Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

DHCP W2K MMC meaning of pencil or paint brush sign

Posted on 2002-07-25
3
Medium Priority
?
553 Views
Last Modified: 2012-06-27
Hi!

In the Windows 2000 DHCP MMC there are some entries under address leases marked with a pencil or paint brush sign? I can´t find any info the online help, so a question to you all: Who does know what this means?

Lutz
0
Comment
Question by:Naydowski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
Nenadic earned 400 total points
ID: 7179719
Pencil means "Active and DNS registered"
Have a look at the link below for a description of all icons in DHCP management console:

http://www.microsoft.com/windows2000/techinfo/howitworks/communications/nameadrmgmt/dhcpcons.asp
0
 
LVL 2

Author Comment

by:Naydowski
ID: 7179795
Hi!

Thank you very much. Good hints. This answer helped me really.

Lutz
0
 
LVL 12

Expert Comment

by:Nenadic
ID: 7179797
Pleasure.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Instead of error trapping or hard-coding for non-updateable fields when using QODBC, let VBA automatically disable them when forms open. This way, users can view but not change the data. Part 1 explained how to use schema tables to do this. Part 2 h…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

661 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question