Display or modify Access Control Entries (ACEs) for file and folder Permissions, Ownership and Domain.

Access Control Lists apply only to files stored on an NTFS formatted drive, each ACL determines which users (or groups of users) can read or edit the file. When a new file is created it normally inherits ACL&qt;&qt;s from the folder where it was created.

Syntax
SUBINACL [/noverbose] /object_type object_name [/action=parameter] [/help]

Key
object_type: service e.g. /service Messenger \ServerNameMessenger
keyreg e.g. /keyreg HKEY_CURRENT_USERSoftware
/keyreg \SrvHKEY_LOCAL_MACHINEKeyPath
file e.g. /file *.obj /file c: est.txt
/file \ServerNameSharePath
subdirectories manipulate files in specified directory and all subdirectories

object_name : This will vary according to the object_type – see the examples above

action : setowner=owner
will change the owner of the object e.g. /setowner=MyDomainAdministrators

replace=SamNameOldAccount=DomainNameNew_Account
will replace all ACE (Audit and Permissions) in the object
e.g. /replace=MyOldDomainFinance=NEWDOMFinance

changedomain=OldDomainName=NewDomainName
will replace all ACEs with a Sid from OldDomainName
with the equivalent Sid found in NewSamServer
e.g. /changedomain=MyOldDomain=NEWDOMAIN
This option requires a trust relationship with the server containing the object. Examples:

subinacl can do everything that cacls and xcacls can do and more besides.

List permissions to log file:
subinacl /noverbose /nostatistic /outputlog=my.log /subdirectories "C:Program FilesMy Folder" /display

Restore Permissions:
subinacl /nostatistic /playfile my.log

Change owner :
subinacl /file C:demofile.doc /setowner=MYDOMAINBillG

Bugs

Running subinacl against a subfolder, as in the example above will affect just that folder and it&qt;&qt;s contents. However if you run subinacl against a folder in the root of the drive it will scan the entire drive for folders matching that name (which can take some time).
e.g.
subinacl /subdirectories "C:Spud"
Will also match
C:Program FilesSpud
C:Documents and SettingsSpud etc