Jump to content

chilifrei64

Member
  • Posts

    996
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

Everything posted by chilifrei64

  1. yeah what your asking is not completely possible with GPO. Especially if the workstations are already deployed and users have already logged on. your best bet for moving the proviles now is either redirecting the important folders (My Docs, Desktop) using the redirected folders in GPO or just setting them up roaming profiles... Here is a thought.. in there user account under the profile tab in ADUC, there is an option for profile path(this is one way on setting up roaming profiles) see if you can change that to a local path(ie. D:\users) instead of a UNC. I havent tried this but in theory....... it should work.. You would however also have to run a script to copy their current profile to the new one. There is my little brain dump....
  2. I have experienced sometimes where after you create the account it does not get added to the global address list(GAL) immediately. The GAL is created at different intervals. If the user is not in the GAL, you will not be able to resolve the name when you set up the machine. Go into the Exchange System Manager and update the GAL manually then try to set up the account. What outlook client are you using?
  3. Most applications use a specific protocol for a reason. Changing it might not work. What application are you trying to change the port on?
  4. A couple of devices I know can do it are obviously Cisco routers.. you will need a dual wan router. but you are talkin expensive stuff.. Sonicwall firewalls have a feature pack that will allow you to load balance multiple lines however you are still nearing the 1000 dollar mark.. Your cheapest bet is to go with one of those linux routers and have them do it. It is just simple routing and path manipulation. EDIT: after reading about product posted by KRYOGENUIS. 39 bucks is hardly a bad deal http://www.gohawking.com/store/product_inf...products_id=104
  5. Where specifically are you applying these permissions, Exchange (fortunately and unfortunately) can have permissions changed on nearly 10 different levels.
  6. does the event viewer(eventvwr) say anything. Normally, it a script is configured in the user properties and doesnt run, it will normally tell you why
  7. is the path of the script in the user properties pointing to a local drive (c:\login.bat) or to a UNC that everyone has access to(\\server\share\login.bat) and when you log on to the workstations can you take that same path that you typed in user properties and run it from the workstation?
  8. where is the group policy applied to in conjunction to what OU the users are in. Apply the script to authenticated users and over the OU the users are in and see if that works.. if it does, go back from there until you have it applied at the spot you want it.
  9. yeah it really all depends on what you are trying to do. we are going to need more details.. like what equipment you are going to be using between the vlans(router or layer3 switch), why you are considering vlans, security concerns.... Really, unless you are having traffic problems, there is no real need for vlans...
  10. I have a few scripts on my site you might want to look at Remotely uninstall software. http://lazynetworkadmin.com/content/view/16/6/ this one is a little tricky but has worked for me on a couple of different scenarios. and this one Mass Delete Registry Keys http://lazynetworkadmin.com/content/view/25/6/ This one will read registry keys off of a text file and delete them. This only works for registry keys though but it sounds like that is what you are looking for.
  11. Then you are doing the right thing.. (atleast according to me.) a quick tip of advice, and maybe you are already going to do this. Spend alot of time planning your OU layout. A good OU layout can make group policy's a real breeze. Dont just think about it, draw it out and REALLY think about it.
  12. It will only cause issues if you have group policies applied to the OU's they are already in or are moving them to. Otherwise you will be doing no harm.
  13. something must still be claiming that email address. Check out this kb article and let me know if it works.. http://support.microsoft.com/default.aspx?...kb;en-us;280765
  14. are you talking about the system service NetBios TCP/IP Helper or are you talking in the adapter properties? For the first. Using your domain group policy, go to Computer configuration->Windows Settings->Security Settings-> System Services Select "TCP/IP NetBios Nelper and define it as automatic. Or the later Cofigure your dhcp scope under the advanced options to enable TCP over NetBios.
  15. Download and install the outlook resource kit. In there you have ADM files which you can import into Group Policy, modify settings and apply to your clients via GPO
  16. Download the office resource kit(ork2003) from the microsoft website. Use the custom installation wizard to configure the package (mst file) then at the very end it gives you the silent install command line
  17. from the console of your cisco router you would be able to run "show interface" from privledged mode and see the stats on the interface. Check to see if you are getting buffer errors, interface resets, jumbo frames, CRC errors, collisions.. stuff like that.. that will tell you where the problem resides.
  18. I dont beleive d-link routers have this type of functionality built into them. If you create a rule to block something, it goes on a packet by packet basis for the connection. each packet is checked by the access list.. if your app was running and communication was flowing, as soon as you apply the filter, the next time that app tries to access the internet it will get denied by the access list. as far as blocking others on the network except yourself.. create a rule that allows your pc anywhere and put that on the top of the access list.. that way as soon as your pc sends a packet.. it will be allowed by the first access list.. then create 2 more rules. one denying your subnet and one allowing your subnet. in that order allow you block everybody allow everybody then when you want to block access.. just apply the block everybody rule.. (remember your pc wont get blocked because it is above the deny all rule.)
  19. yes. you need to either format your current partition and get rid of XP or partition your current hard drive to allow for enough space for your linux distro or get a second hard drive and install linux on that.. basically same rules apply if you wanted to dual boot a windows OS.
  20. rest assured that atleast MS finally heard the cry about this and the "Copy" feature in Windows Vista has been greatly improved to fix these simple little tasks... however, in the mean time.. from the command line there is a tool built into windows called xcopy.. play around with some of the switches.. see what works for you
  21. Slight misconception.. "Real" routers do not perform nat unless you tell them to. If we are talking the linksys or D-link routers or other of those types or routers then yes they perform nat which also makes them firewalls(and they have multiple ethernet plugs on the back of them which makes them switches too). Sorry, I am a Cisco snob... what if you put the second router on the DMZ of the first router. That would be the easiest way around it, however... ANY TIME you double NAT something it requires much additional configuration, most of which are not configurable with the linksys/dlink/netgear type routers.
  22. no.. not unless you pay for a service(if available) through dyndns because you dont "own" the domain. you own the subdomain. unless you purchase a regular domain from them and use hteir dynamic dns hosting with that, you will not be able to get rid of the subdomain.
  23. to tack on to what RogueSpear said. Windows filesharing uses TCP to connect to the other computer which has a ton of overhead for its transfers. That is just who the TCP stack works. Now if you were to run UDP packet transfers like video streaming then your pc will just blow it out the port and not acknowledge tx/rx or errors or even send acknowledgements. You will get better numbers with this but is less reliable. Honestly, those numbers look good to me, it sounds about right.. You will always have Actual Bandwidth and Theoritical Bandwidth. Similar to wireless. with 100 mbps 802.11g, the method used to transfer at the higher rate really only gives you at best 60mbps and to a similar note, on a 56k modem.. you never really run at 56k, just cause of the same reasons.
×
×
  • Create New...