J
Josh
I am trying (unsuccessfully) to prevent accidental deletion of several
OUs by our domain admins. For testing purposes, I have done this:
1) Create new OU, removed inheritance of permissions.
2) Removed all groups from the permissions
3) Added Domain Admins with Full Control
4) Explicity set Deny rights for Domain Admins for Delete, Delete
Subtree, and Delete Organizational Object.
Create new user, add user to Domain Admins. Log in with user, and the
OU can be deleted without warning.
The only way I have gotten this to work is by creating a user in the
OU that I want to protect, and setting Deny All rights for the Domain
Admins group on that user. That prevents Domain Admins from deleting
the parent OU, but it is a pretty bad solution...and it doesn't
explain why the Domain Admins can delete the OU when all relevant
deletion ACLs are set to Deny.
Any thoughts?
OUs by our domain admins. For testing purposes, I have done this:
1) Create new OU, removed inheritance of permissions.
2) Removed all groups from the permissions
3) Added Domain Admins with Full Control
4) Explicity set Deny rights for Domain Admins for Delete, Delete
Subtree, and Delete Organizational Object.
Create new user, add user to Domain Admins. Log in with user, and the
OU can be deleted without warning.
The only way I have gotten this to work is by creating a user in the
OU that I want to protect, and setting Deny All rights for the Domain
Admins group on that user. That prevents Domain Admins from deleting
the parent OU, but it is a pretty bad solution...and it doesn't
explain why the Domain Admins can delete the OU when all relevant
deletion ACLs are set to Deny.
Any thoughts?