"And it is *not* supported if Exchange is in the AD site."
Can you expand on that a little bit Michael, do you mean renaming a DC or
member server, or both? or something else :)


On Fri, Jul 25, 2014 at 10:36 AM, Michael B. Smith <[email protected]>
wrote:

>  And it is *not* supported if Exchange is in the AD site.  I just got
> verification on that, as well. (Of course, that’s what I care most about.
> J )
>
>
>
> Regardless, it’s a far better way to add an alias than disabling strict
> name checking.  It allows to continue to use SMB3/SMB2 with Kerberos,
> whereas once you disable strict name checking you are throttled to SMB1.
>
>
>
> So I’m very appreciative. And yes, I’ve done some testing on it now and
> read up on it. In the toolbag. J
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Free, Bob
> *Sent:* Thursday, July 24, 2014 6:27 PM
>
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> > This trick is also part of the “supported” method to safely rename a
> domain controller, which is how I learned it in the first place.
>
>
>
> “Supported” but not “recommended” according to my DSE. YMMV
>
>
>
> I had done it in the past (2K3)  and was contemplating doing it again and
> he asked around internally and gave me that answer.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Damien Solodow
> *Sent:* Thursday, July 24, 2014 7:19 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> You’re welcome. J
>
> It was something I was really happy to discover as the
> DisableStrictNameChecking was a headache.
>
>
>
> This trick is also part of the “supported” method to safely rename a
> domain controller, which is how I learned it in the first place.
>
>
>
> DAMIEN SOLODOW
>
> Systems Engineer
>
> 317.447.6033 (office)
>
> 317.447.6014 (fax)
>
> HARRISON COLLEGE
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Michael B. Smith
> *Sent:* Thursday, July 24, 2014 10:15 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> Thanks for teaching an old dog a new trick!
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Kennedy, Jim
> *Sent:* Thursday, July 24, 2014 10:08 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> Genius
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Damien Solodow
> *Sent:* Thursday, July 24, 2014 10:08 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> Yes it does.
>
>
>
> DAMIEN SOLODOW
>
> Systems Engineer
>
> 317.447.6033 (office)
>
> 317.447.6014 (fax)
>
> HARRISON COLLEGE
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Michael B. Smith
> *Sent:* Thursday, July 24, 2014 10:02 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> That’s very interesting. Does it add an SPN?
>
>
>
> (I don’t have time to test right now, but I can later. I’m happy to learn
> something new!)
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Damien Solodow
> *Sent:* Thursday, July 24, 2014 9:49 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> There is another (easier) solution that doesn’t require a reboot. J
>
> Skip the DisableNameChecking.
>
> Delete the existing A record for AppServer from the primary DNS server
> configured on ComputerName.
>
> On ComputerName, open an elevated command prompt and run: netdom
> compuername ComputerName /add:addserver.full.dnsname
>
>
>
> Done.
>
>
>
> DAMIEN SOLODOW
>
> Systems Engineer
>
> 317.447.6033 (office)
>
> 317.447.6014 (fax)
>
> HARRISON COLLEGE
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Thursday, July 24, 2014 9:43 AM
> *To:* '[email protected]'
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> Ok.
>
> Fair enough.  I would not have thought to google Disable Strick Name
> Checking.
>
> But doing so brought this one up.
>
> I have added the second reg as well.
>
> About to reboot.
>
> Let everyone know but I am sure this will fix it.
>
> Thanks.
>
>
>
>
> http://www.symantec.com/connect/blogs/why-you-might-disable-strict-name-checking-and-authentication-loopback-enterprise-vault-server
> <https://urldefense.proofpoint.com/v1/url?u=http://www.symantec.com/connect/blogs/why-you-might-disable-strict-name-checking-and-authentication-loopback-enterprise-vault-server&k=4%2BViHuL0UtSJBpVrYi3EdQ%3D%3D%0A&r=Jek3QSvahmIrNAN1nuPfQA%3D%3D%0A&m=azXhaZA3nDsGyzJEARqHj%2FQ959N9DNW6E4ih2%2BmYAB4%3D%0A&s=9134c87bbec27ec82d9efd07240cd981363553753c02b1ed239981f97751d4d6>
>
>
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Michael B. Smith
> *Sent:* Thursday, July 24, 2014 9:39 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> It’s not just a SQL trick. It’s a LanMan trick.
>
>
>
> That just happened to be the first complete set of directions that popped
> up when I googled it.
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Thursday, July 24, 2014 9:34 AM
> *To:* '[email protected]'
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> Ok MS, why does a SQL trick apply to this situation?
>
> Other than it isn’t really a SQL trick is it.
>
> It is a LanManServer trick that they have mangled with a SQL issue as well?
>
> Am I close to understanding .
>
> I am trying this now.
>
> And thank you
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *Michael B. Smith
> *Sent:* Thursday, July 24, 2014 9:27 AM
> *To:* [email protected]
> *Subject:* [NTSysADM] RE: 2012 shares?
>
>
>
> http://technet.microsoft.com/en-us/library/ff660057(v=ws.10).aspx
> <https://urldefense.proofpoint.com/v1/url?u=http://technet.microsoft.com/en-us/library/ff660057%28v%3Dws.10%29.aspx&k=4%2BViHuL0UtSJBpVrYi3EdQ%3D%3D%0A&r=Jek3QSvahmIrNAN1nuPfQA%3D%3D%0A&m=azXhaZA3nDsGyzJEARqHj%2FQ959N9DNW6E4ih2%2BmYAB4%3D%0A&s=838ff01a95b4c06aaee48ad777337dd2c6819a29c1a67a494311b808a1b9f256>
>
>
>
>
>
> *From:* [email protected] [
> mailto:[email protected] <[email protected]>] *On
> Behalf Of *David McSpadden
> *Sent:* Thursday, July 24, 2014 9:20 AM
> *To:* '[email protected]'
> *Subject:* [NTSysADM] 2012 shares?
>
>
>
> I have member server standard 2012.
>
> I have a file share of Files and it shows up as \\Computername\Files
>
> I have a DNS A record for this as appserver and would like to access the
> share as \\AppServer\Files but get access denied?
>
> What tree should I be barking up?
>
> AppServerUser has full on the folder permissions and share permission and
> I have turned UAC off for now trying to trouble shoot?
>
> Why can I not access the A record \ share name???
>
> Thanks
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for the use
> of the individual or entity to whom this e-mail is addressed. If you are
> not one of the named recipient(s) or otherwise have reason to believe that
> you have received this message in error, please notify the sender and
> delete this message immediately from your computer. Any other use,
> retention, dissemination, forwarding, printing, or copying of this email is
> strictly prohibited.
>
>
>
> Please consider the environment before printing this email.
>
>
>  ------------------------------
>
> PG&E is committed to protecting our customers' privacy.
> To learn more, please visit
> http://www.pge.com/about/company/privacy/customer/
>  ------------------------------
>

Reply via email to