Solved

Force use of specific logon server

Posted on 2010-09-01
6
2,468 Views
Last Modified: 2012-08-13
One of our sites has no local dc or servers. When users logon they get authenticated by DC's in one of our other sites. Which DC varies. How can I force this site to always use a specific DC?
0
Comment
Question by:JWSIT
6 Comments
 
LVL 5

Expert Comment

by:helpnet
Comment Utility
Is it authentication that is the problem, or is it more drive mapping and scripts.  Do you have different sites set up in your active directory at the moment.  and do you have a container structure for user accounts that in some way reflects where they are physically located.  

 If it is scripts and drive mapping that is the issue more than authentication, Create a container for the location in Active directory, and in the login script for the container specify the server to map to.
0
 
LVL 6

Expert Comment

by:rjunaid79
Comment Utility
Microsoft has described how a client initiate domain controller locator request in the following url,

http://technet.microsoft.com/en-us/library/cc961830.aspx

if you trying to force your clients to use a specific DC, then follow the steps given in the following article,

http://www.windowsitpro.com/article/domains2/how-can-i-force-a-client-to-validate-its-logon-against-a-specific-domain-controller-.aspx
0
 
LVL 24

Accepted Solution

by:
MojoTech earned 50 total points
Comment Utility
Why not just accociate the remote sites IP/Subnet in sites and services under the site containing the DC's you wish them to use for authentication, at least that way they will go elsewhere if that site becomes unavailable for some reason.






0
 

Author Comment

by:JWSIT
Comment Utility
Have associated that office IP/subent to the site containing the requried DCs. Will keep an eye on it to see if this is working properly.
0
 
LVL 74

Expert Comment

by:Glen Knight
Comment Utility
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
AD FSMO Issues 14 62
Windows 2008 R2 _MSDSC Delegation 8 34
Trasfering FSMO roles 8 72
Authentication type 1 24
Mapping Drives using Group policy preferences Are you still using old scripts to map your network drives if so this article will show you how to get away for old scripts and move toward Group Policy Preference for mapping them. First things f…
Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now