Link to home
Create AccountLog in
Security

Security

--

Questions

--

Followers

Top Experts

Avatar of Andrew N. Kowtalo
Andrew N. Kowtalo

the security database on the server does not have a computer account for this workstation trust relationship
Hi guys I have a contractor with a windows 10 pro workstation that is unable to get into the domain.   This may be caused by a date and time problem or his machine has been off the domain far too long.   Problem is I do not know the local admin pw to remote in and take it off the domain and re-add it again to the domain.   No matter who I login with domain wise its throwing this error.   I noticed the machine name was not in AD anywhere so I created it however its not helping.   Any thoughts or suggestions?

User generated image

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


ASKER CERTIFIED SOLUTION
Avatar of David Johnson, CDDavid Johnson, CD🇨🇦

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.
Create Account

Avatar of Andrew N. KowtaloAndrew N. Kowtalo

ASKER

Dave one other thing I found is RMM the tool I use has a component to create local admin users.  I can make one with that remotely login take it off the domain and readd it.

Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.

Security

Security

--

Questions

--

Followers

Top Experts

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.