[Last Call] Learn how to a build a cloud-first strategyRegister Now


Windows 2003

Posted on 2011-10-20
Medium Priority
Last Modified: 2012-05-12
At this moment there are only four users on the Exchange 2010 server - thre users moved from the Exchange 2003 server and one user was a new user.  The new user has Active Sync capabilities while the other three users have no Active Sync.  If you go to ADUC and then go to a user's properties then go to the Security tab and click Advanced - you wil find that the Allow inheritable permissions from the parents...... box is unchecked. The new user that box is checked.  I can check that box but it does not stay check.  What do I have to do to make that box checked  all the time.  Possibly some group policy issue  Thank You
Question by:leoedwards
  • 2

Expert Comment

ID: 37001732
Does your account have the proper permisions to make the changes stick?

Author Comment

ID: 37001955
We log in as Administrator to make the changes
LVL 76

Accepted Solution

Alan Hardisty earned 1000 total points
ID: 37002058

Assisted Solution

npinfotech earned 1000 total points
ID: 37002071

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question