Solved

Windows Trust Issue

Posted on 2009-04-14
1
677 Views
Last Modified: 2012-06-27
Two Windows 2003 forests with a validated trust set up.  This is across a VPN tunnel on two Cisco ASA 5510s.  On a few of my servers, if I go into Computer Management and Local Users and Groups and try to add users from DomainA into local groups on a computer in DomainB, I select the Location (DomainA), I hit Check Names and it resolves the name correctly (Test User {tuser@domainb.local) but when I click OK it throws this error:

"The domain controllers required to find the selected objects in the following domains are not available: DomainA.  Ensure the domain controllers are available, and try to select the objects again."

I can ping both domain controllers in DomainA from the machine i'm trying to add users to.

On the other hand, going the other direction when trying to add users from DomainB into local groups on a computer in DomainA I cannot "Check Names" and I cannot browse the groups using the advanced options.  I get the following error

The following error prevented the display of any items:

The system detected a possible attempt to compromise security.  Please ensure that you can contact the server that authenticated you.
0
Comment
Question by:dlabbadia01
1 Comment
 

Accepted Solution

by:
dlabbadia01 earned 0 total points
ID: 24263218
This had to do with NETBIOS communication between the two domains over a layer 3 switch.  Setitng up LMHost files on each computer resolved the issue.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question