If you want to know who is currently logged in you can run (assuming you
still have NetBIOS on your network and haven't disabled the messenger
service)
nbtstat -a workstationname
and look at the table.
HKLM\Software\Microsoft\Windows NT\CurrentVersion\ProfileList has a list
of all the users t
Daniel,
In your example you would do the delegation on the parent.com DNS
server. You would run the delegation wizard on dc1.parent.com and
delegate control of the child1.parent.com domain to dc1.child1.parent.com.
The delegation of control wizard should create the NS and Glue record for
Hi,
I would like to enquire if there is any tools that can track who are the
users or last login that log on to a specific computer name?
I know that somehow we can browse to \\ComputerName\C$\documents and
settings\profile to check for the userlogon but somehow some of the
PC/Servers doesn't all
All Clients are either Windows 2000 Pro or XP Pro. XP Pro is on the Client I'm most
worried about...
-Original Message-
From: Creamer, Mark [mailto:[EMAIL PROTECTED]
Sent: Thursday, March 11, 2004 10:52 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Account lockouts
Mike, what OS is
To All:
I apologize for the length of the question but,...
I am looking for a good reference/how-to on delegating DNS
zones in Windows 2003. My real purpose, I am hoping to learn this subject,
rather than just getting the answer. But any help will be appreciated.
I have looked
Doug,
I can think of two options. 1)look at some type of NAS device running
Windows embedded. Dell sells one and I am sure HP and others have them
as well. The second option I would look at is a Windows Server 2003
with a bunch of disk drives attached. Dell has a 2650 that you can
place two qu
I am having a hard time finding informative data on a good file server. My
requirements are:
1. Scalable to 7TB
2. Speed of transfers
3. Windows/*nix/Mac compatible
4. Works flawlessly with AD
5. Total users = 5000
Current environment:
2000 AD native mode
90% XP, 7% Mac OS, 3% Solaris clients
I
You need to enable
Audit Account Logon Events - Failures
Audit Logon Events - Failurs
Then dig through your logs looking for 681, 529, 675
@echo off
echo %computername%
echo.
set file=%computername%.csv
if not %2*==* set file=%2
@echo Writing file - %file%
dumpel -l security -m security -e
Hi All!
Below is part of a daily dcdiag report run from my FSMO role holder (a W2K3 DC).
A few (but not all) of the sections for the various domain controllers show the
following (names changed to protect the innocent). Can someone tell me in layman's
terms what this means? I can't find a