Forum Discussion

joachiml's avatar
joachiml
Copper Contributor
Jul 10, 2020

Hyper-V 2019: dir c:\ => Access is denied.

I am running into this issue the second time now. I log on as Administrator via RDP to Hyper-V and get access denied on many directories of c:\, including C:\, C:\Windows, and many others, but of course didn´t try all. Listing directories on other drives does work though. Same when logging in as a domain administrator.

Last time I restored a known good backup and the issue was gone, but now reappeared. But I´d definitely prefer to understand and prevent the issue rather than restoring once a month.

Any idea or suggstion?

Thanks, Joachim

 

4 Replies

  • Might try from cmd.exe;

    whoami /groups

    and check that the user is a member of the local administrator's group.

     

     

    • joachiml's avatar
      joachiml
      Copper Contributor
      For whatever reason, techcommunity didn´t send any notifiction that someone replied. I checked all settings and preferences, all indiciate I should have received a notification.
      Sorry, cannot check anymore, did reinstall instead.
      • joachiml's avatar
        joachiml
        Copper Contributor

        Dave Patrick 

        It stroke me again. Here is the output:

        C:\Windows\system32>whoami /groups
        
        GROUP INFORMATION
        -----------------
        
        Group Name                                   Type             SID                                          Attributes   
        ============================================ ================ ============================================ ===============================================================
        Everyone                                     Well-known group S-1-1-0                                      Mandatory group, Enabled by default, Enabled group
        BUILTIN\Users                                Alias            S-1-5-32-545                                 Mandatory group, Enabled by default, Enabled group
        BUILTIN\Administrators                       Alias            S-1-5-32-544                                 Mandatory group, Enabled by default, Enabled group, Group owner
        NT AUTHORITY\REMOTE INTERACTIVE LOGON        Well-known group S-1-5-14                                     Mandatory group, Enabled by default, Enabled group
        NT AUTHORITY\INTERACTIVE                     Well-known group S-1-5-4                                      Mandatory group, Enabled by default, Enabled group
        NT AUTHORITY\Authenticated Users             Well-known group S-1-5-11                                     Mandatory group, Enabled by default, Enabled group
        NT AUTHORITY\This Organization               Well-known group S-1-5-15                                     Mandatory group, Enabled by default, Enabled group
        LOCAL                                        Well-known group S-1-2-0                                      Mandatory group, Enabled by default, Enabled group
        SAMBA\Domain Admins                          Group            S-1-5-21-671343811-1688140201-507615706-512  Mandatory group, Enabled by default, Enabled group
        SAMBA\Denied RODC Password Replication Group Alias            S-1-5-21-671343811-1688140201-507615706-572  Mandatory group, Enabled by default, Enabled group
        SAMBA\Recursive Membership Test Group        Group            S-1-5-21-671343811-1688140201-507615706-5404 Mandatory group, Enabled by default, Enabled group
        SAMBA\Backup Users                           Alias            S-1-5-21-671343811-1688140201-507615706-2603 Mandatory group, Enabled by default, Enabled group
        SAMBA\WebDav Users                           Group            S-1-5-21-671343811-1688140201-507615706-2607 Mandatory group, Enabled by default, Enabled group
        SAMBA\Git Users                              Group            S-1-5-21-671343811-1688140201-507615706-5271 Mandatory group, Enabled by default, Enabled group
        Mandatory Label\High Mandatory Level         Label            S-1-16-12288                                              
        

        Thanks, Joachim

Resources