[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Windows 2003

Posted on 2011-10-20
4
Medium Priority
?
193 Views
Last Modified: 2012-05-12
At this moment there are only four users on the Exchange 2010 server - thre users moved from the Exchange 2003 server and one user was a new user.  The new user has Active Sync capabilities while the other three users have no Active Sync.  If you go to ADUC and then go to a user's properties then go to the Security tab and click Advanced - you wil find that the Allow inheritable permissions from the parents...... box is unchecked. The new user that box is checked.  I can check that box but it does not stay check.  What do I have to do to make that box checked  all the time.  Possibly some group policy issue  Thank You
0
Comment
Question by:leoedwards
  • 2
4 Comments
 
LVL 8

Expert Comment

by:npinfotech
ID: 37001732
Does your account have the proper permisions to make the changes stick?
0
 

Author Comment

by:leoedwards
ID: 37001955
We log in as Administrator to make the changes
0
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 1000 total points
ID: 37002058
0
 
LVL 8

Assisted Solution

by:npinfotech
npinfotech earned 1000 total points
ID: 37002071
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question