Solved

overriding no access

Posted on 2002-04-19
4
136 Views
Last Modified: 2010-04-13
can I, as a domain admin, view the contents of a PC, when a user (who was a local administrator) has taken the domain admin rights off a pc?
0
Comment
Question by:jg733
  • 3
4 Comments
 
LVL 32

Expert Comment

by:jhance
ID: 6954996
Isn't this a duplicate question?
0
 
LVL 32

Expert Comment

by:jhance
ID: 6954997
Indeed it is...

http://www.experts-exchange.com/win2k/Q.20291542.html

You may want to delete this one and get your pts. back.
0
 
LVL 1

Author Comment

by:jg733
ID: 6955133
jhance, answer me this and I'll let you have the points for this too.

If the domain admins account is removed, then how will the script be run? Does it run as a system account?

If you know the syntax off the top of your head, that would be helpful as well. 2K class was LAST february for me.
0
 
LVL 32

Accepted Solution

by:
jhance earned 100 total points
ID: 6955140
It depends.  But most often the logon script is run in the context of the user who is logging on.  Since this user is a local admin, doing what you want is not a problem.

Other variations of this involve services to do the work and run in the security context of the service.

I don't recall the syntax but I know there are examples of this stuff in the RESKIT.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Adprep 12 84
Virtualise server 2000 for Hyper V 4 856
Group Policy 9 559
Windows 2000 undelete (free program?) 6 435
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
ConnectWise and their customers need to ensure critical alerts automatically reach the right person at the right time. MSP superheros efficiently respond to these alerts key is providing automatic, intelligent alerting that generates a complete audi…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question