Domain changes to workgroup after reboot

Posted on 2006-10-30
Medium Priority
Last Modified: 2013-12-04
New laptop set up in a domain with latest patches antivirus and antispyware. Domain user and computer policies active. User is not technical, family member may be....

Is it possible for a for a domain user (non admin) that has local admin rights to a pc (application requirement), to remove that pc from a 2003 domain without knowing the domain admin or local admin account login/password? Also no other domain to join to. Home netwrok is an XP workgroup. If possible, how?
If not, are there any known viruses/malware that can?
Any possibility this is a glitch and not deliberate action by the user?
Question by:doberman65
  • 2

Accepted Solution

trenes earned 750 total points
ID: 17840384
Hi doberman65,

To my knowledge this is possible if the user knows the local administrator account password and that seems to be the case in your situation.
I find it difficult to believe that this is a glitch, but there is always a possibility of that off course

LVL 38

Assisted Solution

younghv earned 750 total points
ID: 17841713
With local admin rights, the user could 'rename' the computer.
That would effectively remove it from the domain.

Post back when you can.
LVL 38

Expert Comment

ID: 18510731
Any new info on this one?

Author Closing Comment

ID: 31431044
Kind of answered it myself, just not looking close enough.
User had "local admin rights" because of an application requirement.
But the user finallly admitted changing to the home workgroup to access other home PCs.... thanks to both

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
The video will let you know the exact process to import OST/PST files to the cloud based Office 365 mailboxes. Using Kernel Import PST to Office 365 tool, one can quickly import numerous OST/PST files to Office 365. Besides this, the tool also comes…
Watch the video to know the simple way to remove or recover or reset lost or forgotten passwords of Outlook PST file. With Kernel Outlook Password Recovery tool such operation is very easy to perform. It is a freeware with limitation to use with 500…

600 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question