The SDProp option provides the ability to report which accounts are protected by the SDProp\AdminSDHolder process.  It will show which group or group inheritance has resulted in the user account being included and which accounts have been orphaned by the process.  Some details on the process can be found here and  here.

NetTools will display the user objects that have the AdminCount set to 1 and associated group memberships that triggered the user to be in scope for the process.  The group membership of the account is shown horizontally, if the account is a member of multiple protected groups subsequent group memberships are shown on the next line, as is the case with the adm-test-ad user below. This option also provides the ability to reset user accounts, by enabling ACL inheritance and clearing the AdminCount attribute.  To reset all accounts, select the Reset AdminCount & ACL Inheritance option and clicking Go or by using the Reset ACL & AdminCount option from the context menu to reset one or more selected accounts.

One of the features\issues with the SDProp process is when a user is removed from a protected group the SDProp process will not longer manage the permissions for the object. Also when an object fails out of scope the process doesn't re-enable permission inheritance or reset the original permissions on the object, and as such the object is classed as orphaned, as delegated permissions may not work. In the screenshot below it shows two users, user1 and user2, User1 is a member of Domain Admins and Administrators, and as such the account will have the AdminSDHolder permissions enforced when the SDProp process is run, User2 on the other hand is not a member of any protected groups and the AdminSDHolder permissions will no longer be applied and it is now an orphaned object.

Once the permission inheritance has been reset, it is possible to trigger the SDProp process to run by clicking on the SDProp button.  This will query which domain controller holds the PDC role and sent the runProtectAdminGroupTask command to that DC.  Below is a LDAP Search favorite Update Query that is used to trigger the SDProp process, if run against the PDC of the domain, this uses the RunProtectAdminGroupsTask RootDSE Modify Operation.  The details are here

[Trigger SDProp]

Connection Profiles: when using connection profiles with elevated rights, you may receive an 'The user has insufficient access rights' error when triggering the SDProp process.  This is can be caused by the logic used to trigger the runProtectAdminGroupTask method. NetTools will query the AD to find the PDC of the domain and then connects to the PDC to execute the runProtectAdminGroupTask method, however, when the NetTools connects to the PDC it may not use the current connection profile and will execute the runProtectAdminGroupTask method using the permissions of the user that started NetTools.  As workaround for this issue use one of the following methods:

      • Use RunAs or start NetTools with a account that has the required permisions
      • Create a new Connection Profile with a profile name set to the FQDN of the PDC of the domain, with an account with elevated rights

ACL Browser

ACL Browser provides a quick and simple method to browse the permissions that are assigned to objects in the directory.  The ACL Browser is split into three sections:

Browser - This section provides the method to navigate the directory, clicking on an items in this pane will display the assigned permissions to that item. The Display OU and Containers options limits the displayed items to just these items, by deselecting this option the browser pane will display all the objects in the OU and containers.

ACE List - This pane lists the ACEs that have been assigned to the selected items, by default the Object Security tab is displayed showing the Discretionary Access Control List (DACL), however, depending on the item selected, the Mailbox, and Schema permissions will also be displayed.  For SACL to be displayed the Include SACL option must be selected, for these to be displayed Domain Admin rights are required.  If the Display SIDs option is selected an extra column is displayed with the SID of the trustee.

ACE - This pane displays the Access Control Entry based on the item selected in the ACE List pane.  The list of permissions is dynamic based on the item selected, but the standard full/read/write/create/delete permissions are displayed for all items.  When the Show ACL\ACE flags options is selected the ACE view will display the raw ACL and ACE flags associated to the selected item in the ACE List pane, rather than the graphical view. When an Object Specific ACE is selected the name of the object type which the permissions are associated to is displayed above the ACE pane.  In the example below the object type is User.

Clear Local Cache - ACL Browser uses a local cache for extended permission GUIDs and SIDs.  As the results are retrieved from the server they are cached to improve the performance when viewing permissions.  When changing to a new location and Refresh pressed, if the forest\domain is the same then the cache is maintained, if the forest\domain is changed, the cache is purged, the cache will also be cleared if the Clear Local Cache option is selected.  This cache is shared with the GPO Explorer security tab.

Trustee Mode - ACL Browser has a Trustee mode, which allows a trustee (user\group\computer etc.) to be selected and then only the ACE that apply to the trustee are displayed.  The icons in the ACE List pane will have a green dot to indicate that the corresponding ACE applies to the selected trustee.  These are the effective rights for the selected trustee.

To Select the Trustee click on the Trustee button and the Trustee Information dialog will be displayed, this dialog shows the select trustee and the constructed access token is displayed.  To select the trustee click on the Select button.  

The Select Trustee dialog, allows you to specify the trustee and the connection method for the trustee, is used to construct the trustee's Access Token. Once the Trustee is selected, the Add and Remove buttons can be used to update the SIDs that are included in the constructed access token. This allow you to add groups or security principals to the token to see what impact this has on the trustee access rights.

ACL Browser
ACL Browser - Flags