Skip to main content

How to check your SID's for Windows server

For an IT Professional it is quite common to have a virtual LAB environment and it is also common to face issue related to similar SID (Security Identifier) on multiple VMs on the network.
Earlier there was a tool NewSID was being used to overcome from this problem but that’s been retired and not being supported by Microsoft anymore. The recommended way is to use “SysPrep” to change SID of any windows operating system.
Before proceeding with “SysPrep”, it’s better to understand how to check SID!! There is a free tool can be downloaded from sysinternal called PsGetSID, I’ll show how easily one can check machine’s SID.
For installation just copy PsGetsid.exe on executable path and follow the underneath steps

1.       I’ve already downloaded the tool and kept in under C:\ (It’s not mandatory to keep the file in C drive)




   2.   Open Command prompt and navigate to the location where the tool kept (in our case it is C drive) and type “psgetsid <COMPUTERNAME>” in case of local computer else type psgetsid \\<COMPUTERNAME>” in case of remote computer on network.


   
   3.       Detailed syntax for usage:

  psgetsid [\\computer[,computer[,...] | @file] [-u username [-p password]]] [account|SID]
-u
Specifies optional user name for login to remote computer.
-p
Specifies optional password for user name. If you omit this you will be prompted to enter a hidden password.
Account
PsGetSid will report the SID for the specified user account rather than the computer.
SID
PsGetSid will report the account for the specified SID.
Computer
Direct PsGetSid to perform the command on the remote computer or computers specified. If you omit the computer name PsGetSid runs the command on the local system, and if you specify a wildcard (\\*), PsGetSid runs the command on all computers in the current domain.
@file
PsGetSid will execute the command on each of the computers listed in the file.

If you want to see a computer's SID just pass the computer's name as a command-line argument. If you want to see a user's SID, name the account (e.g. "administrator") on the command-line and an optional computer name.
Specify a user name if the account you are running from doesn't have administrative privileges on the computer you want to query. If you don't specify a password as an option, PsGetSid will prompt you for one so that you can type it in without having it echoed to the display.

Comments

Popular posts from this blog

About Hari Shanker

Thanks for visiting my site! My name is Hari Shanker, this is my weblog about various technical subjects. cloud computing and the occasional personal topics too. PROFESSIONAL INFORMATION I’ve been in the Information Technology field for more than 16 years, starting out with desktop support. Along the way, I worked as a systems administrator, Active Directory Specialist, Azure Specialist. Most recently, I was the Solution architect for Microsoft Azure at Rackspace. Currently, I work for Cognizant as a Principal Architect for Cloud Transformation & Solutioning. PERSONAL INFORMATION I live with my parents in the New Delhi area. Much of my time remains busy in my office and activities on various technical forums. During my leisure time, I love to spend time with Family & Friends and spend holidays on Hill stations. DISCLAIMER Any views or opinions expressed here are strictly my own. I am a blogger who works for an organization/company, I am not an organiz...

LDIFDE (LDAP Data Interchange Format Directory Exchange)

LDIFDE (LDAP Data Interchange Format Directory Exchange) A previous article described about CSVDE usage. This article will walk you through another tool LDIFDE (LDAP Data Interchange Format Directory Exchange), it is also a command prompt-based tool similar to CSVDE to export information from Active Directory. LDIFDE and CSVDE both are the tools that can be used to export data from Active Directory, and for creating AD objects by using data presented in LDIF or CSV format. The exported data can be filtered

Troubleshooting Memory Leak on Domain Controller in Lsass.exe Process

What is a memory leak? Application codes require that some amount of memory to be allocated, for storing values that will be worked with, and then deallocated when the code is finished working with them. This is a concern to Active Directory administrator because we don’t always have full control over all of the code which runs in our environment. Sometimes some applications have the specific problem of not being able to deallocate their memory usage when running on or against a domain controller, resulting in a memory leak. There can be memory leaks in either kernel or user mode but application derived memory leaks are by nature user mode leaks.