Display or modify Access Control Entries (ACEs) for file and folder Permissions, Ownership and Domain.
Access Control Lists apply only to files stored on an NTFS formatted drive, each ACL determines which users (or groups of users) can read or edit the file. When a new file is created it normally inherits ACL&qt;&qt;s from the folder where it was created.
SUBINACL [/noverbose] /object_type object_name [/action=parameter] [/help]
object_type: service e.g. /service Messenger \ServerNameMessenger
keyreg e.g. /keyreg HKEY_CURRENT_USERSoftware
file e.g. /file *.obj /file c: est.txt
subdirectories manipulate files in specified directory and all subdirectories
object_name : This will vary according to the object_type – see the examples above
action : setowner=owner
will change the owner of the object e.g. /setowner=MyDomainAdministrators
will replace all ACE (Audit and Permissions) in the object
will replace all ACEs with a Sid from OldDomainName
with the equivalent Sid found in NewSamServer
This option requires a trust relationship with the server containing the object. Examples:
subinacl can do everything that cacls and xcacls can do and more besides.
List permissions to log file:
subinacl /noverbose /nostatistic /outputlog=my.log /subdirectories "C:Program FilesMy Folder" /display
subinacl /nostatistic /playfile my.log
Change owner :
subinacl /file C:demofile.doc /setowner=MYDOMAINBillG
Running subinacl against a subfolder, as in the example above will affect just that folder and it&qt;&qt;s contents. However if you run subinacl against a folder in the root of the drive it will scan the entire drive for folders matching that name (which can take some time).
subinacl /subdirectories "C:Spud"
Will also match
C:Documents and SettingsSpud etc