Solved

about RAS account in win 2000 server

Posted on 2006-06-25
3
172 Views
Last Modified: 2013-12-04
Hi. I am a new administrator in a small company.
The former admin gave me admin password when he leave.
But he seems like he comes into system through RAS and deleted
some program in my admin desktop.
We are running Windows 2000 server with one domaim, no OU.
Where can I see all the services we are currently running in Win 2000 server.
How do I know whether he set up RAS server service or not and accessable user ?
How can I remove his user account ?
Thank you for your time.
My email is <email address removed>
0
Comment
Question by:hansonchoi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Author Comment

by:hansonchoi
ID: 16979938


Hi. I am a new administrator in a small company.
The former admin gave me admin password when he leave.
But he seems like he comes into system through RAS and deleted
some program in my admin desktop.
We are running Windows 2000 server with one domaim, no OU.
Where can I see all the services we are currently running in Win 2000 server.
How do I know whether he set up RAS server service or not and accessable user ?
How can I remove his user account ?
Thank you for your time.
0
 
LVL 13

Accepted Solution

by:
rhickmott earned 100 total points
ID: 16990700
Run rrasmgmt.msc

That will tell you if the RRAS service is running. If so Disable and Stop it and check nothing like VNC is running which could also allow remote access.

Go into your Active Directory Users and Computers and under each user check the "Dial In" tab to make sure that no users can dial in remotely via dial-up or VPN. And remove any old accounts associated with him and change the Administrator Passwords.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question