Windows 2012 R2 domain with 2012 and 2008 member servers. In the last couple of days I'm seeing various permissions issues affecting domain admins.
UAC control is asking for username and password when popping up - continues fine once the details are given, but as a domain admin this would normally just show the UAC notification without asking for account details.
Access to various admin shares is requiring entering of username and password.
Security logs on a number of servers are inaccessible - access denied.
dcddiag shows everything fine. Have run netdom verify on the affected member servers - all ok. Nothing of interest in the logs - although can't get into the security logs as mentioned.
Sorry - schoolboy error. I didn't realise a GP was applied yesterday to the application server OU to give the developers admin rights. Other admin had neglected to explicitly include domain admins which
If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.
In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target.
To install the necessary roles, go to Server Manager, and select Add Roles and Featu…