChanged: 1 -objectSid: ${DOMAINSID}-553 -sAMAccountName: RAS and IAS Servers -sAMAccountType: 0x20000000 -groupType: 0x80000004 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE - -dn: CN=Server Operators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Server Operators -description: Members can administer domain servers -instanceType: 4 -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-549 -adminCount: 1 -sAMAccountName: Server Operators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -privilege: SeBackupPrivilege -privilege: SeSystemtimePrivilege -privilege: SeRemoteShutdownPrivilege -privilege: SeRestorePrivilege -privilege: SeShutdownPrivilege -privilege: SeInteractiveLogonRight - -dn: CN=Account Operators,CN=Builtin,${BASEDN} -objectClass: top -objectClass: group -cn: Account Operators -description: Members can administer domain user and group accounts -instanceType: 4 -uSNCreated: 1 -uSNChanged: 1 -objectSid: S-1-5-32-548 -adminCount: 1 -sAMAccountName: Account Operators -sAMAccountType: 0x20000000 -systemFlags: 0x8c000000 -groupType: 0x80000005 -objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} -isCriticalSystemObject: TRUE -privilege: SeInteractiveLogonRight - ############################### # Configuration Naming Context ############################### diff --git a/source4/setup/provision_templates.ldif b/source4/setup/provision_templates.ldif index 9a045d2afc..3693f46558 100644 --- a/source4/setup/provision_templates.ldif +++ b/source4/setup/provision_templates.ldif @@ -121,6 +121,9 @@ objectClass: top objectClass: Template objectClass: foreignSecurityPrincipalTemplate cn: TemplateForeignSecurityPrincipal +instanceType: 4 +showInAdvancedViewOnly: TRUE +objectCategory: CN=Foreign-Security-Principal,CN=Schema,CN=Configuration,${BASEDN} dn: CN=TemplateSecret,CN=Templates,${BASEDN} objectClass: top diff --git a/source4/setup/provision_users.ldif b/source4/setup/provision_users.ldif new file mode 100644 index 0000000000..2e420b226a --- /dev/null +++ b/source4/setup/provision_users.ldif @@ -0,0 +1,459 @@ +dn: CN=Administrator,CN=Users,${BASEDN} +objectClass: top +objectClass: person +objectClass: organizationalPerson +objectClass: user +cn: Administrator +description: Built-in account for administering the computer/domain +uSNCreated: 1 +memberOf: CN=Group Policy Creator Owners,CN=Users,${BASEDN} +memberOf: CN=Domain Admins,CN=Users,${BASEDN} +memberOf: CN=Enterprise Admins,CN=Users,${BASEDN} +memberOf: CN=Schema Admins,CN=Users,${BASEDN} +memberOf: CN=Administrators,CN=Builtin,${BASEDN} +uSNChanged: 1 +userAccountControl: 0x10200 +objectSid: ${DOMAINSID}-500 +adminCount: 1 +accountExpires: -1 +sAMAccountName: Administrator +isCriticalSystemObject: TRUE +unicodePwd: ${ADMINPASS} +unixName: ${ROOT} + +dn: CN=Guest,CN=Users,${BASEDN} +objectClass: top +objectClass: person +objectClass: organizationalPerson +objectClass: user +cn: Guest +description: Built-in account for guest access to the computer/domain +uSNCreated: 1 +memberOf: CN=Guests,CN=Builtin,${BASEDN} +uSNChanged: 1 +userAccountControl: 0x10222 +primaryGroupID: 514 +objectSid: ${DOMAINSID}-501 +sAMAccountName: Guest +isCriticalSystemObject: TRUE + +dn: CN=Administrators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Administrators +description: Administrators have complete and unrestricted access to the computer/domain +member: CN=Domain Admins,CN=Users,${BASEDN} +member: CN=Enterprise Admins,CN=Users,${BASEDN} +member: CN=Administrator,CN=Users,${BASEDN} +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-544 +adminCount: 1 +sAMAccountName: Administrators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +unixName: ${WHEEL} +privilege: SeSecurityPrivilege +privilege: SeBackupPrivilege +privilege: SeRestorePrivilege +privilege: SeSystemtimePrivilege +privilege: SeShutdownPrivilege +privilege: SeRemoteShutdownPrivilege +privilege: SeTakeOwnershipPrivilege +privilege: SeDebugPrivilege +privilege: SeSystemEnvironmentPrivilege +privilege: SeSystemProfilePrivilege +privilege: SeProfileSingleProcessPrivilege +privilege: SeIncreaseBasePriorityPrivilege +privilege: SeLoadDriverPrivilege +privilege: SeCreatePagefilePrivilege +privilege: SeIncreaseQuotaPrivilege +privilege: SeChangeNotifyPrivilege +privilege: SeUndockPrivilege +privilege: SeManageVolumePrivilege +privilege: SeImpersonatePrivilege +privilege: SeCreateGlobalPrivilege +privilege: SeEnableDelegationPrivilege +privilege: SeInteractiveLogonRight +privilege: SeNetworkLogonRight +privilege: SeRemoteInteractiveLogonRight + + +dn: CN=${NETBIOSNAME},OU=Domain Controllers,${BASEDN} +objectClass: top +objectClass: person +objectClass: organizationalPerson +objectClass: computer +cn: ${NETBIOSNAME} +uSNCreated: 1 +uSNChanged: 1 +objectGUID: ${HOSTGUID} +userAccountControl: 532480 +lastLogon: 127273269057298624 +localPolicyFlags: 0 +pwdLastSet: 127258826171655328 +primaryGroupID: 516 +objectSid: ${DOMAINSID}-1000 +accountExpires: 9223372036854775807 +sAMAccountName: ${NETBIOSNAME}$ +sAMAccountType: 805306369 +operatingSystem: Samba +operatingSystemVersion: 4.0 +dNSHostName: ${DNSNAME} +isCriticalSystemObject: TRUE +unicodePwd: ${MACHINEPASS} +servicePrincipalName: HOST/${DNSNAME} +servicePrincipalName: HOST/${NETBIOSNAME} +msDS-KeyVersionNumber: 1 + + +dn: CN=Users,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Users +description: Users are prevented from making accidental or intentional system-wide changes. Thus, Users can run certified applications, but not most legacy applications +member: CN=Domain Users,CN=Users,${BASEDN} +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-545 +sAMAccountName: Users +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Guests,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Guests +description: Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted +member: CN=Domain Guests,CN=Users,${BASEDN} +member: CN=Guest,CN=Users,${BASEDN} +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-546 +sAMAccountName: Guests +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +unixName: ${NOGROUP} + +dn: CN=Print Operators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Print Operators +description: Members can administer domain printers +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-550 +adminCount: 1 +sAMAccountName: Print Operators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +privilege: SeLoadDriverPrivilege +privilege: SeShutdownPrivilege +privilege: SeInteractiveLogonRight + +dn: CN=Backup Operators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Backup Operators +description: Backup Operators can override security restrictions for the sole purpose of backing up or restoring files +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-551 +adminCount: 1 +sAMAccountName: Backup Operators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +privilege: SeBackupPrivilege +privilege: SeRestorePrivilege +privilege: SeShutdownPrivilege +privilege: SeInteractiveLogonRight + +dn: CN=Replicator,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Replicator +description: Supports file replication in a domain +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-552 +adminCount: 1 +sAMAccountName: Replicator +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Remote Desktop Users,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Remote Desktop Users +description: Members in this group are granted the right to logon remotely +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-555 +sAMAccountName: Remote Desktop Users +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Network Configuration Operators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Network Configuration Operators +description: Members in this group can have some administrative privileges to manage configuration of networking features +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-556 +sAMAccountName: Network Configuration Operators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Performance Monitor Users,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Performance Monitor Users +description: Members of this group have remote access to monitor this computer +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-558 +sAMAccountName: Performance Monitor Users +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Performance Log Users,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Performance Log Users +description: Members of this group have remote access to schedule logging of performance counters on this computer +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-559 +sAMAccountName: Performance Log Users +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=krbtgt,CN=Users,${BASEDN} +objectClass: top +objectClass: person +objectClass: organizationalPerson +objectClass: user +cn: krbtgt +description: Key Distribution Center Service Account +uSNCreated: 1 +uSNChanged: 1 +showInAdvancedViewOnly: TRUE +userAccountControl: 514 +pwdLastSet: 127258826179466560 +objectSid: ${DOMAINSID}-502 +adminCount: 1 +accountExpires: 9223372036854775807 +sAMAccountName: krbtgt +sAMAccountType: 805306368 +servicePrincipalName: kadmin/changepw +isCriticalSystemObject: TRUE +unicodePwd: ${KRBTGTPASS} + +dn: CN=Domain Computers,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Domain Computers +description: All workstations and servers joined to the domain +uSNCreated: 1 +uSNChanged: 1 +objectSid: ${DOMAINSID}-515 +sAMAccountName: Domain Computers +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Domain Controllers,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Domain Controllers +description: All domain controllers in the domain +uSNCreated: 1 +uSNChanged: 1 +objectSid: ${DOMAINSID}-516 +adminCount: 1 +sAMAccountName: Domain Controllers +isCriticalSystemObject: TRUE + +dn: CN=Schema Admins,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Schema Admins +description: Designated administrators of the schema +member: CN=Administrator,CN=Users,${BASEDN} +uSNCreated: 1 +uSNChanged: 1 +objectSid: ${DOMAINSID}-518 +adminCount: 1 +sAMAccountName: Schema Admins +isCriticalSystemObject: TRUE +unixName: ${WHEEL} + +dn: CN=Enterprise Admins,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Enterprise Admins +description: Designated administrators of the enterprise +member: CN=Administrator,CN=Users,${BASEDN} +uSNCreated: 1 +memberOf: CN=Administrators,CN=Builtin,${BASEDN} +uSNChanged: 1 +objectSid: ${DOMAINSID}-519 +adminCount: 1 +sAMAccountName: Enterprise Admins +isCriticalSystemObject: TRUE +unixName: ${WHEEL} + +dn: CN=Cert Publishers,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Cert Publishers +description: Members of this group are permitted to publish certificates to the Active Directory +uSNCreated: 1 +uSNChanged: 1 +groupType: 0x80000004 +sAMAccountType: 0x20000000 +objectSid: ${DOMAINSID}-517 +sAMAccountName: Cert Publishers +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Domain Admins,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Domain Admins +description: Designated administrators of the domain +member: CN=Administrator,CN=Users,${BASEDN} +uSNCreated: 1 +memberOf: CN=Administrators,CN=Builtin,${BASEDN} +uSNChanged: 1 +objectSid: ${DOMAINSID}-512 +adminCount: 1 +sAMAccountName: Domain Admins +isCriticalSystemObject: TRUE +unixName: ${WHEEL} + +dn: CN=Domain Users,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Domain Users +description: All domain users +uSNCreated: 1 +memberOf: CN=Users,CN=Builtin,${BASEDN} +uSNChanged: 1 +objectSid: ${DOMAINSID}-513 +sAMAccountName: Domain Users +isCriticalSystemObject: TRUE +unixName: ${USERS} + +dn: CN=Domain Guests,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Domain Guests +description: All domain guests +uSNCreated: 1 +memberOf: CN=Guests,CN=Builtin,${BASEDN} +uSNChanged: 1 +objectSid: ${DOMAINSID}-514 +sAMAccountName: Domain Guests +isCriticalSystemObject: TRUE + +dn: CN=Group Policy Creator Owners,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: Group Policy Creator Owners +description: Members in this group can modify group policy for the domain +member: CN=Administrator,CN=Users,${BASEDN} +uSNCreated: 1 +uSNChanged: 1 +objectSid: ${DOMAINSID}-520 +sAMAccountName: Group Policy Creator Owners +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +unixName: ${WHEEL} + +dn: CN=RAS and IAS Servers,CN=Users,${BASEDN} +objectClass: top +objectClass: group +cn: RAS and IAS Servers +description: Servers in this group can access remote access properties of users +instanceType: 4 +uSNCreated: 1 +uSNChanged: 1 +objectSid: ${DOMAINSID}-553 +sAMAccountName: RAS and IAS Servers +sAMAccountType: 0x20000000 +groupType: 0x80000004 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE + +dn: CN=Server Operators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Server Operators +description: Members can administer domain servers +instanceType: 4 +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-549 +adminCount: 1 +sAMAccountName: Server Operators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +privilege: SeBackupPrivilege +privilege: SeSystemtimePrivilege +privilege: SeRemoteShutdownPrivilege +privilege: SeRestorePrivilege +privilege: SeShutdownPrivilege +privilege: SeInteractiveLogonRight + +dn: CN=Account Operators,CN=Builtin,${BASEDN} +objectClass: top +objectClass: group +cn: Account Operators +description: Members can administer domain user and group accounts +instanceType: 4 +uSNCreated: 1 +uSNChanged: 1 +objectSid: S-1-5-32-548 +adminCount: 1 +sAMAccountName: Account Operators +sAMAccountType: 0x20000000 +systemFlags: 0x8c000000 +groupType: 0x80000005 +objectCategory: CN=Group,CN=Schema,CN=Configuration,${BASEDN} +isCriticalSystemObject: TRUE +privilege: SeInteractiveLogonRight + |