Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic

Securing DNS resource records

Updated: January 21, 2005

Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2

Securing DNS resource records

The following DNS resource record configuration options have security implications for resource records stored in both standard and Active Directory-integrated DNS zones:

  • Manage the discretionary access control list (DACL) on DNS resource records stored in Active Directory. The DACL allows you to control the permissions for the Active Directory users and groups that may control the DNS resource records. For more information, see Modify security for a resource record.

    The following table lists the default group or user names and permissions for DNS resource records stored in Active Directory.

     

    Group or user names Permissions

    Administrators

    Allow: Read, Write, Create All Child objects, Special Permissions

    Authenticated Users

    Allow: Create All Child objects

    Creator Owner

    Special Permissions

    DnsAdmins

    Allow: Full Control, Read, Write, Create All Child objects, Delete Child objects, Special Permissions

    Domain Admins

    Allow: Full Control, Read, Write, Create All Child objects, Delete Child objects

    Enterprise Admins

    Allow: Full Control, Read, Write, Create All Child objects, Delete Child objects

    Enterprise Domain Controllers

    Allow: Full Control, Read, Write, Create All Child objects, Delete Child objects, Special Permissions

    Everyone

    Allow: Read, Special Permissions

    Pre-Windows 2000 Compatible Access

    Allow: Special Permissions

    System

    Allow: Full Control, Read, Write, Create All Child objects, Delete Child objects

For more information, see Security information for DNS.

Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft. All rights reserved.