Solved

How i can hide the disabled accounts from the user list, when i try to set permisions for a folder on other server?

Posted on 2003-11-17
2
221 Views
Last Modified: 2010-05-18
Hi,

My AD is full of disabled users, because we use exchange 5.5 and other brach office uses exchange 2000 and the ADC created this accounts.

When i'm going to set permirsions for a folder on other server, the user list is very big and slow to show. this is because we have thousands of disabled accounts on the AD.

I cannot delete this accounts.

How i can hide the disabled accounts from the user list, when i try to set permisions for a folder on other server?

Thanks in advance.

Ramon
0
Comment
Question by:ramongon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
ajundra earned 125 total points
ID: 9765594
create an organizational unit somewhere outside your usual (active) user location and move all your disabled users to that unit. then when assigning access rights set the search path to your active user location and you'll only see the accounts included in that path and below.

needs some handwork but this should solve your problem.

nem
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
There are times when I have encountered the need to decompress a response from a PHP request. This is how it's done, but you must have control of the request and you can set the Accept-Encoding header.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question