Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Logging into workstations as the user, but without their password

Posted on 2006-06-16
3
227 Views
Last Modified: 2010-03-18
Here's the deal. I work for a small company where we have traditionally kept everyone's password on a list in a lock box. We often have to work on someone's machine when they're not here. We have a Windows 2003 Active Directory Domain w/all Windows XP SP2 workstations.

The concept of resetting a password makes everyone upset, so we keep the same passwords for 6-12 months right now.

I'm now looking at changing this policy to changing passwords every 3 months using the built in password management features of Group Policy.

I really need a way to access someone's computer as them to troubleshoot problems without resetting or knowing their current password. 90% of the problems that my users run into are issues that can only be seen when logging in as them. We rely a lot on the convenience of working on computers when people are out of the office.

Is there a way to go about doing this?

Thanks!
Greg
0
Comment
Question by:gregmoore
3 Comments
 
LVL 84

Accepted Solution

by:
oBdA earned 500 total points
ID: 16923385
Nope, sorry. That would undermine any security settings implemented. You either have to reset the user's password, which is an auditable event and will be noticed by the user, or the user will have to tell you his password. Either way, the user is aware that someone was/is/will be impersonating him.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Is there a way to automate exercising the network using a browser 3 71
IPhone using PC internet 17 67
OpenVPN Speed limitation to only 10 mbps 7 178
AD architecture diagram 5 30
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question