Cyrus,
Are there any specific error messages appearing on the SQL Server ?
Perhaps using a packetsniffer to have a look at the network traffic might
also give some insight into why the connection times out.
Has anything recently changed in the network/server/database, no matter how
insignificant
This is very odd. I have been reading this list for a long time now. I m
an avid fan, I learn a lot keeping up with the geniuses on this
newsgroup.
Today, I caught this message On Behalf Of [EMAIL PROTECTED]
Which is very odd to me, considering I am the IT manager at Zero G
Software, Inc. and
It's quite Strange
I got this email with a from as [EMAIL PROTECTED].
Which is quite strange as this suppose to be our Domain.
How is this spoof done ? Is he just writing his name cyrus in the email
address field of the email client, and not specifying complete/correct
email address.
Thanks
Note the header below,
Cyrus didn't specify a valid domain suffix for his email address, and as a
result your mail clients/mail routing software are appending a domain.
Received: from mail.activedir.org ([64.245.160.7])
Received: from ams004.ftl.affinity.com [216.219.253.138] by
Hello,
I've two domain with trust relationship, 1 NT4 and 1 2003.
We have roaming profiles for TS on a file server. How can I migrate this
profiles for the new domain ?
I've tried subinacl with /migratetodomain option, but I've always access
denied at logon. What's the permissions we must have
Al,
Version 1 of your proposal is exactly what I have done in the past, and
works quite well (within some defined boundaries). Account managers were
delegated very minimum rights over AD (such as unlock account reset password
etc), and everything else was done via a tool (was client-server at
What about the existing Printer Location Tracking features in AD, and
simply use the app to map printers based on their location ? Even if you
don't autmatically map printers, the PLT features automatically filter
printers for users based on their current location.
The main point in the article
Just in case you missed the announcements, there are some Group Policy and AD related
chats coming up in the next few days:
http://www.microsoft.com/technet/community/chats/default.mspx
Tony
Sent via the WebMail system at
I would like to thank everyone for there help on this one! This list is a
great tool.
//jason
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Glenn Corbett
Sent: Wednesday, September 29, 2004 5:04 AM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir] How
.NET might be a little overkill depending on what the workstations can
handle (I've found .NET to be slow to start up on first run). Script or
batch file should be able to handle it just fine and it wouldn't be that
much code to write I would imagine. What logon script language are they
using
Just to add... Kieran McCorey has an Exchange Migration webcast today at
12:00PM EST.
http://searchwindowssecurity.techtarget.com/
Under Expert Technical Advise... WebCasts...
Kevin
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Tony Murray
Sent:
Greetings,
We have a requirement for encoding an entry on our AD groups with an ID code
in an attribute. I have been asked to look into ways to best accomplish the
requirement.
I have reviewed the AD schema, and there doesn't appear to be an attribute
dedicated to this function already. (We
The Employee ID attribute you speak of is there... it is listed under
Organization in the User Properties.
Now, if you want, you could use one of the attributes that are in teh
Managed By in the Group Properties.
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf
Could anyone run net localgroup administrators on these 4 types of servers (all
Win2k) and tell me what the membership is?
Domain Controller
DNS Server
Exchange server (2k)
Standard member server
I've recently had two weeks of shear and utter hell after I removed all members from
the local
Thanks, But I dont see it.
Thanks for your suggestion.
Todd
-Original Message-
From: Rodriguez, Daniel [EPM/SRM] [mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 29, 2004 12:44 PM
To: '[EMAIL PROTECTED]'
Subject: RE: [ActiveDir] Group ID Code Attribute
The
Ok, Ive always been confused on this issue-
It is my understanding that a domain admin only has rights
on the domain naming context of his/her domain in AD and not the config or schema contexts.
If this is so, how can I delete a dc thru AD sites and
Services or ntdsutil?
Isnt this in
Lately I my users have been plagued with spyware
and adware. What do you guys do to fight this?
Can Spybot be pushed out as an msi via a gpo?
Or ad-aware?
Should I set the killbit on all
the local active x controls?
Should I prevent active x and _javascript_ing
in IE thru a gpo?
Im
What are you using for anti-virus protection? Some of
the newer AV products are coming with this built in vs. having to push out
additional software.
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kern,
TomSent: Wednesday, September 29, 2004 4:14 PMTo:
[EMAIL
Symantec Anti- Virus Enterprise 9.0.
It has some spyware
protection but not that great as my users are still getting a ton.
From: Mulnick, Al
[mailto:[EMAIL PROTECTED]
Sent: Wednesday, September 29, 2004
4:26 PM
To: [EMAIL PROTECTED]
Subject: RE: [ActiveDir]
OT:spyware
Heres what we do
When we detect a user has become infested
with spyware we 1st
Use a combination of Spybot SD,
Lavasoft AdAware, and Hijaack this until we are sure the machine is clean
Then, depending on the kind of user, we either threaten to or just take away their local admin
I use McAfee antispyware. It works ok. I
got Cool Web Search, it doesn t detect it.
Anyone experience CWS and remove them
successfully?
From:
[EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Kern, Tom
Sent: Wednesday, September 29,
2004 3:33 PM
To: [EMAIL PROTECTED]
Yeadownload CWShredder from here:
http://www.spywareinfo.com/~merijn/downloads.html
The
site runs a little slow and you'll need the VB6 runtimes to run it, but it will
take care of it.
From: Dipowarga Wirawan
[mailto:[EMAIL PROTECTED] Sent: Wednesday, September 29, 2004
1:40 PMTo:
Remember that Ad-Aware can only be legally used in non-commercial
environments. Spybot SD and Spyware Blaster are both free to both home and
corporate users, so I usually use these instead of Ad-Aware.
Regular users should not be able to write to the
hklm\software\microsoft\windows\current
When a user gets a virus, that virus will
execute under that users security context. So a regular user should NOT
have a virus write to those keys.
True?
Or can a virus somehow get localsystem
access?
Thanks
As to Symantec, I know this is not the
forum for this, but Im pretty
There are examples out there of viruses elevating
privileges if that's what you're asking. The goal of virus defense is to
limit the impact not necessarily prevent every single infection. Things
happen and you have to either decide to limit the amount of damage a virus or
errant user or
As re: Symantec, a lot of the viruses Ive
been getting lately have been viruses that are over a year old and defs have
been out for awhile so Im puzzled as to why I keep getting infected.
The spyware/adware I think may be virus
related and not web push related, but Im not positive.
We've implemented a domain wide password policy using the default domain
policy, this applies to authenticated users. One question Im not sure about
is I have an OU that all Admin id's and service accounts reside in, We've
applied block inheritance on this OU but the Default Domain Policy is still
The password policy is a domain wide thing. You cant restrict it to certain OUs.
Whatever you set it as is what it will be. Would be helpful to apply it to certain
OUs, but password policies are there to protect the entire environment, so objecst
that would not be using the same policy would be
Title: [ActiveDir] Password Policy question
Also, keep in mind that password policy is a
machine policy, so in any case, its not being applied to user
accounts--but rather machines. In the case of domain password policy, the
machine(s) actually processing the password policy settings are
Thanks Darren/Douglas
Its amazing such a simple concept can raise so many questions. This
question was really just pertaining to strictly to admin, service type
accounts. Through some further research, the ONLY way to really achive
what I want is to protect service accounts from being
30 matches
Mail list logo