<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Stsvetaj</id>
	<title>ICO wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.itcollege.ee/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Stsvetaj"/>
	<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php/Special:Contributions/Stsvetaj"/>
	<updated>2026-05-14T01:55:47Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=6002</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=6002"/>
		<updated>2010-03-29T07:50:29Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Koostaja: Stanislav Tsvetajev&lt;br /&gt;
Rühm: IA37&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid2.jpg]]&lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid4.jpg]]&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kasutatud materjal: ==&lt;br /&gt;
&lt;br /&gt;
1. [http://telnetport25.wordpress.com/page/31/ http://telnetport25.wordpress.com/page/31/]&lt;br /&gt;
&lt;br /&gt;
2. [http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx]&lt;br /&gt;
&lt;br /&gt;
3. [http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Autor =&lt;br /&gt;
&lt;br /&gt;
Stanislav Tsvetajev IA37&lt;br /&gt;
&lt;br /&gt;
[[Category: Windows Server administreerimine]]&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5964</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5964"/>
		<updated>2010-03-27T17:45:51Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Sissejuhatus */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Koostaja: Stanislav Tsvetajev&lt;br /&gt;
Rühm: IA37&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid2.jpg]]&lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid4.jpg]]&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kasutatud materjal: ==&lt;br /&gt;
&lt;br /&gt;
1. [http://telnetport25.wordpress.com/page/31/ http://telnetport25.wordpress.com/page/31/]&lt;br /&gt;
&lt;br /&gt;
2. [http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx]&lt;br /&gt;
&lt;br /&gt;
3. [http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html]&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5963</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5963"/>
		<updated>2010-03-27T17:44:56Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Kasutatud materjal: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid2.jpg]]&lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid4.jpg]]&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kasutatud materjal: ==&lt;br /&gt;
&lt;br /&gt;
1. [http://telnetport25.wordpress.com/page/31/ http://telnetport25.wordpress.com/page/31/]&lt;br /&gt;
&lt;br /&gt;
2. [http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx]&lt;br /&gt;
&lt;br /&gt;
3. [http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html http://servermigrator.blogspot.com/2006/02/why-understanding-sids-is-important.html]&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5962</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5962"/>
		<updated>2010-03-27T17:41:58Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid2.jpg]]&lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid4.jpg]]&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kasutatud materjal: ==&lt;br /&gt;
&lt;br /&gt;
1. [http://telnetport25.wordpress.com/page/31/ http://telnetport25.wordpress.com/page/31/]&lt;br /&gt;
&lt;br /&gt;
2. [http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx http://technet.microsoft.com/en-us/sysinternals/bb897418.aspx]&lt;br /&gt;
&lt;br /&gt;
3.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5961</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5961"/>
		<updated>2010-03-27T17:39:04Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Meetodid: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid2.jpg]]&lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid3.jpg]]&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid4.jpg]]&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5960</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5960"/>
		<updated>2010-03-27T17:37:18Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Meetodid: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:newSid1.jpg]]&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:NewSid4.jpg&amp;diff=5959</id>
		<title>File:NewSid4.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:NewSid4.jpg&amp;diff=5959"/>
		<updated>2010-03-27T17:36:10Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:NewSid3.jpg&amp;diff=5958</id>
		<title>File:NewSid3.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:NewSid3.jpg&amp;diff=5958"/>
		<updated>2010-03-27T17:36:00Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:NewSid2.jpg&amp;diff=5957</id>
		<title>File:NewSid2.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:NewSid2.jpg&amp;diff=5957"/>
		<updated>2010-03-27T17:35:45Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=File:NewSid1.jpg&amp;diff=5956</id>
		<title>File:NewSid1.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=File:NewSid1.jpg&amp;diff=5956"/>
		<updated>2010-03-27T17:35:25Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5955</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5955"/>
		<updated>2010-03-27T17:34:39Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
[[Image:Example.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5954</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5954"/>
		<updated>2010-03-27T17:32:11Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Näide dubleeritud SID´ist: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domeeni Admins S-1-5-21----512&lt;br /&gt;
513 - Domeeni Users S-1-5-21----513&lt;br /&gt;
514 - Domeeni Guest S-1-5-21----514&lt;br /&gt;
515 - Domeeni Computers S-1-5-21----515&lt;br /&gt;
516 - Domeeni Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5953</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5953"/>
		<updated>2010-03-27T17:30:08Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domain Admins S-1-5-21----512&lt;br /&gt;
513 - Domain Users S-1-5-21----513&lt;br /&gt;
514 - Domain Guest S-1-5-21----514&lt;br /&gt;
515 - Domain Computers S-1-5-21----515&lt;br /&gt;
516 - Domain Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Meetodid: ==&lt;br /&gt;
&lt;br /&gt;
On olemas palju meetodeid, kuidas SID unikaalset numbrit muuta. Miks on vaja seda teha, see oli mainitud ees pool. Muuta on võimalik käsitsi või kasutades tarvara. Takvarad millega oleks võimalik see teoks viia on Sysprep või NEWSID. Pole kasutanud Sysprepi, kui nii palju kui olen materjale lugenud on NEWSID tükkmaad kiirem ümberkirjutamis protsess.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NEWSID&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Kui käivitate NEWSIDi on Teie ees väike tervitad tekst:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vajutage Next&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Teie ees on väike aken erinevate võimalustega, soovitan valida Random, kuna siis ta genereerib unikaalse SID, mitte copy või spetsifiline SID, mida trükite ise sisse:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Selles valitud lahenduses on võimalik Teil muuta korraga nii arvuti nimi, kui ka SID. Soovitan valida mõlemaid, juhul kui Teie arvuti on ühendatud otse võrku ja selle tõttu vältida konflikte.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui olen valinud arvutile uue nime siis vajutage Next&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Viimane aken kus näitab Teile mis valikud Te olete osutanud, vajutades Next. Genereerib Teie arvutile programm mõningate minutitega vajalikud seadistused, kõik sõltub registri suurusest.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Windows_Server_administreerimine_ainekaart&amp;diff=5952</id>
		<title>Windows Server administreerimine ainekaart</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Windows_Server_administreerimine_ainekaart&amp;diff=5952"/>
		<updated>2010-03-27T17:14:46Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Teemad */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Windows server administreerimine =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Eesmärk ==&lt;br /&gt;
Õppeaine eesmärk on tutvustada Windows Server operatsioonisüsteemil baseeruvate serverite paigaldust, haldamist ja turvamist, õppeaine arendab õppija administreerimisoskuseid ning teadmisi serveritel kasutatavatest operatsioonisüsteemidest.&lt;br /&gt;
&lt;br /&gt;
== Lühitutvustus ==&lt;br /&gt;
Õppeaines käsitletakse Windows Server operatsioonisüsteemil baseeruvate serverite paigaldust, haldamist, turvamist ning veaotsingut. Pikemalt vaadeldakse Windows Serveri teenuseid, mis on seotud hulgipaigalduse, võrgu infrastruktuuri ning Active Directoryiga.&lt;br /&gt;
&lt;br /&gt;
== Õpiväljundid == &lt;br /&gt;
 * Õppija oskab teostada Windows Server tarkvaratoote paigaldust.&lt;br /&gt;
 * Õppija teab ning oskab nimetada Windows Serveri peamised rollid ning selgitada nende ülesandeid.&lt;br /&gt;
 * Õppija oskab paigaldada Windows Server&#039;ile AD DS, DHCP, DNS ning failiserveri rolle ning neid lihtsamatel juhtudel seadistada.&lt;br /&gt;
 * Õppija oskab hallata kasutajaid ning kasutajate gruppe ning rakendada grupipoliitikaid.&lt;br /&gt;
 * Õppija oskab teostada lihtsamatel juhtudel tagavarakoopiaid ning tagavarakoopiate abil rikenud andmeid taastada.&lt;br /&gt;
&lt;br /&gt;
== Hinnde kujunemise selgitus ==&lt;br /&gt;
Kontrolltöö on planeeritud pärast kindla teemade ploki läbimist, mis sisaldab mitu sarnast või omavahel seotud teemat. &lt;br /&gt;
Semestri jooksul on 2 kontrolltööd, iga kontrolltöö eest saadud hinne määrab  25% ulatuses arvestuse lõpphindehinde ning 50% hindest moodustab iseseisva tööna valminud juhend. Arvestushinde saamise eelduseks on läbitud e-kursuste komplekt &amp;quot;6424: Fundamentals of Windows Server 2008 Active Directory&amp;quot;. [[Juhend Microsoft IT Academy e-õppe kursuste kasutamiseks]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kontrolltöö koosneb valikvastustega küsimustest. Küsimused koostatakse läbitud materjali alusel. Praktilised ülesandeid koostatakse praktika tundides käsitletud ülesannete alusel. &lt;br /&gt;
Minimaalselt on nõutav mõlemas kontrolltöös õigete vastuste hulk vähemalt 51%.  &lt;br /&gt;
&lt;br /&gt;
Iseseisva tööna koostatav juhend või ülevaade tuleb majutada aadressile http://wiki.itcollege.ee ning töö hindamisel arvestatakse eelkõige teema käsitlemise põhjalikkust, asjakohasust ning praktilist rakendatavust.&lt;br /&gt;
&lt;br /&gt;
= Teemad =&lt;br /&gt;
&lt;br /&gt;
== Sissejuhatus (esimene kohtumine)==&lt;br /&gt;
*Windows Server tooteperekonna tutvustus&lt;br /&gt;
* Erinevad [[Windows Server versioonid]]&lt;br /&gt;
** [[Windows Server Core]]&lt;br /&gt;
** [[Hyper-V Server]]&lt;br /&gt;
* Miinumumnõuded&lt;br /&gt;
* [[Serveri rollid]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Windows Server versioonid]], [[Serveri rollid]], [[Windows Server Core]], [[Windows Server 2008]], [[Windows Server]], [[Hyper-V Server]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server paigaldus (teine ja kolmas kohtumine)==&lt;br /&gt;
* [[Windows Serveri paigaldus erinevatelt meediatelt]]&lt;br /&gt;
** [[Lab: Windows Serveri paigaldus paigalusmeedialt]]&lt;br /&gt;
* Tootevõtemete haldus ja [[Aktiveerimine|aktiveerimine]]&lt;br /&gt;
* [[Windows operatsioonisüsteemi automaatpaigaldus]]&lt;br /&gt;
** [[Windows Deployment Services]]&lt;br /&gt;
* Rollide seadistamine&lt;br /&gt;
**[[Lab: Windows Deployment Services rolli paigaldus ja seadistamine]]&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Aktiveerimine]], [[Windows operatsioonisüsteemi automaatpaigaldus]], [[Windows Deployment Services]]&lt;br /&gt;
&lt;br /&gt;
==Administreerimisvahendid (neljas kohtumine)==&lt;br /&gt;
* Ülevaade haldusvahenditest&lt;br /&gt;
** Kaughaldus ja selle häälestamine&lt;br /&gt;
*** [[Võrguühenduste seadistamine Windows operatioonissteemis]] ja [[Remote Desktop]]&lt;br /&gt;
**** [[ipconfig]], [[netsh]]&lt;br /&gt;
*** Remote Server Administration Tools for Windows 7 http://technet.microsoft.com/en-us/library/ee449475(WS.10).aspx&lt;br /&gt;
*** Enabling a Remote Workforce http://technet.microsoft.com/et-ee/windowsserver/cc441386(en-us).aspx&lt;br /&gt;
*** Server Core Remote Management http://technet.microsoft.com/et-ee/windowsserver/cc441379(en-us).aspx&lt;br /&gt;
*** Lab: [[Windows Server 2008 võrguühenduste seadistamise praktikum]]&lt;br /&gt;
*** Lab: [[Windows Server 2008 kaughalduse seadistamise praktikum]]&lt;br /&gt;
** Ressursside haldamiseks mõeldud vahendid http://technet.microsoft.com/et-ee/windowsserver/ee895113(en-us).aspx&lt;br /&gt;
*** Performance and Reliability http://technet.microsoft.com/en-us/library/cc770309(WS.10).aspx&lt;br /&gt;
*** Windows Server 2008 R2 Quick Look- System Health Report&lt;br /&gt;
**** [[Reliability Monitor]], [[Resource Monitor]], [[Performance Monitor]], [[Data Collector Sets]], [[Task Manager]], [[Windows System Resource Manager]]&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Võrguühenduste seadistamine Windows operatioonissteemis]], [[Server Manager Console]], [[MMC]], [[Windows PowerShell]], [[EMS]], [[Remote Desktop]], [[RSAT Tools]], [[Microsoft System Center Operations Manager]], [[Reliability Monitor]], [[Resource Monitor]], [[Performance Monitor]], [[Data Collector Sets]], [[Task Manager]], [[Windows System Resource Manager]], [[WSUS]]&lt;br /&gt;
&lt;br /&gt;
==Active Directory infrastruktuur(viies kohtumine)==&lt;br /&gt;
*[[Active Directory Domain Services]] roll&lt;br /&gt;
** Active Directory Domain Services for Windows Server 2008 http://technet.microsoft.com/en-us/library/dd378891(WS.10).aspx&lt;br /&gt;
** Active Directory Domain Services for Windows Server 2008 R2 http://technet.microsoft.com/en-us/library/dd378801(WS.10).aspx&lt;br /&gt;
** Active Directory Lightweight Directory Services http://technet.microsoft.com/en-us/library/cc731868(WS.10).aspx&lt;br /&gt;
* Kasutajad ja grupid &lt;br /&gt;
** Managing Users http://technet.microsoft.com/en-us/library/cc754661.aspx&lt;br /&gt;
** Managing Groups http://technet.microsoft.com/en-us/library/cc771069.aspx&lt;br /&gt;
* Arvutite kontod&lt;br /&gt;
** Managing Computers http://technet.microsoft.com/en-us/library/cc771682.aspx&lt;br /&gt;
* Domeenide haldamine&lt;br /&gt;
** Managing Domains http://technet.microsoft.com/en-us/library/cc754751.aspx&lt;br /&gt;
* &#039;&#039;Organizational Units&#039;&#039; haldamine&lt;br /&gt;
** Managing Organizational Units http://technet.microsoft.com/en-us/library/cc753063.aspx&lt;br /&gt;
* Grupipoliitikate rakendamine&lt;br /&gt;
** Group Policy (2008) http://technet.microsoft.com/en-us/library/cc726027(WS.10).aspx&lt;br /&gt;
** Group Policy (2008 R2) http://technet.microsoft.com/en-us/library/cc754286.aspx&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Active Directory Domain Services]], [[Active Directory Lightweight Directory Services]], [[Organizational Unit]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server turvamine (kuues kohtumine)==&lt;br /&gt;
* Logifailid ja Event Viewer&lt;br /&gt;
* Turvapaikade paigaldamine ja haldusvahendid&lt;br /&gt;
** Windows Server Update Services http://technet.microsoft.com/en-us/wsus/default.aspx&lt;br /&gt;
** [[Lab: WSUS 3.0 paigaldus ja seadistamine]]&lt;br /&gt;
* Tulemüür&lt;br /&gt;
** How to use the &amp;quot;netsh advfirewall firewall&amp;quot; context instead of the &amp;quot;netsh firewall&amp;quot; context to control Windows Firewall behavior in Windows Server 2008 and in Windows Vista http://support.microsoft.com/kb/947709&lt;br /&gt;
** TechNet Virtual Lab: Managing Network Security using Windows Firewall with Advanced Security in Windows Server 2008 Beta 3 http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032345256&amp;amp;EventCategory=3&amp;amp;culture=en-US&amp;amp;CountryCode=US&lt;br /&gt;
* Turvapoliitika&lt;br /&gt;
** Windows Server 2008 Security Guide http://technet.microsoft.com/et-ee/library/cc264463(en-us).aspx&lt;br /&gt;
** Server Security Policy Management http://technet.microsoft.com/en-us/library/cc731004(WS.10).aspx&lt;br /&gt;
** [[Security Configuration Wizard]] http://technet.microsoft.com/en-us/library/cc731515(WS.10).aspx&lt;br /&gt;
** [[UAC]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Event Viewer]], [[Windows Server]], [[WSUS]]&lt;br /&gt;
&lt;br /&gt;
==Andmete  haldamine (seitsmes kohtumine)==&lt;br /&gt;
*Failide ja ketaste haldus&lt;br /&gt;
** Ketaste haldus&lt;br /&gt;
*** Disk Management: Welcome http://technet.microsoft.com/en-us/library/cc770943(WS.10).aspx&lt;br /&gt;
*** [[Diskpart]]&lt;br /&gt;
*** How Do I: Modifying Boot Records in Windows Vista and Windows http://technet.microsoft.com/et-ee/windowsserver/dd490734(en-us).aspx&lt;br /&gt;
&lt;br /&gt;
* Failide pääsuõigused&lt;br /&gt;
** File and Folder Permissions http://technet.microsoft.com/en-us/library/cc732880(WS.10).aspx&lt;br /&gt;
*** Managing Permissions http://technet.microsoft.com/en-us/library/cc770962.aspx&lt;br /&gt;
&lt;br /&gt;
* Andmete jagamine &lt;br /&gt;
** Shared Folders http://technet.microsoft.com/en-us/library/cc770406(WS.10).aspx&lt;br /&gt;
*** Managing Permissions for Shared Folders http://technet.microsoft.com/en-us/library/cc753731(WS.10).aspx&lt;br /&gt;
** File Server Resource Manager Step-by-Step Guide for Windows Server 2008 R2 http://technet.microsoft.com/et-ee/library/dd758761(en-us,WS.10).aspx&lt;br /&gt;
** Services for NFS Step-by-Step Guide for Windows Server 2008 R2 http://technet.microsoft.com/et-ee/library/dd758767(en-us,WS.10).aspx&lt;br /&gt;
&lt;br /&gt;
* Tagavarakoopiate loomine ja taaste&lt;br /&gt;
** Windows Server Backup http://technet.microsoft.com/en-us/library/cc770757(WS.10).aspx&lt;br /&gt;
** Shadow Copies of Shared Folders http://technet.microsoft.com/en-us/library/cc771305(WS.10).aspx&lt;br /&gt;
&lt;br /&gt;
* Introducing BranchCache in Windows Server 2008 R2 http://www.microsoft.com/learning/_silverlight/learningsnacks/WS08R2/snack02/Default.html&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Server Backup]], [[Shadow Copy]], [[Icacls]], [[*.VHD]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server võrguteenused==&lt;br /&gt;
* Võrguteenused ja nende haldus&lt;br /&gt;
** DCHP server ja klient, nende seadistamine&lt;br /&gt;
*** Dynamic Host Configuration Protocol, DHCP (2008 R2) http://technet.microsoft.com/en-us/library/cc755282.aspx&lt;br /&gt;
*** Dynamic Host Configuration Protocol, DHCP (2008)&lt;br /&gt;
** DNS server, selle seadistamine ja roll&lt;br /&gt;
*** DNS http://technet.microsoft.com/en-us/library/cc730921.aspx&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[netsh]], [[ipconfig]], [[ping]], [[tracert]], [[nslookup]], [[net]], [[SID]]&lt;br /&gt;
&lt;br /&gt;
==Muud teemad==&lt;br /&gt;
* Siia tulevad need teemad, mis otseseselt kuhugi mujale ei sobi.&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Litsenseerimine]],&lt;br /&gt;
[[Terminal Services]]&lt;br /&gt;
&lt;br /&gt;
==Active Directory Certificate Services==&lt;br /&gt;
&lt;br /&gt;
== Lingid ==&lt;br /&gt;
* Migreerimine&lt;br /&gt;
** Migrate Server Roles to Windows Server 2008 R2 http://technet.microsoft.com/en-us/library/dd365353(WS.10).aspx&lt;br /&gt;
* AD DS&lt;br /&gt;
** Designing OU Structures that Work - http://technet.microsoft.com/en-us/magazine/2008.05.oudesign.aspx?pr=blog&lt;br /&gt;
&lt;br /&gt;
[[Category: Windows Server administreerimine]]&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5950</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5950"/>
		<updated>2010-03-27T16:54:54Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Sissejuhatus ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Kloonimine ja alternatiivsed meetodid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== SID duplikatsiooni probleemid ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Näide dubleeritud SID´ist: ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domain Admins S-1-5-21----512&lt;br /&gt;
513 - Domain Users S-1-5-21----513&lt;br /&gt;
514 - Domain Guest S-1-5-21----514&lt;br /&gt;
515 - Domain Computers S-1-5-21----515&lt;br /&gt;
516 - Domain Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Well Known SIDs ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5949</id>
		<title>SID</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=SID&amp;diff=5949"/>
		<updated>2010-03-27T16:51:48Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: New page: Eesti Infotehnoloogia Kolledź               Referaat:  SID             Koostaja: Stanislav Tsvetajev rühm: IA37               Tallinn 2010.a     Sissejuhatus  Paljud oranisatsioonid ja s...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Eesti Infotehnoloogia Kolledź&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Referaat:&lt;br /&gt;
&lt;br /&gt;
SID&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Koostaja: Stanislav Tsvetajev&lt;br /&gt;
rühm: IA37&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tallinn&lt;br /&gt;
2010.a&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sissejuhatus&lt;br /&gt;
&lt;br /&gt;
Paljud oranisatsioonid ja suurimad ettevõtted kasutavad kõvaketta kloonimist, et säilitada sellega oma tööaega, ei unune teatud tarkvara install, õiguste seadistamist jne. Arvuti on võimalik kasutajale püsti panna teatud minutitega, mis kuluks muidu pool päeva.&lt;br /&gt;
&lt;br /&gt;
Kui see meetod sälitad tohutolt aega on sellel meetodil spetsiifiline probleem ja see on SID ehk Security Identification. Iga kloonitud arvuti, kasutaja, grupp omavad oma SID´i.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kloonimine ja alternatiivsed meetodid&lt;br /&gt;
&lt;br /&gt;
Üks kõige populaarseimaid meetodeid on ettevõttes kloonimine. Süsteemi administraator installib valmis masinast teatud tarkvaraga nagu näiteks Ghoust ja PowerQuest. Peale imagi valmistamist on ta võimeline ümber kopperima see samune image tuhandetele arvutitele, mis säästab talle väga palju aega.&lt;br /&gt;
&lt;br /&gt;
Järgmine populaarne meetod on kasutada Microsoft sysdiff utility. See tuul nõuab et süsteemi administraator esitleks täis installatsiooni (tavaliselt unattended skripti installatsioon) igale arvutile ja siis sysdiff automatiseerib tarkvara image add-on aplikatsiooni.&lt;br /&gt;
&lt;br /&gt;
Seepärast on selline installatsiooni meetod kõlbmatu ja seepärast on ketta sektori kloonimine palju efektiivsem kui filide kopimine. Süsteemi administraator ei pea õppima kuidas unattended installatsiooni teha või sysdiff ning valmistada ja otsida skriptides vigu.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SID duplikatsiooni probleemid&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kui igale arvutile tehakse puhas install saab ta unikaalse nime ja SID´i. Kuid kui süsteem on kloonitud siis omab ta dubleeritud SID. Kui vahetada arvuti nime või panna teda teise workgroupi ei ole sellest abi.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Näide dubleeritud SID´ist:&lt;br /&gt;
&lt;br /&gt;
Oletame meil on ettevõttes kaks töömasinat masin1 ja masin2. Süsteemi admin kasutas tarkvara, et kloonida süsteemi teisele masinale.&lt;br /&gt;
&lt;br /&gt;
Aleksi masin omab lokaal kontot ja masin1 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
Kevin masin  omab lokaal kontot ja masin2 omab S-1-5-34-148593445-285934854-2859284934-1010&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aleks kasutaja salvestab oma infot NTFS kettale ja tekitab jagatud kausta nimega privaat see mida tema saab ainult näha (siseneda). Kui Kevin vaataleb võrgus jagatud olevaid kaustasin on ta võimeline sellesse sisse saama kuna ta omab identset SID´i mida Alekski. Oletame, et võrgus on sada masinat installitud sama SID´iga siis ei oma te mingit turvalisust oma võrgus. Isegi kõik faildi mis on removeable meedia salvestatud on sammuti haavatud.&lt;br /&gt;
SID´i sügavus&lt;br /&gt;
&lt;br /&gt;
Nagu näete näidest tavapärane SID näeb välja nii S-1-5-12-7723811915-3361004348-033306820-1006.&lt;br /&gt;
SID numbriline tähendus on järgmine:&lt;br /&gt;
&lt;br /&gt;
S – String on SID&lt;br /&gt;
1 – redigeerimise aste.&lt;br /&gt;
5 – autoriteedi identifitseerimine&lt;br /&gt;
12–7723811915-3361004348-033306820 Domeeni või local arvuti indentifitseerimine&lt;br /&gt;
1006 – RID&lt;br /&gt;
&lt;br /&gt;
Iga grupp või kasutaja, kes ei olnud tekitatud defaultina omab RID 1000 või suurem. RID on Registeri ID. See on SID viimane portsion. Kui RID on väljalastud, peale seda ei kasutata teda enam välja arvatud kui konto on kustutatud.&lt;br /&gt;
&lt;br /&gt;
Kuigi on alati aksepteeritav MS Windowsis. Teatud RID &lt;br /&gt;
(alla 1000) on defineeritud:&lt;br /&gt;
&lt;br /&gt;
500 - Administrator S-1-5-21----500&lt;br /&gt;
501 - Guest S-1-5-21----501&lt;br /&gt;
502 – KRBTGT S-1-5-21----502&lt;br /&gt;
&lt;br /&gt;
512 - Domain Admins S-1-5-21----512&lt;br /&gt;
513 - Domain Users S-1-5-21----513&lt;br /&gt;
514 - Domain Guest S-1-5-21----514&lt;br /&gt;
515 - Domain Computers S-1-5-21----515&lt;br /&gt;
516 - Domain Controllers S-1-5-21----516&lt;br /&gt;
517 - Cert Publishers S-1-5-21----517&lt;br /&gt;
518 - Schema Admins S-1-5-21----518&lt;br /&gt;
519 - Enterprise Admins S-1-5-21----519&lt;br /&gt;
520 - Group Policy Creator Owners S-1-5-21----520&lt;br /&gt;
533 - RAS and IAS Servers S-1-5-21----533&lt;br /&gt;
&lt;br /&gt;
Well Known SIDs&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0&lt;br /&gt;
Name: Null Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-0-0&lt;br /&gt;
Name: Nobody&lt;br /&gt;
Description: No security principal.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1&lt;br /&gt;
Name: World Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-1-0&lt;br /&gt;
Name: Everyone&lt;br /&gt;
Description: A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system. Note By default, the Everyone group no longer includes anonymous users on a computer that is running Windows XP Service Pack 2 (SP2).&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-2&lt;br /&gt;
Name: Local Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3&lt;br /&gt;
Name: Creator Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-0&lt;br /&gt;
Name: Creator Owner&lt;br /&gt;
Description: A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object&#039;s creator.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-1&lt;br /&gt;
Name: Creator Group&lt;br /&gt;
Description: A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object&#039;s creator. The primary group is used only by the POSIX subsystem.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-2&lt;br /&gt;
Name: Creator Owner Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-3-3&lt;br /&gt;
Name: Creator Group Server&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-4&lt;br /&gt;
Name: Non-unique Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-1&lt;br /&gt;
Name: Dialup&lt;br /&gt;
Description: A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-2&lt;br /&gt;
Name: Network&lt;br /&gt;
Description: A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-3&lt;br /&gt;
Name: Batch&lt;br /&gt;
Description: A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-4&lt;br /&gt;
Name: Interactive&lt;br /&gt;
Description: A group that includes all users that have logged on interactively. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-5-X-Y&lt;br /&gt;
Name: Logon Session&lt;br /&gt;
Description: A logon session. The X and Y values for these SIDs are different for each session.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-6&lt;br /&gt;
Name: Service&lt;br /&gt;
Description: A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-7&lt;br /&gt;
Name: Anonymous&lt;br /&gt;
Description: A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-8&lt;br /&gt;
Name: Proxy&lt;br /&gt;
Description: This SID is not used in Windows 2000.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-9&lt;br /&gt;
Name: Enterprise Domain Controllers&lt;br /&gt;
Description: A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-10&lt;br /&gt;
Name: Principal Self&lt;br /&gt;
Description: A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-11&lt;br /&gt;
Name: Authenticated Users&lt;br /&gt;
Description: A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-12&lt;br /&gt;
Name: Restricted Code&lt;br /&gt;
Description: This SID is reserved for future use.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-13&lt;br /&gt;
Name: Terminal Server Users&lt;br /&gt;
Description: A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-18&lt;br /&gt;
Name: Local System&lt;br /&gt;
Description: A service account that is used by the operating system.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-19&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Local Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-20&lt;br /&gt;
Name: NT Authority&lt;br /&gt;
Description: Network Service&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-544&lt;br /&gt;
Name: Administrators&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-545&lt;br /&gt;
Name: Users&lt;br /&gt;
Description: A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-546&lt;br /&gt;
Name: Guests&lt;br /&gt;
Description: A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer&#039;s built-in Guest account.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-547&lt;br /&gt;
Name: Power Users&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-548&lt;br /&gt;
Name: Account Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-549&lt;br /&gt;
Name: Server Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-550&lt;br /&gt;
Name: Print Operators&lt;br /&gt;
Description: A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues&lt;br /&gt;
.&lt;br /&gt;
• SID: S-1-5-32-551&lt;br /&gt;
Name: Backup Operators&lt;br /&gt;
Description: A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-552&lt;br /&gt;
Name: Replicators&lt;br /&gt;
Description: A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.&lt;br /&gt;
The following groups will show as SIDs until a Windows Server 2003 domain controller is made the primary domain controller (PDC) operations master role holder. (The &amp;quot;operations master&amp;quot; is also known as flexible single master operations or FSMO.)&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-554&lt;br /&gt;
Name: BUILTIN\Pre-Windows 2000 Compatible Access&lt;br /&gt;
Description: An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-555&lt;br /&gt;
Name: BUILTIN\Remote Desktop Users&lt;br /&gt;
Description: An alias. Members in this group are granted the right to logon remotely.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-556&lt;br /&gt;
Name: BUILTIN\Network Configuration Operators&lt;br /&gt;
Description: An alias. Members in this group can have some administrative privileges to manage configuration of networking features.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-557&lt;br /&gt;
Name: BUILTIN\Incoming Forest Trust Builders&lt;br /&gt;
Description: An alias. Members of this group can create incoming, one-way trusts to this forest.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-558&lt;br /&gt;
Name: BUILTIN\Performance Monitor Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to monitor this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-559&lt;br /&gt;
Name: BUILTIN\Performance Log Users&lt;br /&gt;
Description: An alias. Members of this group have remote access to schedule logging of performance counters on this computer.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-560&lt;br /&gt;
Name: BUILTIN\Windows Authorization Access Group&lt;br /&gt;
Description: An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-5-32-561&lt;br /&gt;
Name: BUILTIN\Terminal Server License Servers&lt;br /&gt;
Description: An alias. A group for Terminal Server License Servers.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-6&lt;br /&gt;
Name: Site Server Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-7&lt;br /&gt;
Name: Internet Site Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-8&lt;br /&gt;
Name: Exchange Authority An identifier authority.&lt;br /&gt;
&lt;br /&gt;
• SID: S-1-9&lt;br /&gt;
Name: Resource Manager Authority An identifier&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Windows_Server_administreerimine_ainekaart&amp;diff=5948</id>
		<title>Windows Server administreerimine ainekaart</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Windows_Server_administreerimine_ainekaart&amp;diff=5948"/>
		<updated>2010-03-27T16:49:08Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Teemad */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Windows server administreerimine =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Eesmärk ==&lt;br /&gt;
Õppeaine eesmärk on tutvustada Windows Server operatsioonisüsteemil baseeruvate serverite paigaldust, haldamist ja turvamist, õppeaine arendab õppija administreerimisoskuseid ning teadmisi serveritel kasutatavatest operatsioonisüsteemidest.&lt;br /&gt;
&lt;br /&gt;
== Lühitutvustus ==&lt;br /&gt;
Õppeaines käsitletakse Windows Server operatsioonisüsteemil baseeruvate serverite paigaldust, haldamist, turvamist ning veaotsingut. Pikemalt vaadeldakse Windows Serveri teenuseid, mis on seotud hulgipaigalduse, võrgu infrastruktuuri ning Active Directoryiga.&lt;br /&gt;
&lt;br /&gt;
== Õpiväljundid == &lt;br /&gt;
 * Õppija oskab teostada Windows Server tarkvaratoote paigaldust.&lt;br /&gt;
 * Õppija teab ning oskab nimetada Windows Serveri peamised rollid ning selgitada nende ülesandeid.&lt;br /&gt;
 * Õppija oskab paigaldada Windows Server&#039;ile AD DS, DHCP, DNS ning failiserveri rolle ning neid lihtsamatel juhtudel seadistada.&lt;br /&gt;
 * Õppija oskab hallata kasutajaid ning kasutajate gruppe ning rakendada grupipoliitikaid.&lt;br /&gt;
 * Õppija oskab teostada lihtsamatel juhtudel tagavarakoopiaid ning tagavarakoopiate abil rikenud andmeid taastada.&lt;br /&gt;
&lt;br /&gt;
== Hinnde kujunemise selgitus ==&lt;br /&gt;
Kontrolltöö on planeeritud pärast kindla teemade ploki läbimist, mis sisaldab mitu sarnast või omavahel seotud teemat. &lt;br /&gt;
Semestri jooksul on 2 kontrolltööd, iga kontrolltöö eest saadud hinne määrab  25% ulatuses arvestuse lõpphindehinde ning 50% hindest moodustab iseseisva tööna valminud juhend. Arvestushinde saamise eelduseks on läbitud e-kursuste komplekt &amp;quot;6424: Fundamentals of Windows Server 2008 Active Directory&amp;quot;. [[Juhend Microsoft IT Academy e-õppe kursuste kasutamiseks]]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
Kontrolltöö koosneb valikvastustega küsimustest. Küsimused koostatakse läbitud materjali alusel. Praktilised ülesandeid koostatakse praktika tundides käsitletud ülesannete alusel. &lt;br /&gt;
Minimaalselt on nõutav mõlemas kontrolltöös õigete vastuste hulk vähemalt 51%.  &lt;br /&gt;
&lt;br /&gt;
Iseseisva tööna koostatav juhend või ülevaade tuleb majutada aadressile http://wiki.itcollege.ee ning töö hindamisel arvestatakse eelkõige teema käsitlemise põhjalikkust, asjakohasust ning praktilist rakendatavust.&lt;br /&gt;
&lt;br /&gt;
= Teemad =&lt;br /&gt;
&lt;br /&gt;
== Sissejuhatus (esimene kohtumine)==&lt;br /&gt;
*Windows Server tooteperekonna tutvustus&lt;br /&gt;
* Erinevad [[Windows Server versioonid]]&lt;br /&gt;
** [[Windows Server Core]]&lt;br /&gt;
** [[Hyper-V Server]]&lt;br /&gt;
* Miinumumnõuded&lt;br /&gt;
* [[Serveri rollid]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Windows Server versioonid]], [[Serveri rollid]], [[Windows Server Core]], [[Windows Server 2008]], [[Windows Server]], [[Hyper-V Server]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server paigaldus (teine ja kolmas kohtumine)==&lt;br /&gt;
* [[Windows Serveri paigaldus erinevatelt meediatelt]]&lt;br /&gt;
** [[Lab: Windows Serveri paigaldus paigalusmeedialt]]&lt;br /&gt;
* Tootevõtemete haldus ja [[Aktiveerimine|aktiveerimine]]&lt;br /&gt;
* [[Windows operatsioonisüsteemi automaatpaigaldus]]&lt;br /&gt;
** [[Windows Deployment Services]]&lt;br /&gt;
* Rollide seadistamine&lt;br /&gt;
**[[Lab: Windows Deployment Services rolli paigaldus ja seadistamine]]&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Aktiveerimine]], [[Windows operatsioonisüsteemi automaatpaigaldus]], [[Windows Deployment Services]]&lt;br /&gt;
&lt;br /&gt;
==Administreerimisvahendid (neljas kohtumine)==&lt;br /&gt;
* Ülevaade haldusvahenditest&lt;br /&gt;
** Kaughaldus ja selle häälestamine&lt;br /&gt;
*** [[Võrguühenduste seadistamine Windows operatioonissteemis]] ja [[Remote Desktop]]&lt;br /&gt;
**** [[ipconfig]], [[netsh]]&lt;br /&gt;
*** Remote Server Administration Tools for Windows 7 http://technet.microsoft.com/en-us/library/ee449475(WS.10).aspx&lt;br /&gt;
*** Enabling a Remote Workforce http://technet.microsoft.com/et-ee/windowsserver/cc441386(en-us).aspx&lt;br /&gt;
*** Server Core Remote Management http://technet.microsoft.com/et-ee/windowsserver/cc441379(en-us).aspx&lt;br /&gt;
*** Lab: [[Windows Server 2008 võrguühenduste seadistamise praktikum]]&lt;br /&gt;
*** Lab: [[Windows Server 2008 kaughalduse seadistamise praktikum]]&lt;br /&gt;
** Ressursside haldamiseks mõeldud vahendid http://technet.microsoft.com/et-ee/windowsserver/ee895113(en-us).aspx&lt;br /&gt;
*** Performance and Reliability http://technet.microsoft.com/en-us/library/cc770309(WS.10).aspx&lt;br /&gt;
*** Windows Server 2008 R2 Quick Look- System Health Report&lt;br /&gt;
**** [[Reliability Monitor]], [[Resource Monitor]], [[Performance Monitor]], [[Data Collector Sets]], [[Task Manager]], [[Windows System Resource Manager]]&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Võrguühenduste seadistamine Windows operatioonissteemis]], [[Server Manager Console]], [[MMC]], [[Windows PowerShell]], [[EMS]], [[Remote Desktop]], [[RSAT Tools]], [[Microsoft System Center Operations Manager]], [[Reliability Monitor]], [[Resource Monitor]], [[Performance Monitor]], [[Data Collector Sets]], [[Task Manager]], [[Windows System Resource Manager]], [[WSUS]]&lt;br /&gt;
&lt;br /&gt;
==Active Directory infrastruktuur(viies kohtumine)==&lt;br /&gt;
*[[Active Directory Domain Services]] roll&lt;br /&gt;
** Active Directory Domain Services for Windows Server 2008 http://technet.microsoft.com/en-us/library/dd378891(WS.10).aspx&lt;br /&gt;
** Active Directory Domain Services for Windows Server 2008 R2 http://technet.microsoft.com/en-us/library/dd378801(WS.10).aspx&lt;br /&gt;
** Active Directory Lightweight Directory Services http://technet.microsoft.com/en-us/library/cc731868(WS.10).aspx&lt;br /&gt;
* Kasutajad ja grupid &lt;br /&gt;
** Managing Users http://technet.microsoft.com/en-us/library/cc754661.aspx&lt;br /&gt;
** Managing Groups http://technet.microsoft.com/en-us/library/cc771069.aspx&lt;br /&gt;
* Arvutite kontod&lt;br /&gt;
** Managing Computers http://technet.microsoft.com/en-us/library/cc771682.aspx&lt;br /&gt;
* Domeenide haldamine&lt;br /&gt;
** Managing Domains http://technet.microsoft.com/en-us/library/cc754751.aspx&lt;br /&gt;
* &#039;&#039;Organizational Units&#039;&#039; haldamine&lt;br /&gt;
** Managing Organizational Units http://technet.microsoft.com/en-us/library/cc753063.aspx&lt;br /&gt;
* Grupipoliitikate rakendamine&lt;br /&gt;
** Group Policy (2008) http://technet.microsoft.com/en-us/library/cc726027(WS.10).aspx&lt;br /&gt;
** Group Policy (2008 R2) http://technet.microsoft.com/en-us/library/cc754286.aspx&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Active Directory Domain Services]], [[Active Directory Lightweight Directory Services]], [[Organizational Unit]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server turvamine (kuues kohtumine)==&lt;br /&gt;
* Logifailid ja Event Viewer&lt;br /&gt;
* Turvapaikade paigaldamine ja haldusvahendid&lt;br /&gt;
** Windows Server Update Services http://technet.microsoft.com/en-us/wsus/default.aspx&lt;br /&gt;
** [[Lab: WSUS 3.0 paigaldus ja seadistamine]]&lt;br /&gt;
* Tulemüür&lt;br /&gt;
** How to use the &amp;quot;netsh advfirewall firewall&amp;quot; context instead of the &amp;quot;netsh firewall&amp;quot; context to control Windows Firewall behavior in Windows Server 2008 and in Windows Vista http://support.microsoft.com/kb/947709&lt;br /&gt;
** TechNet Virtual Lab: Managing Network Security using Windows Firewall with Advanced Security in Windows Server 2008 Beta 3 http://msevents.microsoft.com/CUI/WebCastEventDetails.aspx?EventID=1032345256&amp;amp;EventCategory=3&amp;amp;culture=en-US&amp;amp;CountryCode=US&lt;br /&gt;
* Turvapoliitika&lt;br /&gt;
** Windows Server 2008 Security Guide http://technet.microsoft.com/et-ee/library/cc264463(en-us).aspx&lt;br /&gt;
** Server Security Policy Management http://technet.microsoft.com/en-us/library/cc731004(WS.10).aspx&lt;br /&gt;
** [[Security Configuration Wizard]] http://technet.microsoft.com/en-us/library/cc731515(WS.10).aspx&lt;br /&gt;
** [[UAC]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Event Viewer]], [[Windows Server]], [[WSUS]]&lt;br /&gt;
&lt;br /&gt;
==Andmete  haldamine (seitsmes kohtumine)==&lt;br /&gt;
*Failide ja ketaste haldus&lt;br /&gt;
** Ketaste haldus&lt;br /&gt;
*** Disk Management: Welcome http://technet.microsoft.com/en-us/library/cc770943(WS.10).aspx&lt;br /&gt;
*** [[Diskpart]]&lt;br /&gt;
*** How Do I: Modifying Boot Records in Windows Vista and Windows http://technet.microsoft.com/et-ee/windowsserver/dd490734(en-us).aspx&lt;br /&gt;
&lt;br /&gt;
* Failide pääsuõigused&lt;br /&gt;
** File and Folder Permissions http://technet.microsoft.com/en-us/library/cc732880(WS.10).aspx&lt;br /&gt;
*** Managing Permissions http://technet.microsoft.com/en-us/library/cc770962.aspx&lt;br /&gt;
&lt;br /&gt;
* Andmete jagamine &lt;br /&gt;
** Shared Folders http://technet.microsoft.com/en-us/library/cc770406(WS.10).aspx&lt;br /&gt;
*** Managing Permissions for Shared Folders http://technet.microsoft.com/en-us/library/cc753731(WS.10).aspx&lt;br /&gt;
** File Server Resource Manager Step-by-Step Guide for Windows Server 2008 R2 http://technet.microsoft.com/et-ee/library/dd758761(en-us,WS.10).aspx&lt;br /&gt;
** Services for NFS Step-by-Step Guide for Windows Server 2008 R2 http://technet.microsoft.com/et-ee/library/dd758767(en-us,WS.10).aspx&lt;br /&gt;
&lt;br /&gt;
* Tagavarakoopiate loomine ja taaste&lt;br /&gt;
** Windows Server Backup http://technet.microsoft.com/en-us/library/cc770757(WS.10).aspx&lt;br /&gt;
** Shadow Copies of Shared Folders http://technet.microsoft.com/en-us/library/cc771305(WS.10).aspx&lt;br /&gt;
&lt;br /&gt;
* Introducing BranchCache in Windows Server 2008 R2 http://www.microsoft.com/learning/_silverlight/learningsnacks/WS08R2/snack02/Default.html&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[Server Backup]], [[Shadow Copy]], [[Icacls]], [[*.VHD]]&lt;br /&gt;
&lt;br /&gt;
==Windows Server võrguteenused==&lt;br /&gt;
* Võrguteenused ja nende haldus&lt;br /&gt;
** DCHP server ja klient, nende seadistamine&lt;br /&gt;
*** Dynamic Host Configuration Protocol, DHCP (2008 R2) http://technet.microsoft.com/en-us/library/cc755282.aspx&lt;br /&gt;
*** Dynamic Host Configuration Protocol, DHCP (2008)&lt;br /&gt;
** DNS server, selle seadistamine ja roll&lt;br /&gt;
*** DNS http://technet.microsoft.com/en-us/library/cc730921.aspx&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[netsh]], [[ipconfig]], [[ping]], [[tracert]], [[nslookup]], [[net]], [[SID]]&lt;br /&gt;
&lt;br /&gt;
==Muud teemad==&lt;br /&gt;
* Siia tulevad need teemad, mis otseseselt kuhugi mujale ei sobi.&lt;br /&gt;
&lt;br /&gt;
===Teemad===&lt;br /&gt;
[[SID]],&lt;br /&gt;
[[Litsenseerimine]],&lt;br /&gt;
[[Terminal Services]]&lt;br /&gt;
&lt;br /&gt;
==Active Directory Certificate Services==&lt;br /&gt;
&lt;br /&gt;
== Lingid ==&lt;br /&gt;
* Migreerimine&lt;br /&gt;
** Migrate Server Roles to Windows Server 2008 R2 http://technet.microsoft.com/en-us/library/dd365353(WS.10).aspx&lt;br /&gt;
* AD DS&lt;br /&gt;
** Designing OU Structures that Work - http://technet.microsoft.com/en-us/magazine/2008.05.oudesign.aspx?pr=blog&lt;br /&gt;
&lt;br /&gt;
[[Category: Windows Server administreerimine]]&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Category:Windows_Server_administreerimine&amp;diff=5454</id>
		<title>Category:Windows Server administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Category:Windows_Server_administreerimine&amp;diff=5454"/>
		<updated>2010-03-22T08:10:33Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Ainekaart */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Õppeaine: Windows Server administreerimine=&lt;br /&gt;
=[[Windows Server administreerimine ainekaart|Ainekaart]]=&lt;br /&gt;
&lt;br /&gt;
Siit leiab referaadid, viited labori- ja loengumaterjalidele.&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
	<entry>
		<id>https://wiki.itcollege.ee/index.php?title=Category:Windows_Server_administreerimine&amp;diff=5453</id>
		<title>Category:Windows Server administreerimine</title>
		<link rel="alternate" type="text/html" href="https://wiki.itcollege.ee/index.php?title=Category:Windows_Server_administreerimine&amp;diff=5453"/>
		<updated>2010-03-22T08:10:26Z</updated>

		<summary type="html">&lt;p&gt;Stsvetaj: /* Ainekaart */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Õppeaine: Windows Server administreerimine=&lt;br /&gt;
=[[Windows Server administreerimine ainekaart|Ainekaart]]=&lt;br /&gt;
&lt;br /&gt;
Siit leiab referaadid, viited labori- ja loengumaterjalidele.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SID&lt;/div&gt;</summary>
		<author><name>Stsvetaj</name></author>
	</entry>
</feed>