Security identifier (SID) filtering is the default process by which a domain controller automatically prevents...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
SIDs from any domain other than the specific trusted domain pair from being exchanged over the external trust link. SID filtering is enabled by default on Windows 2003 Server domain controllers as well as Windows Server 2000 SP4+ domain controllers.
However, a Windows Server 2000 domain controller with SP3 or earlier, who is a participant in an external trust, does not have SID filtering enabled by default. Also, even if a later SP is applied, SID filtering remains disabled by default.
If you suspect that SID filtering is not enabled (for any reason) and want to turn it on, follow this procedure:
- Verify that an external trust already exists.
- Log into the domain controller as a member of the Domain Admins for the trusting domain
- Type in the following command at a command prompt (or use via a script): netdom trust trusting domain name /domain:trusted domain name /userO:user_name [/passwordO:*] /Quarantine:yes
Be sure to replace the two domain name placeholders with the appropriate domain names. Also, using the asterisks as the password prevents the password from appearing in clear text in the command window or script. Plus, it prompts the user for the password, which is protected during the input process by displaying only asterisks.
James Michael Stewart is a partner and researcher for ITinfopros, a technology-focused writing and training organization.