Solved

Active Directory Log-Ons

Posted on 2006-07-08
8
312 Views
Last Modified: 2010-03-19
How can one tell how a PC is configured to allow users to authenticate? If I recall right, you can go to "My Computer," right-click and select "manage"...(?) And I forgot the rest.

In other words, we have an AD server on our local network, which we authenticate to when we are plugged into the local segment. Each person has an Active Directory profile/account, of course. yadda yadda yadda...

OK...but we also use our laptops out in the field, and I know we are not authenticating to any server when we are out in the field. We power up the laptop, enter our log-on credentials when prompted, and then the laptops boot up to the correct profile and we go on our merry way.

So, how can I access the configurations on my PC that dictate how a user will authenticate in each situation? After I view the configs, I will either have my other questions answered or I will ask some more.

Thank you to all in advance
0
Comment
Question by:ex-engineer
  • 2
  • 2
  • 2
8 Comments
 
LVL 22

Accepted Solution

by:
rickhobbs earned 63 total points
Comment Utility
If you right-click on "My Computer" and go to "Properties", Click on the "Computer Name" tab.  If it has a Domain field and a name in the field, you are authenticating to that AD server.  If you select the "Advanced" tab and hit the "Settings" button, you will see what user profiles are on that machine.  The user profile and login password are cached unless you have turned of caching in Local Security.
0
 
LVL 1

Author Comment

by:ex-engineer
Comment Utility
OK...but we also use our laptops out in the field, and I know we are not authenticating to any server when we are out in the field. The AD server sits on a private network behind a router and port forwarding is turned off.

We power up the laptop, enter our log-on credentials when prompted, and then the laptops boot up to the correct profile and we go on our merry way. What is the chain of events that takes place right after you turn on the PC when it is out in the field?
0
 
LVL 12

Assisted Solution

by:r_naren22atyahoo
r_naren22atyahoo earned 62 total points
Comment Utility
>>>So, how can I access the configurations on my PC that dictate how a user will authenticate in each situation? After I view the configs, I will either >>>have my other questions answered or I will ask some more.

Right Click My Computer,
manage
Local Users and Groups>>Expand
Groups
on Right double click power users
click add
click on locations
select domain
Enter domainName\loginName
click OK
now it will add a login some thing like this loginname@domainname.local

Now this login will have rights to login locally and as power user
when on domain the login scripts will be executed.

regards
naren

0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 12

Expert Comment

by:r_naren22atyahoo
Comment Utility
this has to be done while in the domain, they way the same profile will be used when out of domain
0
 
LVL 22

Expert Comment

by:rickhobbs
Comment Utility
WHen you are out in the field it authenticates to the cached credentials and profiles.  That is the default action of XP.
0
 
LVL 1

Author Comment

by:ex-engineer
Comment Utility
Thanks for all the information, folks! You have a been a great help and I appreciate it. I will check this out and be back.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now