?
Solved

Domain field changes to local machine after re-login

Posted on 2012-09-18
2
Medium Priority
?
313 Views
Last Modified: 2012-10-08
Hi Windows Experts,

I got some issues with my customer's VM's right now (windows xp), when I tried to login using domain credential (username, password, domain), then after a few minutes and session timeouts the screensaver kicks in which I find normal, but when I try to re-login to input my domain credential the domain field changes to Local Machine instead of the domain.

Although users can still re-login by changing it back or choosing the right domain.

But is there any registry or group policy is taking effect on this? which part should i look for to find the root cause? And how do I force it to make it default to use the domain instead of local machine?
0
Comment
Question by:SandMan
2 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 2000 total points
ID: 38409332
Check these keys in registry if there is no local machine defined

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\WinLogon

"DefaultDomainName"

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\WinLogon

"AltDefaultDomainName"

Regards,
Krzysztof
0
 

Author Closing Comment

by:SandMan
ID: 38475861
Thanks for helping Krzyztof
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Here's a look at newsworthy articles and community happenings during the last month.
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question