We have lots that are shared, that's one of the main drivers for doing it that way, it doesn't matter who logs on, if you know you need machine XYZ but that's all you know, you can just look in ADUC and see who is/was on it, not have to consult a spreadsheet/database and still only know who you think should be using it. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
--- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
