?
Solved

Logging into workstations as the user, but without their password

Posted on 2006-06-16
3
Medium Priority
?
243 Views
Last Modified: 2010-03-18
Here's the deal. I work for a small company where we have traditionally kept everyone's password on a list in a lock box. We often have to work on someone's machine when they're not here. We have a Windows 2003 Active Directory Domain w/all Windows XP SP2 workstations.

The concept of resetting a password makes everyone upset, so we keep the same passwords for 6-12 months right now.

I'm now looking at changing this policy to changing passwords every 3 months using the built in password management features of Group Policy.

I really need a way to access someone's computer as them to troubleshoot problems without resetting or knowing their current password. 90% of the problems that my users run into are issues that can only be seen when logging in as them. We rely a lot on the convenience of working on computers when people are out of the office.

Is there a way to go about doing this?

Thanks!
Greg
0
Comment
Question by:gregmoore
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 85

Accepted Solution

by:
oBdA earned 2000 total points
ID: 16923385
Nope, sorry. That would undermine any security settings implemented. You either have to reset the user's password, which is an auditable event and will be noticed by the user, or the user will have to tell you his password. Either way, the user is aware that someone was/is/will be impersonating him.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question