Question about Microsoft Windows Server Standard 2003 for PC

1 Answer

ACTIVE DIRECTORY FOREST TRUST

SOME USERS ACCOUNT EXPIRED WHILE CREATING A FOREST TO FOREST TRUST

Posted by on

1 Answer

  • Level 1:

    An expert who has achieved level 1.

  • Contributor
  • 1 Answer

What is different between workgroup and domain

Posted on Jul 02, 2008

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

9 Answers

Forgot Vista Administrator password !


There is a way to reset the password and it doesn’t involve reformation and reinstalling Windows. The solution is called Windows Password Recovery 6.0. It can reset almost all Windows passwords in seconds. If you want to know how to use it please visit it on http://www.recoverlostpassword.com/products/windowspasswordrecoery.html

Jan 15, 2010 | Microsoft Windows Vista Home Premium with...

1 Answer

Cannot Open DSA.MSC file error


When you install the Administration Tools Pack on a computer that is running Windows XP Professional x64 Edition, the Active Directory Users and Computers MMC snap-in file (Dsa.msc) is installed in the %windir%\Syswow64 folder. Additionally, the computer's file system maps the Active Directory Users and Computers MMC snap-in to the following path: DriveLetter:\%windir%\Syswow64\Dsa.mscHowever, the Active Directory Domains and Trust MMC snap-in incorrectly specifies the path of the Active Directory Users and Computers MMC snap-in as follows: DriveLetter:\%windir%\System32\Dsa.mscWhen the computer's file system tries to locate the Dsa.msc file from within the Active Directory Domains and Trust MMC snap-in, Mmc.exe is run. Mmc.exe is run because the Dsa.msc file is associated with Mmc.exe. When Mmc.exe is run, it uses the following path to locate Dsa.msc: DriveLetter:\%windir%\System32\Dsa.msc DomainPathAfter the Mmc.exe command is run, the Active Directory Domains and Trust MMC snap-in tries to locate the Dsa.msc file. Because the Dsa.msc file does not exist in the %windir%\System32 folder, the error message that is mentioned in the "Symptoms" section is generated.

To resolve this problem, manually copy the Dsa.msc file from the %windir%\Syswow64 folder to the %windir%\System32 folder.

Your hardware manufacturer provides technical support and assistance for Microsoft Windows x64 editions. Your hardware manufacturer provides support because a Windows x64 edition was included with your hardware. Your hardware manufacturer might have customized the Windows x64 edition installation with unique components. Unique components might include specific device drivers or might include optional settings to maximize the performance of the hardware. Microsoft will provide reasonable-effort assistance if you need technical help with your Windows x64 edition. However, you might have to contact your manufacturer directly. Your manufacturer is best qualified to support the software that your manufacturer installed on the hardware.

For product information about Microsoft Windows XP Professional x64 Edition, visit the following Microsoft Web site:

http://www.microsoft.com/windowsxp/64bit/default.mspx (http://www.microsoft.com/windowsxp/64bit/default.mspx) For product information about Microsoft Windows Server 2003 x64 editions, visit the following Microsoft Web site:http://www.microsoft.com/windowsserver2003/64bit/x64/editions.mspx

May 30, 2009 | Microsoft Windows Server Standard 2003 for...

1 Answer

What is ou?


OU stands for Organizational Unit and is a part of Windows Server Active Directory. When you add an Organizational Unit to Active Directory, this allows you to create a category for computers, or for users, or both. For example, in a high school, I may create an OU for Students and have all my student accounts within this OU, and an OU for Staff, and have all my staff accounts in this OU. Now I can apply GPO's, or Group Policy Objects, to this Organizational Unit, such as Interface controls if I want to lock down student interfaces for example. You can also configure OU's with computers in them. So for example, I may join a set of teacher computers to the Staff Computers OU within Active Directory after these machines have been joined to the domain, and then apply a Policy on that OU that says that ONLY staff accounts may log into these computers to prevent students from logging onto a staff machine.

OU's are extremely handy because you cannot apply policy objects to just a single user or computer. OU's also help keep your Active Directory structure nice and clean.

Hope this helps!

Mar 17, 2009 | Microsoft Windows Server Standard 2003 for...

1 Answer

New User create without password


Go to Start -> Administrative Tools -> Active Directory Users & Computers

Right click the domain name (eg. company.local) go to new -> user.

Fill in the details go to next. leave the password field blank go next and click finish.

Mar 07, 2009 | Microsoft Windows Server Standard 2003 for...

1 Answer

Privileges


you can use Active directory. if you don't have Active directory, right click on the selected folder, choose porperties and then security.
in general term: go to control panel>>users accounts, select the user and select the permission rights you wan them to have. if the user is not listed,
goto control panel>> administrative tools>>computer management>>Local users and groups>> select users and add new user. name and password. (default is user-rights).
then you can go back to user acounts and change their rights.
Adminstrator=Full rights to all folder and file, software installation and uninstall.
Power user= 80% rights to software installation and uninstall, rights to view files not change.
STD user= right to their own folder and files only.

Nov 17, 2008 | Microsoft Windows Server Standard 2003 for...

1 Answer

2003 server


Hey deepak,

Yes, you can change password in 2003 server without any cd.

The thing that manages all the information about Passwords, User Accounts, Printers, And providing permission to all clients that are present on ur network, is "Active Direcory Service"

You must install Active directory to use it's funtionality.

to install active directory-

Go to start -> Run
then type "dcpromo"

Follow the wizard as per your network domain description and requirements.

Restart your computer.

Go to start -> Administrative tools -> and select Active directory users and computers.

In Active directory user and computer snap-in
Expand ur server and click Users.

You will be now able to see different accounts available on ur computer.

Select and right click Administrator and select change password or create password.

Type your password with including any of the capital letter and an digit like "Password01" check and uncheck different parameters given.

(give me ur acknowledgement by rating me)
-
Romy

Aug 02, 2008 | Microsoft Windows Server Standard 2003 for...

3 Answers

DNS


DNS is the primary name resolution service for Windows Server 2003. Active Directory depends on DNS for domain controller location, and DNS influences Active Directory domain naming. Thus, to fully understand Active Directory, it helps to understand how DNS acts as an integral component in the design of Active Directory.

DNS provides Active Directory with both a name resolution service for domain controller location and a hierarchical design that Active Directory leverages to provide a naming convention that can reflect organizational structure.
Typically, a DNS domain namespace deployed to accommodate the Active Directory mirrors the Active Directory domain namespace. In cases where there is an existing DNS namespace prior to Active Directory deployment, the DNS namespace is typically partitioned for Active Directory, and a DNS subdomain and delegation for the Active Directory forest root is created. Additional DNS domain names are then added for each Active Directory child domain.
DNS data is used to support the location of Active Directory domain controllers also. During or after the creation of the DNS zones used to support Active Directory domains, the zones are populated with DNS resource records that enable network hosts and services to locate Active Directory domain controllers.

PS: As sourced from Microsoft Technet Site

Jul 24, 2008 | Microsoft Windows Server Standard 2003 for...

1 Answer

Features of active directory


Active Directory think of it has management system for all network LAN PCs in your domain. You can add users to certain enterprise groups, you can disable accounts, push and pull software application better then you can in SMS domain. I use to to clone user accounts or create new user groups. Very easy to learn. To install on Server requires a domain, DNS. If you're using Windows Server 2003 and setup the server to manage active directory all the options for the installation process will appear for installation. There are a lot of info online and in books if you need more info. There are training classing offer at MS Solutions Centers.

Jul 23, 2008 | Microsoft Windows Server Standard 2003 for...

1 Answer

Active directory


An application directory partition is represented by a domainDNS object with an instanceType attribute value of DS_INSTANCETYPE_IS_NC_HEAD combined with DS_INSTANCETYPE_NC_IS_WRITEABLE. This domainDNS object represents the application directory partition root (NC head), and is named similar to a regular domain partition, for example, "DC=dynamicdata,DC=fabrikam,DC=com", which corresponds to a DNS name of "dynamicdata.fabrikam.com". An application directory partition can, therefore, be instantiated anywhere a domain partition can be instantiated. There is no NetBIOS name associated with an application directory partition.

It is possible to nest application directory partitions, that is, an application directory partition can have child application directory partitions. Searches with subtree scope rooted at an application directory partition head will generate continuation references to the child application directory partitions.

An application directory partition replica can only be created on a domain controller that is running on Windows Server 2003 and later and only while the Domain-Naming FSMO role is held by a Windows Server 2003 and later domain controller. In a mixed forest that has both Windows Server 2003 domain controllers and down-level domain controllers (Windows 2000 domain controllers or Windows NT 4.0 primary domain controllers), an attempt to create an application directory partition replica on a down-level domain controller will fail.

An application directory partition also has a corresponding crossRef object in the Partitions container of the configuration partition. The crossRef can be pre-created manually before creating the domainDNS object. The pre-created crossRef object must have the attribute values shown in the following table or the partition creation will fail. If the crossRef object does not exist, the Active Directory server will create one when the application directory partition is created.

Jul 09, 2008 | Microsoft Windows Server Standard 2003 for...

2 Answers

Is PDC required to create trust between 2 AD 2003 forests.


1. Open Active Directory Domains And Trusts from Administrative Tools.
2. In the console tree pane, select and right-click the domain node for the forest root for which you want to create a trust.
3. Select Properties.
4. Select the Trusts tab in the Properties dialog box.
5. Click New Trust and click Next (skip the Welcome screen).
6. On the Trust Name page, enter the DNS name of the target domain for your trust (for our example, it is Cogswellcogs.com) and click Next.
7. Select Forest Trust on the Trust Type page and click Next. (If the Forest Trust option is missing, you may have omitted one of the prerequisites. In that case, double-check the DNS Forwarders tab and the forest functional level of all the domains in both forests.)
8. Choose a direction for the trust relationship: Two-Way, One-Way Incoming, or One-Way Outgoing.
  • Two-Way: All users in both forests will be able to access all resources in both forests.
  • One-Way Incoming: All users in this forest will be able to access all resources in the other forest but not vice versa.
  • One-Way Outgoing: All users in the target forest will be able to access all resources in this forest but not vice versa.
After you’ve chosen, click Next.
    9. Resource access is still governed by permissions in the domain where the resource exists. The trust direction provides access to all resources where permissions allow access. Select the sides of the trust relationship: This Domain Only or Both This Domain And The Target Domain.
    • This Domain Only: Creates the trust relationship in this domain only; an administrator on the other end will have to complete the other trust.
    • Both This Domain And The Target Domain: Requires sufficient access in the remote domain and will allow you to complete the trust setup.
    10. Select the appropriate path, depending on the choices you made in the previous two steps.
    • If you chose Two-Way or One-Way Outgoing in step 8 and This Domain Only in step 9, you will need to select a trust authentication level. Domain-Wide Authentication will authenticate all users in the remote forest for all resources in the local forest. Choosing Selective Authentication will allow you to specify which users in the remote domain have access to local resources. Click Next. Enter a password for the trust and click Next.
    • If you chose One-Way Incoming in step 8 and This Domain Only in step 9, enter the password for the trust in the Trust Password and Confirm Password boxes. Click Next.
    • If you selected both domains (this domain and the selected domain) in step 9, a username and password box will appear to allow you to enter the username and password of an administrator account in the target forest. Click Next.
    11. On the next screen, verify all of your selections. When you click Next, the wizard creates the trust. Verify the settings of the new trust.
    12. Confirm the outgoing trust. Select Yes if you created both sides of the trust; select No if you did not.
    13. Click Finish in the Creating The Trust wizard.
    The new trust will appear on the Trusts tab in the Properties dialog box for the domain.

    For More information
    http://support.microsoft.com/?id=816301

    http://technet2.microsoft.com/windowsserver/en/library/69cacd89-d5dc-4559-9de7-f5e279e603721033.mspx?mfr=true

    Nov 16, 2007 | Microsoft Windows Server Standard 2003 for...

    Not finding what you are looking for?
    Microsoft Windows Server Standard 2003 for PC Logo

    Related Topics:

    110 people viewed this question

    Ask a Question

    Usually answered in minutes!

    Top Microsoft Computers & Internet Experts

    micky dee

    Level 3 Expert

    2635 Answers

    Les Dickinson
    Les Dickinson

    Level 3 Expert

    18333 Answers

    Brian Sullivan
    Brian Sullivan

    Level 3 Expert

    27725 Answers

    Are you a Microsoft Computer and Internet Expert? Answer questions, earn points and help others

    Answer questions

    Manuals & User Guides

    Loading...