I've seen this in NT4, but not recently. In our case,
the fix was to share out a parent folder, and delete the offending sub-folder
from another machine via the share.
Tyson.
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tom
KernSent: Friday, May 05, 2006 9:24 AMTo:
We use an app called RADAR. (http://www.network-radar.com/)
Licensed per site, I think we paid about $1100 CDN, and we use it on about 2500
desktops. Call it from the login script, it takes a few seconds to run,
and puts together detailed inventories for each workstation and nice
summaries.
In our case (empty root, 4 child domains, 3500 users), it
wasprimarily politics.We brought in two consultants (one from
a VAR, one from Microsoft), and the decision was that the best way to go, based
on politics,geographical location of the offices, and division of
administration, was the
It looks like they've changed things since I used it
last, but there was a tool from ADMWin (http://www.admwin.com/default.htm)
that would do exactly what you're looking for. I believe the one that will
do what you want is now calledSetupBatcher. It's pretty straight
forward, you enter the
policies all over
the place, but they only apply to accounts created on the local workstation.
Tyson.
--
Tyson Leslie
Senior Network Analyst
Colt Engineering Corporation
(403) 258-8153
[EMAIL PROTECTED
If you like VNC, I would suggest you look at TightVNC. Regular VNC is a
resource hog, TightVNC is much more efficient...
Tyson.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dan Boghici
Sent: Saturday, December 18, 2004 4:27 PM
To:
We use a product called RADAR (http://www.network-radar.com/index.htm) It
does a pretty good job of inventorying. We call it from the login script,
and it pulls a complete list of all software installed, along with hardware
details, IP info, user info, etc, and saves it to a back end server.
Title: Account name as Common Name
It depends on how your network is built. If you have
a fully switched network, you can look for ports with multiple MAC
addresses. You can also look for MAC addresses that may belong to AP
vendors or wireless nics, but that's a tad cumbersome, and quite
You can set this up via group policy, but beware - unlike most GPO settings,
setting the admin group membership is a permanent change, and will overwrite
whatever the existing group membership is.
TL
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf
Does it have to be the admin share? Why not create another share, at the
same point? The built-in admin shares are for... (you guessed it), admins.
:)
Tyson.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Sanz de Leon, Juan
Carlos
Sent:
I should have read closer - this has to be on a DC? Look at Andrew's
suggestions. Personally, I would fight back that if it requires this level
of access, it cannot be installed on a DC. If you only have one server...
Good luck.
TL
-Original Message-
From: Tyson Leslie
Do you still suggest turning it off on all servers and workstations (as per
your KB article), even in an all W2K or better environment? We have done
so (via group policy) for quite some time, but recently ended up having to
defend this decision to an admin in one of our other offices, because he
Have you tried re-applying the default security
template? (using Secedit, or the Security Config Analysis MMC
snapin...)
What functionality appears to be broken? (Most policy
settings are not permanent...)
Tyson.
From: Cothern Jeff D. Team EITC
[mailto:[EMAIL PROTECTED] Sent:
Title: Removing A W2K Domain Where The Host Server No Longer Exists
Check this article: http://support.microsoft.com/default.aspx?scid=kb;en-us;216498
There is another one that I can't find at the moment, if I
do I'll send it along too.
Tyson.
From: McLaughlin, Seamus
[mailto:[EMAIL
We were looking into exactly this problem, and came across
a few options. If you want to get fancy, (with a fair bit more work), you
could go with an 802.1x solution, and automatically VLAN people (or not) as they
connect to the network. We alsostumbled across a neat solution, that
requires
Permissions on a policy will not modify the user's ability
to log onto a domain controller. There is likely a setting in the policy
itself that is allowing Authenticated Users the right to log on to the
DCs. Windows Settings\Security\Local Policies\User Rights, and
the Log On Locally item,
My preference would be option 3, but more details would
help...
Tyson
From: Rimmerman, Russ
[mailto:[EMAIL PROTECTED] Sent: Wednesday, June 23, 2004
8:07 AMTo: '[EMAIL PROTECTED]'Subject:
[ActiveDir] DNS Design question
We're still trying
to determine what is the best option for DNS
.
Tyson Leslie
Senior Network Analyst
Colt Engineering Corporation
(403) 258-8153
[EMAIL PROTECTED]
-Original Message-
From: Rutherford, Robert [mailto:[EMAIL PROTECTED]
Sent: Thursday, June 10, 2004
18 matches
Mail list logo