appcmd

%windir%\system32\inetsrv\appcmd.exe

 

To configure the WAS to support TCP activation

%windir%\system32\inetsrv\appcmd.exe set site "Default Web Site" -+bindings.[protocol='net.tcp',bindingInformation='808:*']

 

To enable net.tcp for the application, run the following command from an administrator-level command prompt

%windir%\system32\inetsrv\appcmd.exe set app "Default Web Site/Bullet.Service" /enabledProtocols:http,net.tcp

 

How to list the users and groups of an AD Security Group when not a domain admin

Rundll32 dsquery.dll OpenQueryWindow (good tool)

 

Xem mình là ai?

Start > cmd > whoami /groups > C:\groups.txt 

Start > cmd > whoami /user > C:\user.txt

 

icacls

https://techjourney.net/icacls-windows-command-prompt-tool-to-manage-acls/

icacls "D:\Projects\Web\Deploy" /grant "IIS_IUSRS":(OI)(CI)F /T

 

xcacls

https://support.microsoft.com/en-us/help/825751/how-to-use-xcacls-vbs-to-modify-ntfs-permissions

 

cacls

CACLS (Change Access Control Lists)

 

iCacls or Xcacls - Which should I use?

icacls.exe.  Xcacls is the old tool

 

How to grant permission to users for a directory using command line in Windows?

http://stackoverflow.com/questions/2928738/how-to-grant-permission-to-users-for-a-directory-using-command-line-in-windows

As of Vista, cacls is deprecated. Here's the first couple of help lines:

C:\>cacls
NOTE: Cacls is now deprecated, please use Icacls.

Displays or modifies access control lists (ACLs) of files

You should use icacls instead. This is how you grant John full control over D:\test folder and all its subfolders:

C:\>icacls "D:\test" /grant John:(OI)(CI)F /T

According do MS documentation:

  • F = Full Control
  • CI = Container Inherit - This flag indicates that subordinate containers will inherit this ACE.
  • OI = Object Inherit - This flag indicates that subordinate files will inherit the ACE.
  • /T = Apply recursively to existing files and sub-folders. (OI and CI only apply to new files and sub-folders). Credit: comment by @AlexSpence.

For complete documentation, you may run "icacls" with no arguments or see the Microsoft documentation here and here

 

Take Ownership of a File or Folder by Command in Windows

https://www.faqforge.com/windows/take-ownership-of-a-file-or-folder-by-command-in-windows/

Taking ownership of files in Windows is necessary to edit or delete system or program files that you have no access to by default. There are multiple ways to achieve that goal, like doing everything manually through the Properties menu, applying a registry tweak or, as described here, executing a command in the Command Prompt. Note that taking ownership will not let you edit every system file. Windows has set precautions so that you don't edit any of the most important files which may be helpful in some cases but can be really, really annoying in other.

To start off, you need an elevated command prompt which is simply a command prompt opened as administrator. In Windows 8 you can open that by right-clicking the bottom left corner of the screen and selecting Command Prompt (Admin). In Windows 7 and previous, search the main menu for cmd, right-click it and select Open as administrator.

You need two commands now: one to actually take ownership of the file or folder and one to grant yourself access rights. These are the two commands you will want to use:

For folders, use:

takeown /f folder_name /r /d y
icacls folder_name /grant username_or_usergroup:F /t /q

For files, use:

takeown /f file_name /d y
icacls file_name /grant username_or_usergroup:F /q

The commands basically only differ in a few switches that make the folder procession run recursively. If you want to edit only one folder instead of the whole recursive lot, remove the /r and /t switches from the commands. For more info on the commands, simply enter takeown /? or icacls /? into the command prompt.

If I wanted to take control of my Program Files folder, I'd need to enter the following:

takeown /f "C:\Program Files" /r /d y
icacls "C:\Program Files" /grant christian:F /t /q

 

How to: Add or Remove Access Control List Entries

https://msdn.microsoft.com/en-us/library/ms229078(v=vs.110).aspx