Solved

W32time How do i know if it is encrypted?

Posted on 2011-02-15
9
517 Views
Last Modified: 2012-08-13
Our Domain Controller  time service is synchronizing the system time with the time source (pool.ntp.org)

How do i know if it is encrypted?
How do I know the Version?

I am on windows 2008 Server
0
Comment
Question by:pbtech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 3
9 Comments
 
LVL 27

Expert Comment

by:Tolomir
ID: 34898529
why should it be encrypted, htis is a free service
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34898616
did test on a German windows 7, see screenshot
15-02-2011-18-08-24.png
0
 

Author Comment

by:pbtech
ID: 34900050
I dont need to know about if it is encrypted.

How do i find out the version
0
Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 34900158
there is version 3 released, and version 4 in development. So I guess, usually you should get v3  
0
 

Author Comment

by:pbtech
ID: 34900190
Can i type something on teh server to display the version
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34901128
Yes in fact you can. Make sure that the W32Time service is running.

Then enter on the shell




w32tm /config /syncfromflags:manual /manualpeerlist:"pool.ntp.org"
w32tm /config /reliable:YES /update
w32tm /resync

Open in new window

0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34901163
and you get this:

149794 21:23:27.8620978s - | LeapIndicator: 0 - no warning;  VersionNumber: 3;  Mode: 4 - Server;  LiVnMode: 0x1C

Tolomir
149794 21:23:27.6530858s - Polling peer pool.ntp.org (ntp.m|0x0|0.0.0.0:123->108.71.253.20:123)
149794 21:23:27.6530858s - Peer poll: Max:1024.0000000s Cur:00.0000000s
149794 21:23:27.6530858s - PeerPollingThread: waiting 1024.000s
149794 21:23:27.8620978s - ListeningThread -- DataAvailEvent set for socket 1 (0.0.0.0:123)
149794 21:23:27.8620978s - ListeningThread -- response heard from 108.71.253.20:123 <- 10.161.134.2:123
149794 21:23:27.8620978s - /-- NTP Packet:
149794 21:23:27.8620978s - | LeapIndicator: 0 - no warning;  VersionNumber: 3;  Mode: 4 - Server;  LiVnMode: 0x1C
149794 21:23:27.8620978s - | Stratum: 1 - primary reference (syncd by radio clock)
149794 21:23:27.8620978s - | Poll Interval: 10 - 1024s;  Precision: -20 - 953.674ns per tick
149794 21:23:27.8620978s - | RootDelay: 0x0000.0000s - unspecified;  RootDispersion: 0x0000.0011s - 0.000259399s
149794 21:23:27.8620978s - | ReferenceClockIdentifier: 0x47505300 - source name: "GPS"
149794 21:23:27.8620978s - | ReferenceTimestamp:   0xD1056D4D9EF0B9C0 - 12942278605620860700ns - 149794 21:23:25.6208607s
149794 21:23:27.8620978s - | OriginateTimestamp:   0xD1056D4FA730A188 - 12942278607653085800ns - 149794 21:23:27.6530858s
149794 21:23:27.8620978s - | ReceiveTimestamp:     0xD1056D4F42756311 - 12942278607259603700ns - 149794 21:23:27.2596037s
149794 21:23:27.8620978s - | TransmitTimestamp:    0xD1056D4F427CED7E - 12942278607259718700ns - 149794 21:23:27.2597187s
149794 21:23:27.8620978s - >-- Non-packet info:
149794 21:23:27.8620978s - | DestinationTimestamp: 149794 21:23:27.8620978s - 0xD1056D4FDCB27100149794 21:23:27.8620978s -  - 12942278607862097800ns149794 21:23:27.8620978s -  - 149794 21:23:27.8620978s
149794 21:23:27.8620978s - | RoundtripDelay: 208897000ns (0s)
149794 21:23:27.8620978s - | LocalClockOffset: -497930600ns - 0:00.497930600s
149794 21:23:27.8630978s - \--

Open in new window

0
 

Author Comment

by:pbtech
ID: 34906461
When I type in the commands I get an "Access Denied" Message
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 34906603
you need administrator permissions for that
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …
The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question