?
Solved

overriding no access

Posted on 2002-04-19
4
Medium Priority
?
140 Views
Last Modified: 2010-04-13
can I, as a domain admin, view the contents of a PC, when a user (who was a local administrator) has taken the domain admin rights off a pc?
0
Comment
Question by:jg733
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 32

Expert Comment

by:jhance
ID: 6954996
Isn't this a duplicate question?
0
 
LVL 32

Expert Comment

by:jhance
ID: 6954997
Indeed it is...

http://www.experts-exchange.com/win2k/Q.20291542.html

You may want to delete this one and get your pts. back.
0
 
LVL 1

Author Comment

by:jg733
ID: 6955133
jhance, answer me this and I'll let you have the points for this too.

If the domain admins account is removed, then how will the script be run? Does it run as a system account?

If you know the syntax off the top of your head, that would be helpful as well. 2K class was LAST february for me.
0
 
LVL 32

Accepted Solution

by:
jhance earned 400 total points
ID: 6955140
It depends.  But most often the logon script is run in the context of the user who is logging on.  Since this user is a local admin, doing what you want is not a problem.

Other variations of this involve services to do the work and run in the security context of the service.

I don't recall the syntax but I know there are examples of this stuff in the RESKIT.
0

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What's worse than having your data encrypted by ransomware? Getting attacked by a so-called "wiper," which simply destroys the data and offers you no hope of ever seeing it again.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question