• 1 Votes
    44 Posts
    13k Views
    wrx7mW

    @Brett Depending on what FFL or DFL you are on, you won't even be able to use GPP to create a user because of the lack of password access in newer versions. I tried and it wouldn't work because I had to have a password per the policy but I couldn't add one per the change in GPP. The workaround was a script that I have for new machines that adds a local account via GPO startup script then adds it to the local administrators group. The new PC stays in a temporary OU for a few things to be installed, then moved to the permanent OU where the remaining items are run, including the installation of LAPS, which then changes the newly-created local admin password.

    Here is the bat file that is called in the startup:

    net user "My Admin" mypassword /add /passwordreq:yes /fullname:"My Admin"
    net localgroup Administrators "My Admin" /add

  • ERL and Layer Two processing

    7
    0 Votes
    7 Posts
    3k Views
    scottalanmillerS

    @coliver said:

    Do VPN connections get created/torn down with every communication? Or are they persistent until the device disconnects?

    Normally neither. They are normally persistent until a certain amount of time, then they tear down when idle. Might be hours or days. That way they don't remain absolutely forever, but normally a very long time.

  • PuTTy Alert

    2
    0 Votes
    2 Posts
    371 Views
    DanpD

    Looks like a false positive.

  • ZeroTier Controller setup needs sqlite3.h

    18
    1 Votes
    18 Posts
    5k Views
    wirestyle22W

    @JaredBusch said:

    @wirestyle22 said:

    @JaredBusch said:

    Controller is up and working well as a client. Easily joined the test network I setup on ZT's site.

    Now to figure out how to create my own network.

    Did you create a guide to how you achieved this? I've heard it's somewhat difficult. Also, is anyone testing the performance difference between self-hosted and hosted?

    I have not setup the controller yet. I had other priorities form noon and beyond today.

    It'll be interesting to see. I appreciate all of your effort

  • Migration Operation Master not changing

    4
    0 Votes
    4 Posts
    898 Views
    DashrenderD

    @RoopanKumar said:

    @Dashrender As far searched they have full fsmo transfer kind of document i just want to transfer only the three (RID,PDC,infra)

    So only do the three that you want. Each one has to be done individually, unless you allow it to be done automatically by uninstalling ADDC from a server (not advised).

  • Veeam® Endpoint Backup™ FREE 1.5 is now available!

    14
    6 Votes
    14 Posts
    7k Views
    angrydokA

    @Danp You can open a support case let our support team investigate it.

  • FreePBX Update Ports

    9
    1 Votes
    9 Posts
    1k Views
    stacksofplatesS

    I don't want to post my number lol.

  • Mondo Rescue

    1
    0 Votes
    1 Posts
    286 Views
    No one has replied
  • Ubuntu 15.10 installing for the first time

    12
    2 Votes
    12 Posts
    3k Views
    DustinB3403D

    Updated.

  • A slow descent into burnout

    34
    1 Votes
    34 Posts
    10k Views
    scottalanmillerS

    @RamblingBiped said:

    @scottalanmiller said:

    Do you remember if you saw Ohio? It would have either been Ontario + Michigan or it would have been Ohio + Indiana.

    If he can't remember that portion of the trip it was probably Ohio and Indiana... X-D

    I was totally thinking of a smart ass way to say the same thing, LMAO.

  • Using Curl to Access Spiceworks

    1
    1 Votes
    1 Posts
    1k Views
    No one has replied
  • Windows 10 bitlocker in a domain

    8
    3 Votes
    8 Posts
    933 Views
    coliverC

    @Dashrender said:

    @coliver said:

    @Dashrender said:

    @coliver said:

    I'll post my directions that I created for our documentation tomorrow. Once the computer connects to AD the user has to configure bitlocker and the drive won't encrypt until the keys are backed up. It works really smoothly.

    Does it require TPM? Is there a boot time password?

    TPM is not always required. For us it is. There is a boot time password configured by the user.

    So it's not their domain password?

    Nope... well at least not for the system drive. I haven't checked about a secondary drive.

  • Administrative Access On Windows Endpoints

    21
    0 Votes
    21 Posts
    2k Views
    BRRABillB

    @JaredBusch

    It put the "idiot" in IT.

    😮 😮 😮

  • when shopping for equipments.. do you look our for Tax or no Tax ?!

    6
    0 Votes
    6 Posts
    663 Views
    J

    When our company files taxes they have to pay it either way..

  • Microsoft Audit

    35
    0 Votes
    35 Posts
    4k Views
    Deleted74295D

    So....any news on this audit?

  • Exchange 365 Down?

    38
    1 Votes
    38 Posts
    7k Views
    scottalanmillerS

    @wrx7m said:

    @scottalanmiller I would also say people have the same view of MS Windows updates. There have been several over the past couple of years that have really screwed some people. Just like a hosted outage can affect a large number of users, so can these updates. The main difference, for many, is they have a degree of control over when/if the updates are applied but is not necessarily true of hosted services. So when something breaks it tends to be more surprising because they weren't expecting a change.

    Yes, there is a bizarre, irrational reaction to very rare update problems.

  • Automating Chocolatey with PsExec

    3
    2 Votes
    3 Posts
    2k Views
    A

    @Dashrender said:

    damn, I forgot about this post!

    Me too!

  • XS file systems

    22
    1 Votes
    22 Posts
    3k Views
    scottalanmillerS

    Some systems that have had snapshots for as long as I can remember...Solaris, AIX, BSD, Linux, HP-UX and, at some point later after we had been long mocking it for lacking them, Windows. Mac is not enterprise and might have it, but I have no idea. It did at one point via ZFS but might have reverted and lost that functionality.

  • Linux Mint "Deep Freeze" Program

    18
    1 Votes
    18 Posts
    3k Views
    scottalanmillerS

    There are basically two ways to approach it...

    Read Only filesystem where it never changes, period. Snapshot filesystem that "rolls back" after being used. (Deep Freeze approach)

    The later is useful more for testing that normal use. It makes the users THINK that they are making changes but then deletes them without warning. Good for a lab, bad for a normal desktop.

  • Proxy IP Resolving but name not resolving??

    6
    0 Votes
    6 Posts
    854 Views
    scottalanmillerS

    @Lakshmana said:

    I can telnet the proxy name and IP.But the IP can only be used browsing purpose.I have already used the name the proxy for browsing purpose

    But why would you use the name of the proxy when browsing? You are not explaining what the user is doing. Maybe a screenshot would help? You don't browse TO the proxy, you browse THROUGH a proxy. It sounds like the issue is in misuse of the browser rather than a technical issue.