Solved

trusted computer

Posted on 2006-11-08
3
257 Views
Last Modified: 2010-04-18
I have a AD domain and a 2003 stand alone server at different locations.    I would like to be able to setup a trust relationship between the two.  Isn't there a way to make the standalone a trusted computer?  It looks lik in AD Domains and Trusts it wants another domain.  Thnaks!
0
Comment
Question by:sysdj
3 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 125 total points
ID: 17901953
Trusts are indeed between domains not computers. To create a trust you need a domain. Otherwise you might as well just join the server to the domain and acheive the same thing :)
0
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 17901961
>>Isn't there a way to make the standalone a trusted computer?
not that i know of, and i can't think of a reason why you would want to do this since the end result would be that computer being in the domain.  So why not just put that computer in the domain?

>>It looks lik in AD Domains and Trusts it wants another domain
that is by design.  the AD domains and Trusts snap in is where you make two or more domains trust eachother.

if you could tell us the WHOLE situation and what you are ultimately trying to accomplish perhaps we can help you out, but with only the peice of the puzzle that you have given us it is kind of hard to help you.

0
 
LVL 2

Expert Comment

by:ThePerfectK
ID: 17902025
Just like mikeleerbrla said, if you accomplish what you described (trust between a stand-alone computer and a domain), you would then have the computer being a member of the domain.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Organizations create, modify, and maintain huge amounts of data to help their businesses earn money and generally function.  Typically every network user within an organization has a bit of disk space to store in process items and personal files.   …
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question