We have lots that are shared, that's one of the main drivers for doing it that 
way, it doesn't matter who logs on, if you know you need machine XYZ but that's 
all you know, you can just look in ADUC and see who is/was on it, not have to 
consult a spreadsheet/database and still only know who you think should be 
using it.
~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to