Solved

Logging into Domain

Posted on 2002-05-04
2
266 Views
Last Modified: 2010-04-13
I am planning on setting up my Win2k laptop to log into a domain where I work. But before I do I just want to make sure of a few things. First, if i setup my laptop to logon to my work domain will I be able to use my computer when I am not connected to the domain? Second, are there any win2k services that need to be running?

0
Comment
Question by:GreatOne
2 Comments
 
LVL 3

Accepted Solution

by:
hnminh earned 50 total points
Comment Utility
To access MS network resource, you only need to have "Client for Microsoft Network" installed with proper network protocol configuration (could be TCP/IP or NetBEUI) depend on which one is being used on your network. Check this in your network interface's general tab and consult your system admin.

Ask your system admin if you have to join the laptop into the domain, you will need his help if this is a must. By login into the domain, you will use a different profile which means different "My Documents" folder, different Outlook Express or MS Outlook mailbox, different desktop setting,etc... from the profile you are using before join into domain. This profile, including domain account's password, is stored locally on your laptop so that you dont need to be hooked up into the network to be able to use network account to login locally.

If your system admin say your laptop need not to be a domain member to be able to access network resources, you can leave your laptop in workgroup mode, ie. changing nothing. With properly configured network protocol (WINS with TCP/IP for ex.) you will be able to see your network resources in network neighborhood and will be asked for netowrk (domain) username and password first time you try to access these resources after bootup. You will have to give the username in form of DOMAINNAME\username to be successfully login into the network.

Good luck!
0
 

Author Comment

by:GreatOne
Comment Utility
Thanks for the help. I was able to get to all the resources without having to join the domain.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Learn to move / copy / export exchange contacts to iPhone without using any software. Also see the issues in configuration of exchange with iPhone to migrate contacts.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now