Need to regain access to Win2k server when bad security policy is in place.

Posted on 2004-11-04
Last Modified: 2010-04-14
Here's the problem....  We are creating a ghost image for a win2k server that was joined to active driectory.  We disjoined the server from the domain to run sys prep before creating the image.  There was a security policy in place that doesn't let you log into the machine once disjoined from the domain.  So at this point we can not log into the server.

Is there a way to get into the machine at this state?  Magic boot disk or something along those lines?

Any help would be great.

If answers are sent via e-mail please CC: and
Question by:westonp
    LVL 1

    Accepted Solution

    use a client that is in a workgroup, not a domain.  
    Start - Run - type mmc, and add a new snapin for group policy.  click browse, then the computers tab, select connect to another computer, and type in your problem computer.
     it will ask for credentials, and you can go in and change the settings.
    the client you connect from has to be in a workgroup though.

    Author Comment

    When it asks for the credentials we get an error.  Access is denied.  Basically the same thing as the normal login screen.  Any thoughts?
    LVL 1

    Expert Comment

    are you logging in as Domain\username
    LVL 6

    Expert Comment

    I don't suppose you could easily add this offending server back into the domain (like it's still sitting in the rack)?  If so, you could then you could remove the offending policies I imagine.  

    Another thought I had is that if you could boot to command prompt, you can try resetting the local security policy:

    However, IT's A SERVER.  I get real antsy telling people what to delete off of their servers...


    Author Comment

    We ended up rebuilding the machine.  With the security policies in place here there wasn’t much we could do.  

    Featured Post

    What Security Threats Are You Missing?

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    Join & Write a Comment

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    Local Continuous Replication is a cost effective and quick way of backing up Exchange server data. The following article describes the steps required to configure Local Continuous Replication. Also, the article tells you how to restore from a backup…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now