{"id":3930,"date":"2024-05-29T12:45:15","date_gmt":"2024-05-29T12:45:15","guid":{"rendered":"https:\/\/www.systools.in\/blog\/?p=3930"},"modified":"2024-05-29T12:45:15","modified_gmt":"2024-05-29T12:45:15","slug":"sid-history-migration","status":"publish","type":"post","link":"https:\/\/www.systools.in\/blog\/sid-history-migration\/","title":{"rendered":"SID History Migration to Retain ACL Rights in Active Directory"},"content":{"rendered":"<p>Admins who have an Active Directory migration lined up often have many questions in mind. Out of them one that has a significant impact after an AD transfer is how to go about SID history migration. Being a core component of object-level security special care needs to be taken while dealing with Security Identity (SID). As SID can exist without object but object can\u2019t exist without SID.<\/p>\n<p>Moreover, after a domain change admins may witness that users, computers, groups, and other objects start behaving abruptly.<\/p>\n<div class=\"alert alert-info\"><strong>Table of Contents<\/strong><\/p>\n<ul>\n<li><a href=\"#sid\"><strong>Understanding SID and Script to Find SID History<\/strong><\/a><\/li>\n<li><a href=\"#sidhistory\"><strong>Using SID History<\/strong><\/a><\/li>\n<li><a href=\"#admt\"><strong>ADMT SID History Not Working Issue<\/strong><\/a><\/li>\n<li><a href=\"#tool\"><strong>Professional SID History Migration<\/strong><\/a><\/li>\n<li><a href=\"#steps\"><strong>Working Steps<\/strong><\/a><\/li>\n<li><a href=\"#conclusion\"><strong>Conclusion<\/strong><\/a><\/li>\n<\/ul>\n<\/div>\n<p>Even while discussing the formation of an <a href=\"https:\/\/www.systools.in\/blog\/complete-ad-migration-checklist\/\" target=\"_blank\" rel=\"noopener\">AD Migration checklist<\/a> special emphasis is given to SID.<\/p>\n<p>Whether you wish to maintain or revoke resource access, SID is the key. So, this write-up will help you follow through with your requirements. Let&#8217;s start by discussing what exactly a SID is.<\/p>\n<h2 id=\"sid\">Understanding SID and Script to Find SID History<\/h2>\n<p>Short for Security Identifier SID can be thought of as a Social Security number for the objects inside AD. These are unique non-physical strings that are kept entirely digital. Likewise, SID History is a sub-attribute containing the list of all previous SIDs that a particular object had in its previous domain.<\/p>\n<p>To list the current SID and SID History of all AD objects admins can use the following PowerShell script:<\/p>\n<pre># Function to discover unique object types\r\nfunction Get-UniqueADObjectTypes {\r\n \u00a0param (\r\n \u00a0\u00a0\u00a0[string]$Filter = '*'\r\n\u00a0\u00a0)\r\n\r\n \u00a0# Hash table to store encountered object types\r\n \u00a0$objectTypes = @{}\r\n \u00a0# Get AD objects based on filter\r\n \u00a0$objects = Get-ADObject -Filter $Filter -Properties ObjectClass\r\n \u00a0# Process each object and update hash table\r\n \u00a0foreach ($object in $objects) {\r\n \u00a0\u00a0\u00a0$objectType = $object.ObjectClass\r\n \u00a0\u00a0\u00a0if (!$objectTypes.ContainsKey($objectType)) {\r\n \u00a0\u00a0\u00a0\u00a0\u00a0$objectTypes.Add($objectType, $true)\r\n \u00a0\u00a0\u00a0}\r\n \u00a0}\r\n \u00a0# Return the list of unique object types\r\n \u00a0return $objectTypes.Keys\r\n}\r\n\r\n# Get a list of unique object types (call the function)\r\n$uniqueTypes = Get-UniqueADObjectTypes -Filter \"Name -like '*'\"\r\n\r\n# Loop through unique object types and retrieve objects\r\n$allObjects = @()\r\nforeach ($objectType in $uniqueTypes) {\r\n \u00a0# Construct the Get-AD* cmdlet dynamically\r\n \u00a0$cmdlet = \"Get-AD\" + $objectType\r\n \u00a0try {\r\n \u00a0\u00a0\u00a0# Attempt to retrieve objects using the constructed cmdlet\r\n \u00a0\u00a0\u00a0$objects = &amp; $cmdlet -Filter \"*\" -Properties Name, SID, SIDHistory\u00a0 # You can adjust properties as needed\r\n \u00a0\u00a0\u00a0$allObjects += $objects\u00a0 # Add retrieved objects to the main array\r\n \u00a0} catch {\r\n \u00a0\u00a0\u00a0#Write-Warning \"Error retrieving objects of type: $objectType. Exception: $_\"\r\n \u00a0}\r\n}\r\nClear-Host\r\n# Display retrieved objects (optional)\r\nif ($allObjects) {\r\n \u00a0Write-Host \"Retrieved Objects:\"\r\n \u00a0# Use calculated property syntax directly in Format-Table header\r\n \u00a0$allObjects | Format-Table @{Name=\"ObjectClass\"; Expression={$_.GetType().Name.Replace(\"Microsoft.ActiveDirectory.Management.AD\", \"\")}}, Name, SID, SIDHistory -AutoSize\r\n} else {\r\n \u00a0Write-Host \"No objects retrieved.\"\r\n}\r\nOutput:\r\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3931\" src=\"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/ad-sid-history-script.webp\" alt=\"SID History PowerShell Script\" width=\"1044\" height=\"566\" \/>\r\n<strong>SID Architecture:<\/strong><\/pre>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3933\" src=\"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/security-identifier-architecture.webp\" alt=\"SID Architecture\" width=\"1200\" height=\"478\" \/><\/p>\n<p>Source: <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/manage\/understand-security-identifiers\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft<\/a><\/p>\n<p>A typical SID looks like this:<\/p>\n<p>S-R-X-Y1-Y2-Yn-1-Yn<\/p>\n<p>eg.<\/p>\n<p>S-1-5-21-10036348-17238915-1-512<\/p>\n<p>Each part of the SID has a specific meaning:<\/p>\n<p>S: Indicates an SID.<\/p>\n<p>R (Here 1): Revision level.<\/p>\n<p>X (Here 5): Identifier authority.<\/p>\n<p>Y1-Y2-YN (Here 21-10036348-17238915-1): Unique domain-specific identifier.<\/p>\n<p>512: Relative identifier (RID) for the object within the domain.<\/p>\n<h2 id=\"sidhistory\">History and Usage of SID History<\/h2>\n<p>SID saw its first use with the release of Windows Server 2000. Initially, it was made to perform a clean exit from Windows NT 4.0 and go to the Active Directory. However, after that, it became a regular part of all AD environments. This meant that admins could allow an object from its new domain to access the resources it was connected to previously.<\/p>\n<p>SID itself is immutable no matter what modifications happen to the object. This means the SID of the user remains as it is even if their name changes or they receive a privilege upgrade to admin status.<\/p>\n<p>But this also brings in a vulnerability. If a user name is removed then all the reference calls to that particular object mention it as \u201cAccount Unkown (SID)\u201d.<\/p>\n<p>Moreover, as the SID is technically free it may get attached to another object unknowingly. Exploitation of this vulnerability that common to many Active Directory attacks. Where hackers successfully link an orphan SID with high-level permission access to their sleeper account. After which they can manipulate the AD as per their wish. So whenever an object is part of a <a href=\"https:\/\/www.systools.in\/blog\/active-directory-cross-forest-migration\/\" target=\"_blank\" rel=\"noopener\">cross forest Active Directory Migration<\/a> admins must opt for a solution that does not allow the SID to become unattached.<\/p>\n<p>However, many admins have expressed difficulties in maintaining SID history intact during a default migration. Don&#8217;t worry we have accumulated a list of such errors so you don&#8217;t have to face them in your actual environment.<\/p>\n<h3 id=\"admt\">Check ADMT SID History Not Working Issue Manually<\/h3>\n<p><a href=\"https:\/\/www.systools.in\/blog\/rethinking-admt-password-migration\/\" target=\"_blank\" rel=\"noopener\">Password migration issues with ADMT<\/a> are not the only problem that admins have to deal with. Keeping SID history is challenging if admins opt for the traditional migration approach. Due to errors like:<\/p>\n<p><strong>Error Code 6: Invalid Handle<\/strong><\/p>\n<p>&#8220;The handle is invalid (Error code = 6).&#8221;<\/p>\n<p>This error is an indication of an underlying Remote Procedure Call (RPC). Here the the Primary DC inside ADMT fails to link with the RPC endpoint. It can occur due to the following reasons.<\/p>\n<ul>\n<li>If TcpipClientSupport doesn\u2019t launch on the primary DC or its emulator.<\/li>\n<li>Either one or both the Primary DC and its emulator fail to restart after TcpipClientSupport configuration.<\/li>\n<li>In case the DNS or the NetBIOS name resolution fails.<\/li>\n<\/ul>\n<p><strong>Error: Unverified Auditing\/TcpipClientSupport<\/strong><\/p>\n<p>Could not verify auditing and TcpipClientSupport on domains. Will not be able to migrate Sid&#8217;s. The specified local group does not exist.<\/p>\n<p>It indicates a preexistence of global\/universal group {SourceNetBIOSDom}$$$ name. ADMT is responsible for the local group creation. However, this can&#8217;t be done if the name is already taken up by some other security principal.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Error: Unverified Auditing and TcpipClientSupport Access Denial<\/strong><\/p>\n<p>\u201cCould not verify auditing and TcpipClientSupport on domains. Will not be able to migrate Sid&#8217;s. Access is Denied.\u201d<\/p>\n<p>It occurs when the user account attempts to run the ADMT with insufficient permissions. This can occur in the source, target, or both.<\/p>\n<p><strong>Error: Domain Name Lookup Failure\u00a0<\/strong><\/p>\n<p>To find these errors scan the Migration.log file. Most likely scenario is that source domain still maintains some trust configuration not existing inside the target.<\/p>\n<p>Fix it by re-running the trust migration wizard and replicating the source side trusts.<\/p>\n<p>No admin wants to deal with unnecessary troubleshooting in between a migration. Use the ADMT alternative to save countless hours that would have otherwise been wasted on fixing avoidable problems.<\/p>\n<h3 id=\"tool\">Skip All SID History Migration Errors Professionally<\/h3>\n<p>If you are thinking about leaving SID history at the source think again. If you continue with this selection it means that no Access Control List (ACL) will work. All of them rely on the SID history to confirm resource allocation.<\/p>\n<p>Therefore we suggest that you instead rely on the <b>SysTools Active Directory Migration tool<\/b> for all AD transfers as it maintains SID history automatically.<\/p>\n<p style=\"text-align: center;\"><a class=\"btn btn-lg btn-md-block text-white\" style=\"background: #28a745; color: #fff !important;\" href=\"https:\/\/systoolskart.com\/download\/SYS4S0A4M\/29\" rel=\"nofollow\">Download Now<\/a> <a class=\"btn btn-lg btn-md-block text-white\" style=\"background: #ff6800; color: #fff !important;\" href=\"https:\/\/systoolskart.com\/buy\/SYS4S0A4M\/29\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Purchase Now<\/a><\/p>\n<p>With its advanced set of algorithms and user-friendly design is your best bet for a fully functioning AD post-migration.<\/p>\n<p>You won&#8217;t have to struggle with PowerShell Scripts or postpone the migration as all data along with ACL requests move together to the new domain. To see how the tool can keep the history of security identity intact take a look at its working steps.<\/p>\n<h3 id=\"steps\">Procedure to Migrate SID History with an Automated Tool<\/h3>\n<p>Step 1. Launch the tool and allow the default (administrator) credentials to fill on their own. Then press the Login button.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/2-enter-login-credentials.webp\" alt=\"Enter Credentials\" \/><\/p>\n<p>Step 2. Press the \u201cREGISTER DOMAIN CONTROLLER\u201d Type the Domain Friendly name and IP address of the source domain.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/3-register-domain-controller.webp\" alt=\"Register Domain Controler\" \/><\/p>\n<p>Step 3. In the Domain Details Page enter the Admin details and press \u201cSave and Continue\u201d.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/7-first-domain-validation.webp\" alt=\"First Domain Credentials\" \/><\/p>\n<p>Step 4. Change the tab from Info to Active Directory and fetch the source objects.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/10-fetchingobjects.webp\" alt=\"Fetching Objects\" \/><\/p>\n<p>Step 5. Close the Domain Details screen &gt; Add the Target domain and Fetch the objects for the same.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/15-second-domian-ad-objects-fetched.webp\" alt=\"Object Visible\" \/><\/p>\n<p>Step 6. In the Migration screen click on \u201cCreate Migration Scenario\u201d. Put the registered domains in the source and target then press Save &amp; Continue.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/17-set-source-destination.webp\" alt=\"Create Scenario\" \/><\/p>\n<p>Step 7. Go to the Task tab, and press the \u201cCreate Task\u201d button. Select the objects and Press \u201cSave and Continue\u201d.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/20-set-task-name.webp\" alt=\"Save Task\" \/><\/p>\n<p>Step 8. After object selection choose the Create or Merge option to move your objects, The current SID will move into the SID history and a New SID will be allotted to the object.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/22-select-action.webp\" alt=\"Select Action\" \/><\/p>\n<p>Step 9. Preview the object list, map it, and press Start Task. When the dialog box appears hit Start and let the tool work its magic.<br \/>\n<img decoding=\"async\" src=\"https:\/\/systoolskart.com\/imgp\/ad-migrator\/25-start-job.webp\" alt=\"Click Start\" \/><\/p>\n<h3 id=\"conclusion\">Conclusion<\/h3>\n<p>In this write-up, we gave users a sure-shot solution for keeping SID Migration history whenever admins <a href=\"https:\/\/www.systools.in\/blog\/migrate-users-and-computers-from-one-forest-to-another\/\" target=\"_blank\" rel=\"noopener\">migrate users and computers from one forest to another<\/a>. Without it objects lose the ability to use resources that they had in their source domain. Given that the default migration requires countless troubleshooting hours to get the SID history up and running we suggest that you go with the replacement that we gave.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admins who have an Active Directory migration lined up often have many questions in mind. Out of them one that has a significant impact after an AD transfer is how <\/p>\n","protected":false},"author":6,"featured_media":3932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[361],"class_list":["post-3930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-active-directory"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SID History Migration to Retain ACL Rights in Active Directory<\/title>\n<meta name=\"description\" content=\"Perform SID history migration in Active Directory. Retain ACL permissions via PowerShell &amp; bypass the ADMT SID history transfer errors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.systools.in\/blog\/sid-history-migration\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raj Kumar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/\"},\"author\":{\"name\":\"Raj Kumar\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/#\\\/schema\\\/person\\\/38995c504e8e559d45dd2c8b2bba176b\"},\"headline\":\"SID History Migration to Retain ACL Rights in Active Directory\",\"datePublished\":\"2024-05-29T12:45:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/\"},\"wordCount\":1280,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/sid-history-migration.webp\",\"articleSection\":[\"Active Directory\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/\",\"url\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/\",\"name\":\"SID History Migration to Retain ACL Rights in Active Directory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/sid-history-migration.webp\",\"datePublished\":\"2024-05-29T12:45:15+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/#\\\/schema\\\/person\\\/38995c504e8e559d45dd2c8b2bba176b\"},\"description\":\"Perform SID history migration in Active Directory. Retain ACL permissions via PowerShell & bypass the ADMT SID history transfer errors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/sid-history-migration.webp\",\"contentUrl\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/sid-history-migration.webp\",\"width\":756,\"height\":423,\"caption\":\"SID History Migration to Retain ACL Rights in Active Directory\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/sid-history-migration\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SID History Migration to Retain ACL Rights in Active Directory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/\",\"name\":\"Informative Blogs Related To Technologies &amp; Data Recovery Solutions\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/#\\\/schema\\\/person\\\/38995c504e8e559d45dd2c8b2bba176b\",\"name\":\"Raj Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g\",\"caption\":\"Raj Kumar\"},\"description\":\"A dynamic writer with extensive knowledge of technology aids in closing the gap between the user and technology. Provides simple and dependable solutions to a variety of technical challenges that customers face on a daily basis.\",\"url\":\"https:\\\/\\\/www.systools.in\\\/blog\\\/author\\\/raj\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SID History Migration to Retain ACL Rights in Active Directory","description":"Perform SID history migration in Active Directory. Retain ACL permissions via PowerShell & bypass the ADMT SID history transfer errors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.systools.in\/blog\/sid-history-migration\/","twitter_misc":{"Written by":"Raj Kumar","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#article","isPartOf":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/"},"author":{"name":"Raj Kumar","@id":"https:\/\/www.systools.in\/blog\/#\/schema\/person\/38995c504e8e559d45dd2c8b2bba176b"},"headline":"SID History Migration to Retain ACL Rights in Active Directory","datePublished":"2024-05-29T12:45:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/"},"wordCount":1280,"commentCount":0,"image":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/sid-history-migration.webp","articleSection":["Active Directory"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.systools.in\/blog\/sid-history-migration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/","url":"https:\/\/www.systools.in\/blog\/sid-history-migration\/","name":"SID History Migration to Retain ACL Rights in Active Directory","isPartOf":{"@id":"https:\/\/www.systools.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#primaryimage"},"image":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/sid-history-migration.webp","datePublished":"2024-05-29T12:45:15+00:00","author":{"@id":"https:\/\/www.systools.in\/blog\/#\/schema\/person\/38995c504e8e559d45dd2c8b2bba176b"},"description":"Perform SID history migration in Active Directory. Retain ACL permissions via PowerShell & bypass the ADMT SID history transfer errors.","breadcrumb":{"@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.systools.in\/blog\/sid-history-migration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#primaryimage","url":"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/sid-history-migration.webp","contentUrl":"https:\/\/www.systools.in\/blog\/wp-content\/uploads\/2024\/05\/sid-history-migration.webp","width":756,"height":423,"caption":"SID History Migration to Retain ACL Rights in Active Directory"},{"@type":"BreadcrumbList","@id":"https:\/\/www.systools.in\/blog\/sid-history-migration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.systools.in\/blog\/"},{"@type":"ListItem","position":2,"name":"SID History Migration to Retain ACL Rights in Active Directory"}]},{"@type":"WebSite","@id":"https:\/\/www.systools.in\/blog\/#website","url":"https:\/\/www.systools.in\/blog\/","name":"Informative Blogs Related To Technologies &amp; Data Recovery Solutions","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.systools.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.systools.in\/blog\/#\/schema\/person\/38995c504e8e559d45dd2c8b2bba176b","name":"Raj Kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39e1c57ad79e81fd7edc787ba298cbd8e96458e624c52e7a35bac32d1b3063f0?s=96&d=mm&r=g","caption":"Raj Kumar"},"description":"A dynamic writer with extensive knowledge of technology aids in closing the gap between the user and technology. Provides simple and dependable solutions to a variety of technical challenges that customers face on a daily basis.","url":"https:\/\/www.systools.in\/blog\/author\/raj\/"}]}},"_links":{"self":[{"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/posts\/3930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/comments?post=3930"}],"version-history":[{"count":0,"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/posts\/3930\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/media\/3932"}],"wp:attachment":[{"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/media?parent=3930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.systools.in\/blog\/wp-json\/wp\/v2\/categories?post=3930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}