Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Windows -- Login & File Permissions

Posted on 2009-07-08
2
Medium Priority
?
209 Views
Last Modified: 2012-05-07
What is the easiest way to change an Active Directory user/login/file permissions from "janedoe" to "janesmith" since Jane got married and her new last name is Smith ?
0
Comment
Question by:finance_teacher
2 Comments
 
LVL 71

Expert Comment

by:Chris Dent
ID: 24808414

Hey,

You can simply rename the account in almost all cases. The user profile will still link in, as will any Exchange mailbox.

If any failures are likely it's from third party systems that hook in rather than within AD itself.

Chris
0
 
LVL 20

Accepted Solution

by:
Rick Fee earned 200 total points
ID: 24808419
Rename...just right click the user in Active Directory Computers and Users and rename...then open the properties and select account and you can change from jdoe to jsmith

If you have exchange you can add the email address for the new name.
0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question