Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Updating the Schema

Posted on 2007-07-24
Medium Priority
Last Modified: 2010-04-20
I am following the following article to enable OWA password reset warnings http://support.microsoft.com/kb/937011. The problem is on step 1, the Schema Update Allowed DWORD doesn't exist on the current schema master but it does appear on the old schema master. Can I create this DWORD on the current schema master or should I temporarily swap the schema master to the original server and change it back when the Exchange problem is fixed?
Question by:ghco
1 Comment
LVL 25

Accepted Solution

Robbie_Leggett earned 1000 total points
ID: 19556112
Create the DWORD.


Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question