The SID filtering mechanism was changed between Microsoft Windows 2000 and Windows Server 2003. In Windows 2000, turning off SID filtering on a trust turns it off for all SIDs.
In Windows Server 2003, SID filtering cannot be turned off for built-in groups, even if it is turned off on the trust.
This issue occurs if the following conditions are true:
- The access token of a security principal from a trusted domain passes a SID that matches a SID in the local domain.
- That SID is the SID of a built-in group.
In this scenario, Windows Server 2003 removes this SID from the access token. This SID removal is known as SID filtering. In a migration scenario where the source domain is a Windows Server 2003 domain, users from a trusted domain cannot access resources in that source domain if those resources have only the following access control entries (ACLs) defined:
Source_domain_name\built-in_group_name
To use the SID history between domains, you must enable the SID filtering to allow for the trust between the source domain and the resource domain.
If you disable the SID filtering for a trust, there are security implications that are described in Microsoft Security Bulletin MS02-001.
To reduce the security implications caused by disabling the SID filtering, the behavior of the SID filtering has changed between Windows 2000 Server and Windows Server 2003.
In Windows 2000 Server, the SID filtering functionality is either enabled or disabled for all SIDs on a particular trust. Additionally, the built-in group SIDs are not filtered when the SID filtering is disabled.
In Windows Server 2003, the SID filtering can be enabled or disabled on specified trusts. However, the built-in SIDs from outside the domain are always filtered out.