Permissions problems when rejoining an XP Pro machine back to the Domain

Posted on 2006-04-27
Last Modified: 2010-04-18
I'm having various permissions problems with the XP Pro machine after it was rebuilt and then rejoined to the Domain.
The operating System is Enterprise Server 2003

When a user that is in the Domain Administrators group logs on to the Domain, using the rebuilt machine, it does not have the  permissions of an Administrator on that machine.  The only way to get those permissions is to log on as the "Domain Administrator".

When I rejoined the machine to the Domain the only thing I did was to log on as a user in the Administrators group of the Domain.  I was kind of surprised that I didn't have t delete the old machine from the Domain and let it add itself back in?

Any help would be appreciated

Question by:c7c4c7
    LVL 7

    Accepted Solution

    add the domain user account in the rebuilt xp machine. if there is domain user like "sales", then add this sales user as a local Administrator in the rebuilt machine.

    Guess you know how to add other wise in the rebuilt XP machine:

    Open Control Panel -> User Accounts

    Since it is allready adde to the domain it will prompt you for the user name and password then give the Domain Administrator username, password and domain name. Once you supplied these credentials you can add the domain user as an administrator in the local machine.

    once you entered into User Account click on add then give the domain user name and domain name and in the permissions select others and in the list it should be Administrator

    Author Comment

    O.K. that works but what I don't understand is

    Why did I have to specify this user explicitly, I had all ready added the Admistrator's group from the Domain to the local machines

    LVL 7

    Expert Comment

    What do you mean "added Administrators froup from the Domain" and how did you do that?

    Author Comment

    I took a look at it and realized that i really had not added the Administrators group.  Sorry for the bum info

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    This may not be a text book method to resolve VSS backup issues but it seemed to have worked on few of the Windows 2003 servers we had issues while performing a Volume Shadow Copy backup. If you have issues while performing a shadow copy backup usin…
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    This video discusses moving either the default database or any database to a new volume.
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now