Title:
First of all, thanks for the input we received sofar.
As we're not moving to a similar structure, we still
need to find all the linked files and update them.
At first it seemed that the LU.exe tool wouldn't work,
however, here's a nice little trick you might want to try:
Return Receipt
Your [ActiveDir] OT: Linked files.
document
:
Return Receipt
Your RE: [ActiveDir] OT: Linked files.
document
:
Hi Guido,
Paul and I are working on this
one. We know of the consolidation roots feature in Windows 2003. Another way to
assign a computer a second computer name (alternate computer name) is through
netdom. It does the same actually, although you still need to configure the
registry to
Return Receipt
Your RE: [ActiveDir] OT: Linked files.
document
:
Testing spoofing block. Please ignore!!
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Alex Fontana
Sent: 18 November 2004 23:29
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Juniper
Netscreens and AD Replication
Interesting issue with Netscreen 204 Firmware
Title: Message
Yes, the user does have an email address. I
gave it the weekend to see if it would correct itself, but it didnt.
Jared Manhat
Systems Administrator
Accutest Laboratories
2235 Route 130
Dayton, NJ 08810
(732) 329-0200 x254
From:
[EMAIL PROTECTED]
Title: Exchange 2003 - New mailboxes not created
Well, I figured it out. One of the geniuss
here removed DNS from our DC acting as the pdc, so AD was out of sync with the
mail servers AD. I re-added it DNS back and once AD syncd I did a
manual update on RUS and everything is fine now.
Return Receipt
Your RE: [ActiveDir] OT: Linked files.
document:
To the scripting
gurus:
This one is kind of
driving me nuts so any clarification on why this happens would be greatly
appreciated.
I recently created a
script for one of our agency OU admins that queried the AD for their
workstations and returned name, distinguished name, description,
Hmm can't really answer your questions well as I don't much
like ADO and try to avoid it but I have a couple of things that may help. Below
find a perl and vbscript example that I wrote up for something else. Something I
noticed when reading your query was a filter that was
Joe's idea is much faster than a re-write, but you could change this line
objRecordSet.Fields(description).Value
And make it work. The description field is a multi-valued attribute. As
such, you would need to hold the data in an array and then loop through it.
Something like arrDescription =
Thanks Joe for the code and the search information. Point taken on the
objectclass versus objectcategory search filter. You're right ADO is a
pain but for some generic scripting stuff I tend to use it. In
particular when I have to search a subtree in the directory. (I know, I
know, break down and
Hello,
I am on the brink of getting nuts here.
I have the following configuration:
PDC - Windows Server 2003 Standard
Clients - Windows XP SP2
The PDC also runs DNS, WINS, DHCP.
I try to use the active directory default GPO to restrict and configure
the IE settinngs on all clients/users.
The
I haven't seen anything that natively knows how to handle multi vs.
single-valued attributes without you knowing about it if that's what you're
asking. You'll have to get the values and then play through them to find
the one(s) you want for informational purposes. Same with all multi-valued
Inside Active Directory, Second Edition goes into this in some depth
in its scriping chapters, especially in regards to multi-valued
attributes, but realistically I find that I either test or have lots of
IsArray() and IsObject() in my code...
-Original Message-
From: [EMAIL PROTECTED]
How can you configure Check for newer versions of stored pages to
Automatically through Group Policy?
Justin A. Salandra, MCSE
Senior Network Engineer
Catholic Healthcare System
212.752.7300 - office
917.455.0110 - cell
[EMAIL PROTECTED]
List info : http://www.activedir.org/mail_list.htm
List
Any ideas on how to control access to data based on network
technology that is used to access AD. I.e. if the user is on the LAN versus
when she is accessing the directory via VPN/dial-up or Web. She should have different
level/authority to view and modify data stored in the AD when being
Title: Message
We had
a situation some time ago where much of the DDCP was accidentally changed.
While troubleshooting another issue, PSS had one of our people recreate the
'local' group policy file on a DC, using the procedure in Q278316. PSS
assured him that they do this all the time and
Can you give some more information about the proposed solution?
For example, should a VPN user only have access to certain applications?
Should it be different access in the same applications? Information like
that would be useful here.
Al
-Original Message-
From: [EMAIL PROTECTED]
For IE or some other app?
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Salandra, Justin A.
Sent: Monday, November 22, 2004 2:35 PM
To: [EMAIL PROTECTED]
Subject: [ActiveDir] Configure Check for newer versions of stored pages
How can you configure
you could ensure that your folks on the LAN authenticate via Kerberos,
and the remote users are forced to use NTLM = this would then allow you
to set ACLs based on the protocol used to authenticate (i.e. deny access
to users authenticating via NTLM - possible with Win2003)
/Guido
-Original
Actually we were discussing just access to data stored in Active
Directory. Well-known security principals Interactive and Network are of
not much use in this scenario.
Mika
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mulnick, Al
Sent: 22.
Hi all. I am having a serious issue with bot type worms that keep infecting my
machines over and over. It doesn't matter that I'm fully patched and my virus
defs are up to date.
I use Symantec Corporate Edition 9.0 in a win2k mixed mode AD enviroment. My
machines all have the most up to date
Just controlling access to data in AD?
What was the purpose? I mean, a normal user account has read access to much
so reducing that has what benefit vs. that of a laptop user? I'm just
trying to understand the requirement and where you're coming from to get
here.
Regardless, is the
Wait until your bosses machine gets infected. Maybe that's what it
will take to get the policy changed.
And you should try using another AV product if the current one is not
keeping your systems cleaned from known viruses.
How are you cleaning them when you find them? (read: are you sure
Hi Rosen.
It'll probably work if you use an XP machine for the administrative policy
editing machine. Install GPMC on it, and edit the policy from there. Be
aware though, some of those settings work differently at the domain level,
than at an OU level. They decide they are the boss and if you
W32.spybot.worm is rather insidious. It takes a full-system scan in safe
mode to eliminate it. I've seen several clients who didn't go to
safe-mode, and it pops right back.
Also, it's one of those that happens to use KaZaa and other P2P
filesharing. If you don't eliminate those from your network,
Hi, I've noticed on several occasions that after a
certain machine got raped by viruses, even when
removed and the machine has all latest datfiles and
critical patches, the viruses keep on coming on in and
afflicting the same machine again and again and again.
As stated, this happens even
For IE
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Mulnick, Al
Sent: Monday, November 22, 2004 3:02 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] Configure Check for newer versions of stored
pag es
For IE or some other app?
-Original
AFAIK a Windows 2000+ OS will not connect to the domain using NTLM again
after it found a AD DC. However there's some fallback after the Client
receives the netlogon_ex response - this is after ~15 minutes (which you
usually won't want to wait).
Using different authentication protocols will only
I run a virus scan in safe mode and its hit or miss if Symantec gets it. So i
end up maually deleting the files and reg keys. Typically the files are found
in system32 and sometimes in the default user profile.
my IT manager is looking into the Cisco self defending networks solution
which I'm
We've seen this, unfortunately there are thousands of variants of this
worm. First things first...
Make absolute sure you are completely cleaning a machine!!! No matter
how much patching is done if the machine has already been compromised it
WILL get reinfected. We found that Mcafee, even
How can it be permanent? I mean if you delete all instances on harddisk and reg
keys in safe mode when nothing is running,where the heck is it coming back from?
I've always wanted to know.
Also,how the heck does it get elevated privilges. I mean,if i'm running as
joeuser,how is it getting local
Do you have a Central Quarantine server set up? If not, this may be something
you want to do. If you haven't looked into it, what this server does is accept
all quarantined files and will submit samples of infected files to Symantec if
no definitions exist for the infected file.
Anyway, I
The thing is that it is very difficult to remove all infected files. Some
viruses even infect legitimate files. And most of the time it is simply not
worth the time it takes to manually remove the infection on each machine. It is
usually much faster to re-image the machine, especially if you
Even though that first line might sound rather amusing, it might just be
the trick to get things done.. it's amazing how management can decide to
.. bend the rules, let us say, when it concerns their own daily
routines.
Consider placing the laptops in a restricted VLAN. This might require
that
Oh no, you misunderstand why I said I don't like ADO. It isn't to tell you
not to use it, it is to take what I write about it properly. I am under no
misunderstanding that the script code I presented is the best way to do it
with ADO, however it is a way I have found that works.
I am all about
Title: Exchange 2003 - New mailboxes not created
One word
monitoring
You shouldn't have found replication was broke based on
symptoms. You need to know it when it occurs. This could have turned into a very
evil issue for you if a symptom didn't pop up for a while which is highly
I suggested the vlan solution,but these guys move around alot and the sales
managers sometimes want a meeting in their office,sometimes in another
office,etc
Since the sales guys generate all the profit,everyone kinda cowtows to them.
Noone wants to inconvienve them. so i'm looking for a
I have found something about Preference Mode in the GPO for Internet
Explorer Maintenance section of the User Configuration.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Salandra,
Justin A.
Sent: Monday, November 22, 2004 3:54 PM
To: [EMAIL PROTECTED]
http://support.microsoft.com/kb/274846
An administrator must also combine GPOs, an organizational unit, a user,
or a computer by implementing both a Preference mode and a MAINTENANCE
MODE GPO.
I don't understand this comment in the article.
Does anyone have any insight?
-Original
Talk to the Cisco people about Cisco ACS, dynamic VLANs, and some of
their access control stuff in their switches. In one of our sites, if
your MAC address isn't in the special list on the switch you get booted
to an VLAN that only has Internet access. Network quarantine is a
relatively new
Good thing you work for a liquor company then - presumably you get an
employee discount? That may be the only solution if management insists that
non-secured systems can plug in anywhere they please.
My advice to you is to start drinking heavily.
On 11/22/04 4:51 PM, Kern, Tom [EMAIL
Hi. I'm trying to set up RRAS as a ipsec/l2tp vpn server.
I have a couple of questions. You can either point my sorry butt to a good doc
if i seem too lazy or answer them for me. I've been using mark Minasi's book on
win2k server as a guide but he's doesn't really go into depth about RRAS and
Title: RE: [ActiveDir] virus/worm
How strong are your passwords on those machines. I am pretty sure variants of the Spybot can try common passwords. A couple other tricks I have used:
Setup your routers to send a syslog alert and then email you any machine attempting to contact IRC ports
We have taken a low-tech approach to this for the time being. We installed
a cable modem in our data center as a stand-alone internet connection. We
use it for testing most of the time. But when there is a demo or someone
from the outside needs access, we connect the machine into this internet
Title: RE: [ActiveDir] virus/worm
I have
my firewall logging to a syslog daemon which emails me any bad ports- typically
the worm/bot goes out 445/.
Snort
doesn't do anything proactive like kill the worm. It will just email me what it
thinks is unusal.
Identifying when the worm kicks
Title: RE: [ActiveDir] virus/worm
Your right that Snort can't patch the systems but it can
help you find the source. If you think it is from a traveling laptop put Snort
or something like it near where the traveling laptops are. It should detect the
scanning by the worm and give you the
[EMAIL PROTECTED] wrote:
Hi Rosen.
It'll probably work if you use an XP machine for the administrative policy
editing machine. Install GPMC on it, and edit the policy from there. Be
aware though, some of those settings work differently at the domain level,
than at an OU level. They decide they
50 matches
Mail list logo