Solved

overriding no access

Posted on 2002-04-19
4
137 Views
Last Modified: 2010-04-13
can I, as a domain admin, view the contents of a PC, when a user (who was a local administrator) has taken the domain admin rights off a pc?
0
Comment
Question by:jg733
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 32

Expert Comment

by:jhance
ID: 6954996
Isn't this a duplicate question?
0
 
LVL 32

Expert Comment

by:jhance
ID: 6954997
Indeed it is...

http://www.experts-exchange.com/win2k/Q.20291542.html

You may want to delete this one and get your pts. back.
0
 
LVL 1

Author Comment

by:jg733
ID: 6955133
jhance, answer me this and I'll let you have the points for this too.

If the domain admins account is removed, then how will the script be run? Does it run as a system account?

If you know the syntax off the top of your head, that would be helpful as well. 2K class was LAST february for me.
0
 
LVL 32

Accepted Solution

by:
jhance earned 100 total points
ID: 6955140
It depends.  But most often the logon script is run in the context of the user who is logging on.  Since this user is a local admin, doing what you want is not a problem.

Other variations of this involve services to do the work and run in the security context of the service.

I don't recall the syntax but I know there are examples of this stuff in the RESKIT.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question