Title: Message
Thanks
Brian. We knew about this, unfortunately doesn't help us right now. I would love
to drop E2K and go to E2K3 as there are several supposed fixes, but we are too
deep in now. Just the discussion of it scares our onsite MS
people.
-Original Message-From:
Hey,
I'm out of the office today, I should be returning 09.02.03. If you
need immediate assistance dial 279-6483.
Thanx
>>> ActiveDir 08/28/03 17:02 >>>
We got the Welch virus on our network and I wanted to push out the
symantec fix to everyone using a login script. I was wondering what the
We got the Welch virus on our network and I wanted to push out the symantec fix to everyone using a login script. I was wondering what the best way to do this would be. I have not worked with login scripts in the past so this is new to me.
Thanks!
Ryan McDonald
Systems Administrator
The Banker
Jens-
In my platform SDK docs, the ulFlags field says that the possible flags
are the same as those shown in DsEnumerateDomainTrusts, which show as
the following:
DS_DOMAIN_DIRECT_INBOUND Enumerate domains that are directly trusting
the domain which has ServerName as a member.
DS_DOMAIN_DIRECT_O
Title: Message
Brian,
Thanks for this. This is a step in the right
direction.
And, to me at least, this proves that the Exchange
architects and developers _ARE_ capable of learning and listening - I just
question that they are really applying the effort in the right areas.
Until I see
Title: Message
NOt an
E2K answer but in E2K3 there is a WMI method to do this.
http://msdn.microsoft.com/library/default.asp?url="">
-Original Message-From: Joe
[mailto:[EMAIL PROTECTED]Sent: Wednesday, August 27, 2003 8:06
AMTo: [EMAIL PROTECTED]Subject: RE:
[ActiveDir] A
hello,
i'm using the IDsBrowseDomainTree-interface from ADSI
there are an interesting structure: the DOMAINDESC-struct
typedef struct _DOMAINDESC {
LPWSTR pszName;
LPWSTR pszPath;
LPWSTR pszNCName;
LPWSTR pszTrustParent;
LPWSTR pszOb
Title: RE: [ActiveDir] Problems with too many nested group memberships
Here is some info just to understand what sits inside the ticket and how its used,
To validate the request and the digital signature on it, the KDC will first validate a certificate. The KDC will query the Active Director
Also I seem to recall them saying that the functionality has been on the
client receiving side for some time, they just never added the
functionality to the DC side because I had responded with a question
similar to yours Guido.
joe
-Original Message-
From: Joe [mailto:[EMAIL PROTECT
I'll see if I can dig up the note I have from PSS on it.
joe
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
GRILLENMEIER,GUIDO (HP-Germany,ex1)
Sent: Thursday, August 28, 2003 3:59 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Problems with too m
Is there any significant performance that you can discern from that scheme?
--
Roger D. Seielstad - MTS MCSE MS-MVP
Sr. Systems Administrator
Inovis Inc.
> -Original Message-
> From: Joe [mailto:[EMAIL PROTECTED]
> Sent: Wednes
Joe, do you have any more info on this? I'm just wondering how this should
work - if a Kerberos token only stores the RID of a group, which process
would then explode that information to the full SID format when it is needed
to analyse ACLs for the effective permissions of the user?
If this is do
or you've consolidated multiple domains with overlapping users and groups
and have (deliberately) merged these into the same AD user & group...
/Guido
-Original Message-
From: Joe [mailto:[EMAIL PROTECTED]
Sent: Donnerstag, 28. August 2003 00:34
To: [EMAIL PROTECTED]
Subject: RE: [Active
13 matches
Mail list logo