I don't see it in there either. My environment has a 2 way trust with another domain. There is 1 listing in SCP for our server and 1 listing for an LDAP lookup to the remote domain. I can only assume it's got something to do with the LDAP to the remote domain because the server that's being...
Nope, AutoDiscoverServiceInternalUri is correct. Yet when I do a ctrl + click on my outlook icon and test e-mail with nothing but autodiscover selected, the log tab is telling me that it's attempting autodiscover through a different server first, before it goes to the server specified in the...
I recently changed jobs and I'm in a new, strange, and much larger environment then I was before. Currently I'm troubleshooting some issues with autodiscover. When I do a ctrl + click on my outlook icon and test e-mail with nothing but autodiscover selected, the log tab is telling me that it's...
As I understand it (and I'm not saying that I understand it correctly) by running \\DomainName.com you should see all the shares on the DC in the local location. That way you can have Namespace shares and DFS replication so that a user in, say Atlanta going to \\DomainName.com\Projects is...
I agree that I don't like the situation. Unfortunately, contracting creates contractual obligations that I can't override.
a) Via the contract, we have to supply the subcontractors with internet access
b) Via the contract, we have to supply the subcontractors with a working location for file...
Agree, major PITA.
Besides I think it would be more secure to put the subcontractors onto a separate VLAN. Then we could give them domain accounts (which it seems like they are going to end up with anyway) however I could deny the subcontractor VLAN access to the VPN connection back to HQ...
He's convinced that AD is set up "wrong" because of the prevalence of "domain users" being used everywhere and this is an excuse to "set it up right and if it would have been set up right from the beginning we wouldn't have to do this". So apparently your not supposed to use "domain users"...
He wants to create AD accounts for all the subcontractors (which will end up with a bunch of inactive AD accounts after a while because while we will be told when a new subcontractor starts I can pretty much guarantee you that we won't be told when the subcontractors leave) then modify all of...
average of 6 shares per server across 30 servers = 90 shares, plus group policy, plus IIS. If I had a junior admin I'd totally set them loose on it. Actually even if I had a junior admin I'd have them doing other things. It would be easier to deny them access to resources right at the switch...
Boss is not satisfied with the NAS idea. According to him there "has to be some way to do it through AD". Frankly I don't have time to go through all of our network shares on all of our servers and either remove domain users or add an explicit deny to a "subcontractor" group. I told him that...
Not a horrible idea but I'd have to get the funds to purchase the NAS. Then there is also the issue of backing the NAS up, but that shouldn't be too hard. Can some NAS devices support both AD and local accounts? I've only used them for one or the other, never both.
We are opening up a new office. In this office about 1/2 the people there will be our employees, on our domain, and have no problems accessing our network shares. The other 1/2 of the employees will be subcontractors. They won't be our employees, won't be using our company computers thus will...
I would imagine that it's possible but I would also imagine that it would depend on what your WAP can do. IE if the WAP itself can forward the radius auth or not.
My network has started to approach the point where it's starting to get really time consuming to check the logs on each individual server. Right now what I do is to connect to each of my 22 servers and check the log files on them individually. Rather time consuming. Ideally what I'd really...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.