Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Time Synchronization

Posted on 1997-04-29
1
Medium Priority
?
273 Views
Last Modified: 2013-12-23
I can't configure timeserve.  I configured the timesrv.ini file accordingly but the event logger keeps saying can't find secondary time source.  Does anyone have a working timesrv.ini file to hand me?
0
Comment
Question by:mvuong
1 Comment
 
LVL 5

Accepted Solution

by:
cer earned 150 total points
ID: 1559998
Here it goes:

 ====== the TIMESERV.INI =======
[TimeServ]
Type=NTP
PrimarySource=\\TIMESOURCE
Period=0
Port=\\.\COM1
ModemCommand=AT&D2&Q0DT
Prefix=
PhoneNumber=1 303 494 4774
NTPServer=<put IP-adress of your Timeserver here>
timesource=yes
Log=no
SecondaryDomain=
Speed=300
RandomPrimary=yes
Hour=6
TAsync=no

====================
Not all entries are necessary. Why you are using a secondary timesource? It is only for NT-computers in your Domain or workgroup which already run timeserv.

0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Measuring Server's processing rate with a simple powershell command. The differences in processing rate also was recorded in different use-cases, when a server in free and busy states.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question