Code Field Name Description
S-1-0 Well-known Security Identifiers (SIDs) Null Authority An identifier authority
S-1-0-0 Well-known Security Identifiers (SIDs) Nobody No security principal
S-1-1 Well-known Security Identifiers (SIDs) World Authority An identifier authority
S-1-1-0 Well-known Security Identifiers (SIDs) Everyone A group that includes all users, even anonymous users and guests. Membership is controlled by the operating system.
S-1-2 Well-known Security Identifiers (SIDs) Local Authority An identifier authority
S-1-2-0 Well-known Security Identifiers (SIDs) Local A group that includes all users who have logged on locally
S-1-2-1 Well-known Security Identifiers (SIDs) Console Logon A group that includes users who are logged on to the physical console
S-1-3 Well-known Security Identifiers (SIDs) Creator Authority An identifier authority
S-1-3-0 Well-known Security Identifiers (SIDs) Creator Owner A placeholder in an inheritable access control entry (ACE). When the ACE is inherited, the system replaces this SID with the SID for the object's creator.
S-1-3-1 Well-known Security Identifiers (SIDs) Creator Group A placeholder in an inheritable ACE. When the ACE is inherited, the system replaces this SID with the SID for the primary group of the object's creator. The primary group is used only by the POSIX subsystem.
S-1-3-2 Well-known Security Identifiers (SIDs) Creator Owner Server This SID is not used in Windows 2000.
S-1-3-3 Well-known Security Identifiers (SIDs) Creator Group Server This SID is not used in Windows 2000.
S-1-3-4 Well-known Security Identifiers (SIDs) Owner Rights A group that represents the current owner of the object. When an ACE that carries this SID is applied to an object, the system ignores the implicit READ_CONTROL and WRITE_DAC permissions for the object owner.
S-1-5-80-0 Well-known Security Identifiers (SIDs) All Services A group that includes all service processes configured on the system. Membership is controlled by the operating system.
S-1-4 Well-known Security Identifiers (SIDs) Non-unique Authority An identifier authority.
S-1-5 Well-known Security Identifiers (SIDs) NT Authorityc NT Authority
S-1-5-1 Well-known Security Identifiers (SIDs) Dialup A group that includes all users who have logged on through a dial-up connection. Membership is controlled by the operating system.
S-1-5-2c Well-known Security Identifiers (SIDs) S-1-5-2 A group that includes all users that have logged on through a network connection. Membership is controlled by the operating system.
S-1-5-3 Well-known Security Identifiers (SIDs) Batch A group that includes all users that have logged on through a batch queue facility. Membership is controlled by the operating system.
S-1-5-4 Well-known Security Identifiers (SIDs) Interactive A group that includes all users that have logged on interactively. Membership is controlled by the operating system.
S-1-5-5-X-Y Well-known Security Identifiers (SIDs) Logon Session A logon session. The X and Y values for these SIDs are different for each session.
S-1-5-6 Well-known Security Identifiers (SIDs) Service A group that includes all security principals that have logged on as a service. Membership is controlled by the operating system.
S-1-5-7 Well-known Security Identifiers (SIDs) Anonymous A group that includes all users that have logged on anonymously. Membership is controlled by the operating system.
Well-known Security Identifiers (SIDs)
S-1-5-8 Well-known Security Identifiers (SIDs) Proxy This SID is not used in Windows 2000.
S-1-5-9 Well-known Security Identifiers (SIDs) Enterprise Domain Controllers A group that includes all domain controllers in a forest that uses an Active Directory directory service. Membership is controlled by the operating system.
S-1-5-10 Well-known Security Identifiers (SIDs) Principal Self A placeholder in an inheritable ACE on an account object or group object in Active Directory. When the ACE is inherited, the system replaces this SID with the SID for the security principal who holds the account.
S-1-5-11 Well-known Security Identifiers (SIDs) Authenticated Users A group that includes all users whose identities were authenticated when they logged on. Membership is controlled by the operating system.
S-1-5-12 Well-known Security Identifiers (SIDs) Restricted Code This SID is reserved for future use.
S-1-5-13 Well-known Security Identifiers (SIDs) Terminal Server Users A group that includes all users that have logged on to a Terminal Services server. Membership is controlled by the operating system.
S-1-5-14 Well-known Security Identifiers (SIDs) Remote Interactive Logon A group that includes all users who have logged on through a terminal services logon.
S-1-5-15 Well-known Security Identifiers (SIDs) This Organization A group that includes all users from the same organization. Only included with AD accounts and only added by a Windows Server 2003 or later domain controller.
S-1-5-17 Well-known Security Identifiers (SIDs) This Organization An account that is used by the default Internet Information Services (IIS) user.
S-1-5-18 Well-known Security Identifiers (SIDs) Local System A service account that is used by the operating system.
S-1-5-19 Well-known Security Identifiers (SIDs) NT Authority Local Service
S-1-5-20 Well-known Security Identifiers (SIDs) NT Authority Network Service
S-1-5-21domain-500 Well-known Security Identifiers (SIDs) Administrator A user account for the system administrator. By default, it is the only user account that is given full control over the system.
S-1-5-21domain-501 Well-known Security Identifiers (SIDs) Guest A user account for people who do not have individual accounts. This user account does not require a password. By default, the Guest account is disabled.
S-1-5-21domain-502 Well-known Security Identifiers (SIDs) KRBTGT A service account that is used by the Key Distribution Center (KDC) service.
S-1-5-21domain-512 Well-known Security Identifiers (SIDs) Domain Admins A global group whose members are authorized to administer the domain. By default, the Domain Admins group is a member of the Administrators group on all computers that have joined a domain, including the domain controllers. Domain Admins is the default owner of any object that is created by any member of the group.
S-1-5-21domain-513 Well-known Security Identifiers (SIDs) Domain Users A global group that, by default, includes all user accounts in a domain. When you create a user account in a domain, it is added to this group by default.
S-1-5-21domain-514 Well-known Security Identifiers (SIDs) Domain Guests A global group that, by default, has only one member, the domain's built-in Guest account.
S-1-5-21domain-515 Well-known Security Identifiers (SIDs) Domain Computers A global group that includes all clients and servers that have joined the domain.
S-1-5-21domain-516 Well-known Security Identifiers (SIDs) Domain Controllers A global group that includes all domain controllers in the domain. New domain controllers are added to this group by default.
S-1-5-21domain-517 Well-known Security Identifiers (SIDs) Cert Publishers A global group that includes all computers that are running an enterprise certification authority. Cert Publishers are authorized to publish certificates for User objects in Active Directory.
S-1-5-21root domain-518 Well-known Security Identifiers (SIDs) Schema Admins A universal group in a native-mode domain; a global group in a mixed-mode domain. The group is authorized to make schema changes in Active Directory. By default, the only member of the group is the Administrator account for the forest root domain.
S-1-5-21root domain-519 Well-known Security Identifiers (SIDs) Enterprise Admins A universal group in a native-mode domain; a global group in a mixed-mode domain. The group is authorized to make forest-wide changes in Active Directory, such as adding child domains. By default, the only member of the group is the Administrator account for the forest root domain.
S-1-5-21domain-520 Well-known Security Identifiers (SIDs) Group Policy Creator Owners A global group that is authorized to create new Group Policy objects in Active Directory. By default, the only member of the group is Administrator.
S-1-5-21domain-526 Well-known Security Identifiers (SIDs) Key Admins A security group. The intention for this group is to have delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted administrators should be made a member of this group.
S-1-5-21domain-527 Well-known Security Identifiers (SIDs) Enterprise Key Admins A security group. The intention for this group is to have delegated write access on the msdsKeyCredentialLink attribute only. The group is intended for use in scenarios where trusted external authorities (for example, Active Directory Federated Services) are responsible for modifying this attribute. Only trusted administrators should be made a member of this group.
S-1-5-21domain-553 Well-known Security Identifiers (SIDs) RAS and IAS Servers A domain local group. By default, this group has no members. Servers in this group have Read Account Restrictions and Read Logon Information access to User objects in the Active Directory domain local group.
S-1-5-32-544 Well-known Security Identifiers (SIDs) Administrators A built-in group. After the initial installation of the operating system, the only member of the group is the Administrator account. When a computer joins a domain, the Domain Admins group is added to the Administrators group. When a server becomes a domain controller, the Enterprise Admins group also is added to the Administrators group.
S-1-5-32-545 Well-known Security Identifiers (SIDs) Users A built-in group. After the initial installation of the operating system, the only member is the Authenticated Users group. When a computer joins a domain, the Domain Users group is added to the Users group on the computer.
S-1-5-32-546 Well-known Security Identifiers (SIDs) Guests A built-in group. By default, the only member is the Guest account. The Guests group allows occasional or one-time users to log on with limited privileges to a computer's built-in Guest account.
S-1-5-32-547 Well-known Security Identifiers (SIDs) Power Users A built-in group. By default, the group has no members. Power users can create local users and groups; modify and delete accounts that they have created; and remove users from the Power Users, Users, and Guests groups. Power users also can install programs; create, manage, and delete local printers; and create and delete file shares.
S-1-5-32-548 Well-known Security Identifiers (SIDs) Account Operators A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.
S-1-5-32-549 Well-known Security Identifiers (SIDs) Server Operators A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.
S-1-5-32-550 Well-known Security Identifiers (SIDs) Print Operators A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues.
S-1-5-32-551 Well-known Security Identifiers (SIDs) Backup Operators A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.
S-1-5-32-552 Well-known Security Identifiers (SIDs) Replicators A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.
S-1-5-64-10 Well-known Security Identifiers (SIDs) NTLM Authentication A SID that is used when the NTLM authentication package authenticated the client
S-1-5-64-14 Well-known Security Identifiers (SIDs) SChannel Authentication A SID that is used when the SChannel authentication package authenticated the client.
S-1-5-64-21 Well-known Security Identifiers (SIDs) Digest Authentication A SID that is used when the Digest authentication package authenticated the client.
S-1-5-80 Well-known Security Identifiers (SIDs) NT Service An NT Service account prefix
S-1-5-80-0 Well-known Security Identifiers (SIDs) All Services A group that includes all service processes that are configured on the system. Membership is controlled by the operating system.
S-1-5-83-0 Well-known Security Identifiers (SIDs) NT VIRTUAL MACHINE\Virtual Machines A built-in group. The group is created when the Hyper-V role is installed. Membership in the group is maintained by the Hyper-V Management Service (VMMS). This group requires the "Create Symbolic Links" right (SeCreateSymbolicLinkPrivilege), and also the "Log on as a Service" right (SeServiceLogonRight).
S-1-16-0 Well-known Security Identifiers (SIDs) Untrusted Mandatory Level An untrusted integrity level. Note Added in Windows Vista and Windows Server 2008
S-1-16-4096 Well-known Security Identifiers (SIDs) Low Mandatory Level A low integrity level.
S-1-16-8192 Well-known Security Identifiers (SIDs) Medium Mandatory Level A medium integrity level.
S-1-16-8448 Well-known Security Identifiers (SIDs) Medium Plus Mandatory Level A medium plus integrity level.
S-1-16-12288 Well-known Security Identifiers (SIDs) High Mandatory Level A high integrity level.
S-1-16-16384 Well-known Security Identifiers (SIDs) System Mandatory Level A system integrity level.
S-1-16-20480 Well-known Security Identifiers (SIDs) Protected Process Mandatory Level A protected-process integrity level.
S-1-16-28672 Well-known Security Identifiers (SIDs) Secure Process Mandatory Level A secure process integrity level.
S-1-5-32-554 Well-known Security Identifiers (SIDs) BUILTIN\Pre-Windows 2000 Compatible Access An alias added by Windows 2000. A backward compatibility group which allows read access on all users and groups in the domain.
S-1-5-32-555 Well-known Security Identifiers (SIDs) BUILTIN\Remote Desktop Users An alias. Members in this group are granted the right to logon remotely.
S-1-5-32-556 Well-known Security Identifiers (SIDs) BUILTIN\Network Configuration Operators An alias. Members in this group can have some administrative privileges to manage configuration of networking features.
S-1-5-32-557 Well-known Security Identifiers (SIDs) BUILTIN\Incoming Forest Trust Builders An alias. Members of this group can create incoming, one-way trusts to this forest.
S-1-5-32-558 Well-known Security Identifiers (SIDs) BUILTIN\Performance Monitor Users An alias. Members of this group have remote access to monitor this computer.
S-1-5-32-559 Well-known Security Identifiers (SIDs) BUILTIN\Performance Log Users An alias. Members of this group have remote access to schedule logging of performance counters on this computer.
S-1-5-32-560 Well-known Security Identifiers (SIDs) BUILTIN\Windows Authorization Access Group An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.
S-1-5-32-561 Well-known Security Identifiers (SIDs) BUILTIN\Terminal Server License Servers An alias. A group for Terminal Server License Servers. When Windows Server 2003 Service Pack 1 is installed, a new local group is created.
S-1-5-32-562 Well-known Security Identifiers (SIDs) BUILTIN\Distributed COM Users An alias. A group for COM to provide computerwide access controls that govern access to all call, activation, or launch requests on the computer.
S-1-5- 21domain -498 Well-known Security Identifiers (SIDs) Enterprise Read-only Domain Controllers A Universal group. Members of this group are Read-Only Domain Controllers in the enterprise
S-1-5- 21domain -521 Well-known Security Identifiers (SIDs) Read-only Domain Controllers A Global group. Members of this group are Read-Only Domain Controllers in the domain
S-1-5-32-569 Well-known Security Identifiers (SIDs) BUILTIN\Cryptographic Operators A Builtin Local group. Members are authorized to perform cryptographic operations.
S-1-5-21 domain -571 Well-known Security Identifiers (SIDs) Allowed RODC Password Replication Group A Domain Local group. Members in this group can have their passwords replicated to all read-only domain controllers in the domain.
S-1-5- 21 domain -572 Well-known Security Identifiers (SIDs) Denied RODC Password Replication Group A Domain Local group. Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain
S-1-5-32-573 Well-known Security Identifiers (SIDs) BUILTIN\Event Log Readers A Builtin Local group. Members of this group can read event logs from local machine.
S-1-5-32-574 Well-known Security Identifiers (SIDs) BUILTIN\Certificate Service DCOM Access A Builtin Local group. Members of this group are allowed to connect to Certification Authorities in the enterprise.
S-1-5-21-domain-522 Well-known Security Identifiers (SIDs) Cloneable Domain Controllers A Global group. Members of this group that are domain controllers may be cloned.
S-1-5-32-575 Well-known Security Identifiers (SIDs) BUILTIN\RDS Remote Access Servers A Builtin Local group. Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.
S-1-5-32-576 Well-known Security Identifiers (SIDs) BUILTIN\RDS Endpoint Servers A Builtin Local group. Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.
S-1-5-32-577 Well-known Security Identifiers (SIDs) BUILTIN\RDS Management Servers A Builtin Local group. Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.
S-1-5-32-578 Well-known Security Identifiers (SIDs) BUILTIN\Hyper-V Administrators A Builtin Local group. Members of this group have complete and unrestricted access to all features of Hyper-V.
S-1-5-32-579 Well-known Security Identifiers (SIDs) BUILTIN\Access Control Assistance Operators A Builtin Local group. Members of this group can remotely query authorization attributes and permissions for resources on this computer.
S-1-5-32-580 Well-known Security Identifiers (SIDs) BUILTIN\Remote Management Users A Builtin Local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.



More Information

Active Directory Access Codes and Rights AttributeSyntaxOID File System Objects Access Rights ImpersonationLevel Integrity Level Labels for Groups and Accounts Internet Protocol Numbers Kerberos Encryption Types Logon Rights LogonType Mandatory / Integrity Label Netlogon Error Codes Object Types PreAuthType Privileges SecurityPackages TGT/TGS Issue Error Codes Well-known Security Identifiers (SIDs) Windows