Solved

Lost Norton 360 Identity Safe Passwords

Posted on 2012-03-13
3
865 Views
Last Modified: 2012-03-14
I recently added users to a new SBS 2011 domain, and in doing so lost user settings and data. One of the things I lost for users is their Norton 360 Identity Safe data. Where is the file located? Is it possible to recover this? Thanks!
0
Comment
Question by:johann2118
  • 2
3 Comments
 
LVL 4

Expert Comment

by:Paul-B
ID: 37717849
If you didn't end up migrating any of their data then it might be easier to remove the machine from the domain and then rejoin the domain again and this time make sure you mapped the Domain user account  to the existing local machine users profile so all there stuff will be there.
0
 

Author Comment

by:johann2118
ID: 37718090
i had the issue of the previous user account not showing up on the SBS add tool. any way to get it to show up there? also, just remind me how to remove from domain? I've been at this almost nonstop and my mind is just screwed. thanks for your help!
0
 
LVL 4

Accepted Solution

by:
Paul-B earned 500 total points
ID: 37718222
I had this issue as well the last time i joined machines to sbs 2011 and if i remember correctly what I had to do is create a new local user account on the machine. So like if the original user name was Steve i made a new account called Steve2 and then logged in as Steve2 for the first time, then logged out. Logged in as admin (or any admin account on the local machine thats not Steve or Steve2) and then copy everything under C:\Users\Steve to C:\Users\Steve2. This was about 4 months ago so its possible I just copied everything but the dat files. Once I did this i was able to migrate the newer Steve2 account which could be seen.

To remove it from the domain go to Control Panel > System  and then when the dialog comes up click on "Computer Name" tab (if its not already on there) and click the lower right side button "Change.." and click the lower are box for Workgroup which unticks Domain, click OK and then it will tell you that you need to restart the system to take effect.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question