Use Case
Use Case
S-1-5-12
S-1-5-13
S-1-5-14
S-1-5-15
S-1-5-17
S-1-5-18
S-1-5-19
S-1-5-20
S-1-5-domain-500
S-1-5-domain-501
S-1-5-domain-502
S-1-5-domain-512
S-1-5-domain-513
S-1-5-domain-514
S-1-5-domain-515
S-1-5-domain-516
S-1-5-domain-517
S-1-5-root domain-518
S-1-5-root domain-519
S-1-5-root domain-519
S-1-5-domain-520
S-1-5-domain-521
S-1-5-domain-522
S-1-5-domain-525
S-1-5-root domain-526
S-1-5-domain-527
S-1-5-32-544
S-1-5-32-545
S-1-5-32-546
S-1-5-32-547
S-1-5-32-548
S-1-5-32-549
S-1-5-32-550
S-1-5-32-551
S-1-5-32-552
S-1-5-domain-553
S-1-5-32-554
S-1-5-32-555
S-1-5-32-556
S-1-5-32-557
S-1-5-32-558
S-1-5-32-559
S-1-5-32-560
S-1-5-32-561
S-1-5-32-562
S-1-5-32-568
S-1-5-32-569
S-1-5-domain-571
S-1-5-domain-572
S-1-5-32-573
S-1-5-32-574
S-1-5-32-575
S-1-5-32-576
S-1-5-32-577
S-1-5-32-578
S-1-5-32-579
S-1-5-32-580
S-1-5-64-10
S-1-5-64-14
S-1-5-64-21
S-1-5-80
S-1-5-80-0
S-1-5-83-0
Examples of domain-relative RIDs that are used to form well-known SIDs for local groups are listed in the following table:
RID
DOMAIN_ALIAS_RID_ADMINS
DOMAIN_ALIAS_RID_USERS
DOMAIN_ALIAS_RID_GUESTS
DOMAIN_ALIAS_RID_POWER_USERS
DOMAIN_ALIAS_RID_BACKUP_OPS
DOMAIN_ALIAS_RID_REPLICATOR
DOMAIN_ALIAS_RID_RAS_SERVERS
Display name Description
Dialup A group that includes all users who are signed in to the system via dial-up
Local account You can use this SID when you're restricting network sign-in to local acco
Local account and member of Administrators group You can use this SID when you're restricting network sign-in to local acco
Network A group that includes all users who are signed in via a network connection
Batch A group that includes all users who have signed in via batch queue facility
Interactive A group that includes all users who sign in interactively. A user can start a
Logon Session The X and Y values for these SIDs uniquely identify a particular sign-in se
Service A group that includes all security principals that have signed in as a servic
A user who has connected to the computer without supplying a user name
Anonymous Logon
The Anonymous Logon identity is different from the identity that's used by
Proxy Doesn't currently apply: this SID isn't used.
Enterprise Domain Controllers A group that includes all domain controllers in a forest of domains.
Self A placeholder in an ACE for a user, group, or computer object in Active D
A group that includes all users and computers with identities that have bee
Authenticated Users
This group includes authenticated security principals from any trusted dom
An identity that's used by a process that's running in a restricted security co
Unrestricted
Restricted Code Restricted
Disallowed
When code runs at the restricted security level, the Restricted SID is added
Terminal Server User A group that includes all users who sign in to a server with Remote Deskto
Remote Interactive Logon A group that includes all users who sign in to the computer by using a rem
This Organization A group that includes all users from the same organization. Included only
IUSR An account that's used by the default Internet Information Services (IIS) u
An identity that's used locally by the operating system and by services that
System (or LocalSystem) System is a hidden member of Administrators. That is, any process runnin
When a process that's running locally as System accesses network resource
NT Authority (LocalService) An identity that's used by services that are local to the computer, have no n
Network Service An identity that's used by services that have no need for extensive local ac
A user account for the system administrator. Every computer has a local A
Administrator The Administrator account is the first account created during operating sys
By default, the Administrator account is a member of the Administrators g
A user account for people who don't have individual accounts. Every comp
Guest By default, Guest is a member of the Everyone and the Guests groups. The
Unlike Anonymous Logon, Guest is a real account, and it can be used to si
KRBTGT A user account that's used by the Key Distribution Center (KDC) service. T
A global group with members that are authorized to administer the domain
Domain Admins
Domain Admins is the default owner of any object that's created in the dom
Domain Users A global group that includes all users in a domain. When you create a new
Domain Guests A global group that, by default, has only one member: the domain's built-i
Domain Computers A global group that includes all computers that have joined the domain, ex
Domain Controllers A global group that includes all domain controllers in the domain. New do
A global group that includes all computers that host an enterprise certifica
Cert Publishers
Cert Publishers are authorized to publish certificates for User objects in Ac
Schema Admins A group that exists only in the forest root domain. It's a universal group if
A group that exists only in the forest root domain. It's a universal group if
Enterprise Admins The Enterprise Admins group is authorized to make changes to the forest i
Enterprise Admins
By default, the only member of Enterprise Admins is the Administrator ac
A global group that's authorized to create new Group Policy Objects in Ac
Group Policy Creator Owners
Objects that are created by members of Group Policy Creator Owners are o
Read-only Domain Controllers A global group that includes all read-only domain controllers.
Clonable Controllers A global group that includes all domain controllers in the domain that can
Protected Users A global group that is afforded additional protections against authenticatio
Key Admins This group is intended for use in scenarios where trusted external authoriti
Enterprise Key Admins This group is intended for use in scenarios where trusted external authoriti
Administrators A built-in group. After the initial installation of the operating system, the o
Users A built-in group. After the initial installation of the operating system, the o
Guests A built-in group. By default, the only member is the Guest account. The G
Power Users A built-in group. By default, the group has no members. Power users can c
Account Operators A built-in group that exists only on domain controllers. By default, the gro
Server Operators Description: A built-in group that exists only on domain controllers. By de
Print Operators A built-in group that exists only on domain controllers. By default, the onl
Backup Operators A built-in group. By default, the group has no members. Backup Operators
Replicators A built-in group that's used by the File Replication service on domain cont
A local domain group. By default, this group has no members. Computers
RAS and IAS Servers
Members of this group have access to certain properties of User objects, su
Builtin\Pre-Windows 2000 Compatible Access An alias added by Windows 2000. A backward compatibility group that al
Builtin\Remote Desktop Users An alias. Members of this group are granted the right to sign in remotely.
Builtin\Network Configuration Operators An alias. Members of this group can have some administrative privileges t
Builtin\Incoming Forest Trust Builders An alias. Members of this group can create incoming, one-way trusts to th
Builtin\Performance Monitor Users An alias. Members of this group have remote access to monitor this compu
Builtin\Performance Log Users An alias. Members of this group have remote access to schedule logging o
Builtin\Windows Authorization Access Group An alias. Members of this group have access to the computed tokenGroups
Builtin\Terminal Server License Servers An alias. A group for Terminal Server License Servers. When Windows S
Builtin\Distributed COM Users An alias. A group for COM to provide computer-wide access controls that
Builtin\IIS_IUSRS An alias. A built-in group account for IIS users.
Builtin\Cryptographic Operators A built-in local group. Members are authorized to perform cryptographic o
Allowed RODC Password Replication Group Members in this group can have their passwords replicated to all read-only
Denied RODC Password Replication Group Members in this group can't have their passwords replicated to all read-onl
Builtin\Event Log Readers A built-in local group. Members of this group can read event logs from a l
Builtin\Certificate Service DCOM Access A built-in local group. Members of this group are allowed to connect to Ce
Builtin\RDS Remote Access Servers A built-in local group. Servers in this group enable users of RemoteApp pr
Builtin\RDS Endpoint Servers A built-in local group. Servers in this group run virtual machines and host
Builtin\RDS Management Servers A built-in local group. Servers in this group can perform routine administr
Builtin\Hyper-V Administrators A built-in local group. Members of this group have complete and unrestric
Builtin\Access Control Assistance Operators A built-in local group. Members of this group can remotely query authoriz
Builtin\Remote Management Users A built-in local group. Members of this group can access Windows Manag
NTLM Authentication A SID that's used when the NTLM authentication package authenticates th
SChannel Authentication A SID that's used when the SChannel authentication package authenticates
Digest Authentication A SID that's used when the Digest authentication package authenticates th
NT Service A SID that's used as an NT Service account prefix.
All Services A group that includes all service processes that are configured on the syste
NT VIRTUAL MACHINE\Virtual Machines A built-in group. The group is created when the Hyper-V role is installed.
Decimal value Identifies
500 The administrative user account in a domain.
501 The guest-user account in a domain. Users who don't have an account can
513 A group that contains all user accounts in a domain. All users are automati
514 The group Guest account in a domain.
515 The Domain Computer group. All computers in the domain are members o
516 The Domain Controller group. All domain controllers in the domain are m
517 The certificate publishers group. Computers running Active Directory Cer
518 The schema administrators group. Members of this group can modify the A
519 The enterprise administrators group. Members of this group have full acce
520 The policy administrators group.
llowing table:
a forest of domains.
omputer object in Active Directory. When you grant permissions to Self, you grant them to the security principal that's represented by the o
with identities that have been authenticated. Authenticated Users doesn't include Guest even if the Guest account has a password.
cipals from any trusted domain, not only the current domain.
ng in a restricted security context. In Windows and Windows Server operating systems, a software restriction policy can assign one of three
are configured on the system. Membership is controlled by the operating system. SID S-1-5-80-0 equals NT SERVICES\ALL SERVICES.
Hyper-V role is installed. Membership in the group is maintained by the Hyper-V Management Service (VMMS). This group requires the
don't have an account can automatically sign in to this account.
main. All users are automatically added to this group.
stem as if it were their personal computer rather than as a workstation for multiple users.
ent of file backup-and-restore user rights.
urity databases from the primary domain controller to the backup domain controllers. These accounts are used only by the system.
servers that are running Internet Authentication Service (IAS). This group permits access to various attributes of User objects.
g network sign-in for local users and groups by account type regardless of what they're named.
g network sign-in for local users and groups by account type regardless of what they're named.
om a remote computer, or by using a remote shell such as Telnet. In each case, the user's access token contains the Interactive SID. If the us
l account—by default, IUSR_ ComputerName, for anonymous access to resources on a website. Strictly speaking, such access isn't anonym
cipal that's represented by the object. During an access check, the operating system replaces the SID for Self with the SID for the security pr
unt has a password.
kens that contain the Remote Interactive Logon SID also contain the Interactive SID.
ote computer includes the SID for the local computer's domain account plus SIDs for security groups that the computer is a member of, such
ces that run as LocalService access local resources as ordinary users, and they access network resources as anonymous users. As a result, a
ce access local resources as ordinary users and access network resources by using the computer's identity. As a result, a service that runs as
on all computers that have joined the domain, including domain controllers.
ate other objects, such as files, the default owner is the Administrators group.
de. The Schema Admins group is authorized to make schema changes in Active Directory. By default, the only member of the group is the
ator Owners group is unlike other administrative groups (such as Administrators and Domain Admins). Objects that are created by member
utomatically.
cess Information.
deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers that are running RD Co
s group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used
populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be inc
-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.
SERVICES\ALL SERVICES. This SID was introduced in Windows Server 2008 R2.
MMS). This group requires the Create Symbolic Links right (SeCreateSymbolicLinkPrivilege) and the Log on as a Service right (SeServiceL
onsible for forest-level operations such as adding or removing new domains.
king, such access isn't anonymous, because the security principal is known even though unidentified people are using the account. IUSR_ C
with the SID for the security principal that's represented by the object.
nly member of the group is the Administrator account for the forest root domain.
cts that are created by members of these groups are owned by the group rather than by the individual.
ontroller, the Enterprise Admins group also is added to the Administrators group.
ate, manage, and delete local printers; and create and delete file shares.
e Directory except the Builtin container and the Domain Controllers OU. Account Operators don't have permission to modify the Administr
of the computer; and shut down the computer.
ervers that are running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this
Virtualization Host servers used in the deployment need to be in this group.
anagement service must be included in this group.
are using the account. IUSR_ ComputerName (or whatever you name the account) has a password, and IIS signs in to the account when the
Adversaries may use SID-History Injection to escalate privileges and bypass access controls. The Windows
security identifier (SID) is a unique value that identifies a user or group account. SIDs are used by Windows
security in both security descriptors and access tokens. [1] An account can hold additional SIDs in the SID-
History Active Directory attribute [2], allowing inter-operable account migration between domains (e.g., all
values in SID-History are included in access tokens).
With Domain Administrator (or equivalent) rights, harvested or well-known SID values [3] may be inserted into
SID-History to enable impersonation of arbitrary users/groups such as Enterprise Administrators. This
manipulation may result in elevated access to local resources and/or access to otherwise inaccessible domains
via lateral movement techniques such as Remote Services, SMB/Windows Admin Shares, or Windows Remote
Management.
S0002 Mimikatz
Mimikatz's MISC::AddSid module can append any SID or user/group account to a user's SID-History. Mimikatz
also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden
Tickets and DCSync beyond a single domain.
S0363 Empire
Monitor for changes to account management events on Domain Controllers for successful and failed changes to
SID-History. [10] [11]
DS0009 Process OS API Execution
Monitor for API calls, such as PowerShell's Get-ADUser cmdlet or Windows API DsAddSidHistory function, to
examine data in user’s SID-History attributes, especially users who have SID-History values from the same
domain.
DS0002 User Account User Account Metadata