Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

nltest domain trust question

Posted on 2009-07-14
2
Medium Priority
?
2,596 Views
Last Modified: 2012-05-07
I run the command and get different values for Attr: from quarantine to 0x40 and 0x8.   Does anyone know where I can find out what these mean.  I am pretty sure I already know, but would love an official list, hell I will accept an unofficial list.
0
Comment
Question by:loftyworm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 57

Expert Comment

by:Mike Kline
ID: 24852409
Not sure if this list is what you are looking for
http://support.microsoft.com/kb/228477
see the Using the NLTEST Tool section
Thanks
Mike
0
 
LVL 11

Accepted Solution

by:
loftyworm earned 0 total points
ID: 24854737
I found this also, but it doesn't explain the "0x"  and I can only assume the 8 or 4, but it doesn't quite groove.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Resolving an irritating Remote Desktop connection that stops your saved credentials from being used.
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question