windows 2008 R2 TS printer security - can't take owership Announcing the arrival of Valued Associate #679: Cesar Manara Planned maintenance scheduled April 23, 2019 at 23:30 UTC (7:30pm US/Eastern) Come Celebrate our 10 Year Anniversary!Printing on Remote Desktop sessionWindows networked printers freeze on PDFMacs not printing to new printer via Windows 2008 R2 Print ServerOur security auditor is an idiot. How do I give him the information he wants?Some windows 7 machines are showing driver update required for most printers?Print jobs not being deleted from spoolerHow to turn off notifications about toner lowToo Many Printer Redirection Ports on Windows 2008 R2Group Policy Preferences Printers: Server 2008R2 Error 0x80070bc4 does not set default printer after a printer has been createdNetwork printer becomes inaccessable randomly in 2012 R2 RDS sessionsPrinter mapping via GPO under Win10
What helicopter has the most rotor blades?
How to get a single big right brace?
Short story about an alien named Ushtu(?) coming from a future Earth, when ours was destroyed by a nuclear explosion
Kepler's 3rd law: ratios don't fit data
Why not use the yoke to control yaw, as well as pitch and roll?
What is the definining line between a helicopter and a drone a person can ride in?
Etymology of 見舞い
Are bags of holding fireproof?
Why did Europeans not widely domesticate foxes?
Can a Knight grant Knighthood to another?
Trying to enter the Fox's den
Pointing to problems without suggesting solutions
When speaking, how do you change your mind mid-sentence?
Unix AIX passing variable and arguments to expect and spawn
Why is ArcGIS Pro not symbolizing my entire range of values?
Raising a bilingual kid. When should we introduce the majority language?
Can a Wizard take the Magic Initiate feat and select spells from the Wizard list?
Can this water damage be explained by lack of gutters and grading issues?
false 'Security alert' from Google - every login generates mails from 'no-reply@accounts.google.com'
What were wait-states, and why was it only an issue for PCs?
A journey... into the MIND
Marquee sign letters
What is the evidence that custom checks in Northern Ireland are going to result in violence?
What is the difference between 准时 and 按时?
windows 2008 R2 TS printer security - can't take owership
Announcing the arrival of Valued Associate #679: Cesar Manara
Planned maintenance scheduled April 23, 2019 at 23:30 UTC (7:30pm US/Eastern)
Come Celebrate our 10 Year Anniversary!Printing on Remote Desktop sessionWindows networked printers freeze on PDFMacs not printing to new printer via Windows 2008 R2 Print ServerOur security auditor is an idiot. How do I give him the information he wants?Some windows 7 machines are showing driver update required for most printers?Print jobs not being deleted from spoolerHow to turn off notifications about toner lowToo Many Printer Redirection Ports on Windows 2008 R2Group Policy Preferences Printers: Server 2008R2 Error 0x80070bc4 does not set default printer after a printer has been createdNetwork printer becomes inaccessable randomly in 2012 R2 RDS sessionsPrinter mapping via GPO under Win10
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I have a Windows 2008 R2 server with Terminal server role installed. I'm seeing a problem with an ordinary user who is member of local printer operators group on the server.
If the user opens a cmd window using ‘run as administrator’ they can run printmanager.msc without needing to enter their password again. In printmanager they can change the ownership of redirected (easy print) printers without problems.
If, from the same cmd window, they use subinacl to try and change the onwership of the queue to themselves they get access denied:
>subinacl.exe /printer "_#MyPrinter (2 redirected)" /setowner="MyDomMyUsr"
Elapsed Time: 00 00:00:00
Done: 1, Modified 0, Failed 1, Syntax errors 0
Last Done : _#MyPrinter (2 redirected)
Last Failed: _#MyPrinter (2 redirected) - OpenPrinter Error : 5 Access denied
so, same context, same action but one works and one doesn't. Any ideas for this odd behaviour?
I'm using subinacl x86 on an x64 server as I can't find anything more up to date. I've tried with icacls and others but couldn't get them to do anything with printers.
EDIT: added after Gregs comments regarding setacl below
If I log into the TS server as Testusr and open Admin Tools > Printer Admin (as administrator) and then type mydomaintestusr and the testusr's password, then I can change the ownership of the printer queue and set testusr as the owner.
However if I open cmd as administrator and, again, type mydomaintestusr and the users password when I try to change the ownership of my redirected printer I get the following:
C:>setacl -on "Bullzip PDF Printer (12 redireccionado)" -ot prn -actn setowner -ownr n:mydomtestusr
WARNING: Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted.
WARNING: Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted.
INFORMATION: Processing ACL of: <Bullzip PDF Printer (12 redireccionado)>
ERROR: Enabling the privilege SeTakeOwnershipPrivilege failed with: No todos los privilegios o grupos a los que se hace referencia son asignados al llamador.
[meaning not all referenced privs or groups are assigned to the caller]
SetACL finished with error(s):
SetACL error message: A privilege could not be enabled
maybe I'm getting something wrong but if the built in windows tool can do it with just membership of the 'print operators' group then setacl should be able to as well, no?
However setacl seems to depend on other privileges, which in reality are not required to do this.
security windows-server-2008-r2 printing windows-terminal-services
add a comment |
I have a Windows 2008 R2 server with Terminal server role installed. I'm seeing a problem with an ordinary user who is member of local printer operators group on the server.
If the user opens a cmd window using ‘run as administrator’ they can run printmanager.msc without needing to enter their password again. In printmanager they can change the ownership of redirected (easy print) printers without problems.
If, from the same cmd window, they use subinacl to try and change the onwership of the queue to themselves they get access denied:
>subinacl.exe /printer "_#MyPrinter (2 redirected)" /setowner="MyDomMyUsr"
Elapsed Time: 00 00:00:00
Done: 1, Modified 0, Failed 1, Syntax errors 0
Last Done : _#MyPrinter (2 redirected)
Last Failed: _#MyPrinter (2 redirected) - OpenPrinter Error : 5 Access denied
so, same context, same action but one works and one doesn't. Any ideas for this odd behaviour?
I'm using subinacl x86 on an x64 server as I can't find anything more up to date. I've tried with icacls and others but couldn't get them to do anything with printers.
EDIT: added after Gregs comments regarding setacl below
If I log into the TS server as Testusr and open Admin Tools > Printer Admin (as administrator) and then type mydomaintestusr and the testusr's password, then I can change the ownership of the printer queue and set testusr as the owner.
However if I open cmd as administrator and, again, type mydomaintestusr and the users password when I try to change the ownership of my redirected printer I get the following:
C:>setacl -on "Bullzip PDF Printer (12 redireccionado)" -ot prn -actn setowner -ownr n:mydomtestusr
WARNING: Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted.
WARNING: Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted.
INFORMATION: Processing ACL of: <Bullzip PDF Printer (12 redireccionado)>
ERROR: Enabling the privilege SeTakeOwnershipPrivilege failed with: No todos los privilegios o grupos a los que se hace referencia son asignados al llamador.
[meaning not all referenced privs or groups are assigned to the caller]
SetACL finished with error(s):
SetACL error message: A privilege could not be enabled
maybe I'm getting something wrong but if the built in windows tool can do it with just membership of the 'print operators' group then setacl should be able to as well, no?
However setacl seems to depend on other privileges, which in reality are not required to do this.
security windows-server-2008-r2 printing windows-terminal-services
add a comment |
I have a Windows 2008 R2 server with Terminal server role installed. I'm seeing a problem with an ordinary user who is member of local printer operators group on the server.
If the user opens a cmd window using ‘run as administrator’ they can run printmanager.msc without needing to enter their password again. In printmanager they can change the ownership of redirected (easy print) printers without problems.
If, from the same cmd window, they use subinacl to try and change the onwership of the queue to themselves they get access denied:
>subinacl.exe /printer "_#MyPrinter (2 redirected)" /setowner="MyDomMyUsr"
Elapsed Time: 00 00:00:00
Done: 1, Modified 0, Failed 1, Syntax errors 0
Last Done : _#MyPrinter (2 redirected)
Last Failed: _#MyPrinter (2 redirected) - OpenPrinter Error : 5 Access denied
so, same context, same action but one works and one doesn't. Any ideas for this odd behaviour?
I'm using subinacl x86 on an x64 server as I can't find anything more up to date. I've tried with icacls and others but couldn't get them to do anything with printers.
EDIT: added after Gregs comments regarding setacl below
If I log into the TS server as Testusr and open Admin Tools > Printer Admin (as administrator) and then type mydomaintestusr and the testusr's password, then I can change the ownership of the printer queue and set testusr as the owner.
However if I open cmd as administrator and, again, type mydomaintestusr and the users password when I try to change the ownership of my redirected printer I get the following:
C:>setacl -on "Bullzip PDF Printer (12 redireccionado)" -ot prn -actn setowner -ownr n:mydomtestusr
WARNING: Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted.
WARNING: Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted.
INFORMATION: Processing ACL of: <Bullzip PDF Printer (12 redireccionado)>
ERROR: Enabling the privilege SeTakeOwnershipPrivilege failed with: No todos los privilegios o grupos a los que se hace referencia son asignados al llamador.
[meaning not all referenced privs or groups are assigned to the caller]
SetACL finished with error(s):
SetACL error message: A privilege could not be enabled
maybe I'm getting something wrong but if the built in windows tool can do it with just membership of the 'print operators' group then setacl should be able to as well, no?
However setacl seems to depend on other privileges, which in reality are not required to do this.
security windows-server-2008-r2 printing windows-terminal-services
I have a Windows 2008 R2 server with Terminal server role installed. I'm seeing a problem with an ordinary user who is member of local printer operators group on the server.
If the user opens a cmd window using ‘run as administrator’ they can run printmanager.msc without needing to enter their password again. In printmanager they can change the ownership of redirected (easy print) printers without problems.
If, from the same cmd window, they use subinacl to try and change the onwership of the queue to themselves they get access denied:
>subinacl.exe /printer "_#MyPrinter (2 redirected)" /setowner="MyDomMyUsr"
Elapsed Time: 00 00:00:00
Done: 1, Modified 0, Failed 1, Syntax errors 0
Last Done : _#MyPrinter (2 redirected)
Last Failed: _#MyPrinter (2 redirected) - OpenPrinter Error : 5 Access denied
so, same context, same action but one works and one doesn't. Any ideas for this odd behaviour?
I'm using subinacl x86 on an x64 server as I can't find anything more up to date. I've tried with icacls and others but couldn't get them to do anything with printers.
EDIT: added after Gregs comments regarding setacl below
If I log into the TS server as Testusr and open Admin Tools > Printer Admin (as administrator) and then type mydomaintestusr and the testusr's password, then I can change the ownership of the printer queue and set testusr as the owner.
However if I open cmd as administrator and, again, type mydomaintestusr and the users password when I try to change the ownership of my redirected printer I get the following:
C:>setacl -on "Bullzip PDF Printer (12 redireccionado)" -ot prn -actn setowner -ownr n:mydomtestusr
WARNING: Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted.
WARNING: Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted.
INFORMATION: Processing ACL of: <Bullzip PDF Printer (12 redireccionado)>
ERROR: Enabling the privilege SeTakeOwnershipPrivilege failed with: No todos los privilegios o grupos a los que se hace referencia son asignados al llamador.
[meaning not all referenced privs or groups are assigned to the caller]
SetACL finished with error(s):
SetACL error message: A privilege could not be enabled
maybe I'm getting something wrong but if the built in windows tool can do it with just membership of the 'print operators' group then setacl should be able to as well, no?
However setacl seems to depend on other privileges, which in reality are not required to do this.
security windows-server-2008-r2 printing windows-terminal-services
security windows-server-2008-r2 printing windows-terminal-services
edited Apr 15 '11 at 16:52
Ian Murphy
asked Jan 12 '11 at 18:01
Ian MurphyIan Murphy
90231627
90231627
add a comment |
add a comment |
2 Answers
2
active
oldest
votes
Maybe you can set the security with the setprinter tool (setprinter -examples 3).SetPrinter is for 2003 but also works on 2008 R2.
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
add a comment |
Windows normally will not users to change ownership of any object to anything other than Administrators (or themselves if they have the take ownership permission on the object), unless they are an Administrator or they have some special Windows User Rights (which you should not confer).
I would speculate that the seven year old x86 version of subinacl.exe is not working correctly with the security token in the elevated process.
A couple of suggestions:
Try using the updated version of subinacl, 5.2.3790.1180, available at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b
Try using the free SetAcl.exe utility. This is the swiss-army kitchen sink of permissions management tools, and includes an x64 build. This is an active project and includes many features lacking in the Microsoft utilities.
http://helgeklein.com/setacl/
Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
http://helgeklein.com/setacl/examples/managing-printer-service-and-share-permissions-with-setacl-exe/
Example usage:
setacl -on "Printer Name" -ot prn -actn setowner -ownr n:domainNetbiosNameuserName
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
add a comment |
Your Answer
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f221682%2fwindows-2008-r2-ts-printer-security-cant-take-owership%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
Maybe you can set the security with the setprinter tool (setprinter -examples 3).SetPrinter is for 2003 but also works on 2008 R2.
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
add a comment |
Maybe you can set the security with the setprinter tool (setprinter -examples 3).SetPrinter is for 2003 but also works on 2008 R2.
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
add a comment |
Maybe you can set the security with the setprinter tool (setprinter -examples 3).SetPrinter is for 2003 but also works on 2008 R2.
Maybe you can set the security with the setprinter tool (setprinter -examples 3).SetPrinter is for 2003 but also works on 2008 R2.
answered Apr 9 '11 at 15:36
Guido van BrakelGuido van Brakel
914510
914510
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
add a comment |
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
Already tried it. No luck.
– Ian Murphy
Apr 11 '11 at 8:21
add a comment |
Windows normally will not users to change ownership of any object to anything other than Administrators (or themselves if they have the take ownership permission on the object), unless they are an Administrator or they have some special Windows User Rights (which you should not confer).
I would speculate that the seven year old x86 version of subinacl.exe is not working correctly with the security token in the elevated process.
A couple of suggestions:
Try using the updated version of subinacl, 5.2.3790.1180, available at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b
Try using the free SetAcl.exe utility. This is the swiss-army kitchen sink of permissions management tools, and includes an x64 build. This is an active project and includes many features lacking in the Microsoft utilities.
http://helgeklein.com/setacl/
Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
http://helgeklein.com/setacl/examples/managing-printer-service-and-share-permissions-with-setacl-exe/
Example usage:
setacl -on "Printer Name" -ot prn -actn setowner -ownr n:domainNetbiosNameuserName
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
add a comment |
Windows normally will not users to change ownership of any object to anything other than Administrators (or themselves if they have the take ownership permission on the object), unless they are an Administrator or they have some special Windows User Rights (which you should not confer).
I would speculate that the seven year old x86 version of subinacl.exe is not working correctly with the security token in the elevated process.
A couple of suggestions:
Try using the updated version of subinacl, 5.2.3790.1180, available at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b
Try using the free SetAcl.exe utility. This is the swiss-army kitchen sink of permissions management tools, and includes an x64 build. This is an active project and includes many features lacking in the Microsoft utilities.
http://helgeklein.com/setacl/
Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
http://helgeklein.com/setacl/examples/managing-printer-service-and-share-permissions-with-setacl-exe/
Example usage:
setacl -on "Printer Name" -ot prn -actn setowner -ownr n:domainNetbiosNameuserName
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
add a comment |
Windows normally will not users to change ownership of any object to anything other than Administrators (or themselves if they have the take ownership permission on the object), unless they are an Administrator or they have some special Windows User Rights (which you should not confer).
I would speculate that the seven year old x86 version of subinacl.exe is not working correctly with the security token in the elevated process.
A couple of suggestions:
Try using the updated version of subinacl, 5.2.3790.1180, available at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b
Try using the free SetAcl.exe utility. This is the swiss-army kitchen sink of permissions management tools, and includes an x64 build. This is an active project and includes many features lacking in the Microsoft utilities.
http://helgeklein.com/setacl/
Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
http://helgeklein.com/setacl/examples/managing-printer-service-and-share-permissions-with-setacl-exe/
Example usage:
setacl -on "Printer Name" -ot prn -actn setowner -ownr n:domainNetbiosNameuserName
Windows normally will not users to change ownership of any object to anything other than Administrators (or themselves if they have the take ownership permission on the object), unless they are an Administrator or they have some special Windows User Rights (which you should not confer).
I would speculate that the seven year old x86 version of subinacl.exe is not working correctly with the security token in the elevated process.
A couple of suggestions:
Try using the updated version of subinacl, 5.2.3790.1180, available at:
http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b
Try using the free SetAcl.exe utility. This is the swiss-army kitchen sink of permissions management tools, and includes an x64 build. This is an active project and includes many features lacking in the Microsoft utilities.
http://helgeklein.com/setacl/
Documentation:
http://helgeklein.com/setacl/documentation/command-line-version-setacl-exe/
http://helgeklein.com/setacl/examples/managing-printer-service-and-share-permissions-with-setacl-exe/
Example usage:
setacl -on "Printer Name" -ot prn -actn setowner -ownr n:domainNetbiosNameuserName
edited Apr 11 '11 at 11:30
answered Apr 9 '11 at 18:54
Greg AskewGreg Askew
29.2k33768
29.2k33768
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
add a comment |
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
I thought I had been using the latest version of subinacl, but its possible that I wasn't. I'll give it a try. SetACL doesn't work on printers. I get the impression that printer queues have a different acl model to the rest of windows resources. Even using the win32 api I haven't managed to modify the security. I'd sort of abandoned this problem but I'll have to attack it again soon.
– Ian Murphy
Apr 11 '11 at 8:21
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
Actually SetAcl does support printers. I added a sample to the answer to show how.
– Greg Askew
Apr 11 '11 at 11:31
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
just added an edit regarding setacl. I had tried it but I had an older version, so I've tried it again with the latest - no luck.
– Ian Murphy
Apr 15 '11 at 16:53
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
Just been looking through the setacl forum on sourceforge and I found a posting I made several months ago regarding this problem. There was never any response to my posting
– Ian Murphy
Apr 15 '11 at 17:03
add a comment |
Thanks for contributing an answer to Server Fault!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f221682%2fwindows-2008-r2-ts-printer-security-cant-take-owership%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown