2003 DHCP console showing clients using a dial-up network connection through a RAS server of which there are none on the network. Can the DHCP manager be wrong about this?
An admin logged in as Administrator on a Windows 2003 member server in a 2003 AD left the building without logging off. Other than the obvious things like file shares, are there any domain administrative functions that could be accessed in this scenario? As far as I know, ADUC cant be accessed...
On a Windows 7 Home Premium SP1 or XP SP3 machine is malwarebytes, superantispyware and panda cloud sufficient? How about just the malwarebytes and superantispyware? I have been using the trio for some time without problems.
That would explain the absence of a drop down. Is there any group that a user can belong to that can logon to the domain on a DC that cant admin the domain (ADUC)?
Do you mean rename and disable the domain admin account? The plan requires that the intruder uses an account called "Administrator" and does not get the disable error.
The account disabled error is what Im want to avoid. If you think you have the Administrator password and want to give it a quick try and you get the error, then you know you dont have it you keep doing what you do to get it.
If you think you have the key to the storage room full of Twinkies...
I want to protect the Domain Administrator account. Just renaming it does not serve my purpose. Can I rename the Administrator account so it appears as a regular user account and rename a regular user account as the Administrator account?
Let me explain. I give you the 'Administrator' password...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.