Solved

Is there anyway to find out who changed the Domain Mode from mixed to native

Posted on 2003-12-03
7
263 Views
Last Modified: 2010-04-14
Is there anyway to find out who changed the Domain Mode from mixed to native
0
Comment
Question by:NaveedAnwar
  • 3
  • 3
7 Comments
 
LVL 32

Expert Comment

by:Luc Franken
ID: 9869368
Hi NaveedAnwar,

AFAIK only the highest Administrator can do that, someone correct me on that if I'm wrong.

Greetings,

LucF
0
 
LVL 11

Expert Comment

by:adonis1976
ID: 9871428
Naveed:

You should be able to find that out by seeing the System log. You will need to have Domain Admin rights for doing this.

LucF, you dont have to be enterprise admin(highest level) for finding this.
0
 
LVL 6

Accepted Solution

by:
Casca1 earned 500 total points
ID: 9872285
Well, I beleive LucF meant "Only an Enterprise Admin can do that"... 8-)
Which should be correct.
Ummm, NaveedAnwar, do you have auditing enabled?
If not, now would be a good time to do so... And implement privilege use. That way, you'll know who does what.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 6

Expert Comment

by:Casca1
ID: 9876078
Thanks for the points and grade...
Good luck. If you need any more help, just ask.
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 9876095
>>Well, I beleive LucF meant "Only an Enterprise Admin can do that"... 8-)
well, that was what I meant, only you explained it much better, I'm not a native english speaker :-(
0
 
LVL 6

Expert Comment

by:Casca1
ID: 9876328
Oh, No problem, and I meant no disrespect... Just clarifying for the questioner... 8-)
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 9876410
Doesn't matter, I'm fine with that. See you around. :o)
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What is Backup? Backup software creates one or more copies of the data on your digital devices in case your original data is lost or damaged. Different backup solutions protect different kinds of data and different combinations of devices. For e…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now