Resides in the System container of a domain and used to control permissions - using an Access Control Model - for certain built-in privileged groups (called Protected Groups).
Security Descriptor Propagator (SDPROP) runs every hour and compares the ACL of protected groups and members with the ACL of AdminSDHolder and any differences are overwritten on the object ACL.
List of Protected Groups
Account Operators
Backup Operators
Server Operators
Print Operators
Domain Admins
Replicator
Enterprise Admins
Domain Controllers
Read-only Domain Controllers
Schema Admins
Administrators
Well known abuse of some of the Protected Groups, all of which can log on locally to DC
Protected Group
How it is abused
Account Operators
Cannot modify DA/EA/BA groups. Can modify nested group within these groups.
Backup Operators
Backup GPO, edit to add SID of controlled account to a privileged group and Restore.
Server Operators
Run a command as system (using the disabled Browser service)
Print Operators
Copy ntds.dit backup, load device drivers.
With Domain Admin privileges (Full Control/Write permissions) on the AdminSDHolder object, it can be used as a backdoor/persistence mechanism by adding a user with Full Permissions (or other interesting permissions) to the AdminSDHolder object.
In 60 minutes (when SDPROP runs), the user will be added with Full Control to the AC groups like Domain Admins without actually being a member of it.