ALL >> System-Network-Administration >> View Article
Administeringactive Directory Objects

Now you've created the problem. In the Troubleshooting Lab in 220-701 exam, you learned how to reset a computer password using the Netdom utility. You now realize that using the Active Directory Users And Computers interface is not the appropriate place to reset an existing computer password. The only reason to perform the steps above would be if you just reinstalled Server2 and wanted to configure a new password for that account. To fix this issue, you remove Server2 from the domain and then join the domain once again.
1.To correct this issue, you must log on as a local administrator to SERVER2 (Local).
2.Click Start, right-click My Computer, click Properties. The System Properties dialog box opens.
Click the Computer Name tab and then click the Change button. The Computer
Name Changes dialog box opens. In the Member Of section, click Workgroup.
Type the name WORKGROUP into the get a+ certified online text box. Click OK. The Computer Name Changes dialog box appears.
4.Enter the local administrator name ...
... and password and click OK.
5.Click OK to confirm that your computer is now a member of the workgroup named WORKGROUP. Click OK to confirm that a restart is required.
6.Click OK in the System Properties dialog box.
7.Click Yes when prompted to restart your computer.
8.Once Server2 restarts, log on as the local administrator once again. Then join the domain contoso.com as described in Chapter 2, "Installing and Configuring Active Directory." Once you restart the system again, you'll be able to log on using the domain administrator name and password.
9- Promote Server2 to domain controller by using the Dcpromo command with the ContosoReplica.txt answer file. The answer file is located on the Supplemental CD-ROM in the \70-294\Labs\Chapter09 folder.
To control access to Active Directory objects, you grant or deny permissions to security principals. You set permissions to either Allow or Deny. Denied permissions take precedence over all other permissions.
When an object is created, the user creating it automatically becomes its owner.The owner controls how permissions are set on the object and to whom permis?
sions are granted.
You can set selective authentication differently for free test questions outgoing and incoming external and forest trusts. These selective trusts allow you to make flexible access control decisions between external domains and forest-wide.
Add Comment
System/Network Administration Articles
1. Can Your Cloud Voip Provider Troubleshoot The Common Problems Associated With This Service?Author: Julian Serle
2. An Optical Cable Production Line For Powering Global Connectivity
Author: Ryan
3. Why Does Your Business Need Optical Booster Amplifier?
Author: Ryan
4. The Latest In Cloud Technology And What It Means For Your Business
Author: TechFacto Global Services
5. Achieve Nis2 Compliance With Confidence
Author: Tushar Pansare
6. Mtp Cables: Essential Guide To Fiber Optic Connectivity
Author: Ryan
7. Facts About Polarization Maintaining (pm) Patch Cables
Author: Ryan
8. 10 Essential Cyber Security Tips To Protect Your Data
Author: GIGABITTechnologies
9. Exploring Fibre Optic Coupler Types And Their Role In Modern Network Topologies
Author: Ryan
10. What Are It Infrastructure Security Services And Why Are They Important?
Author: GIGABITTechnologies
11. Polarization Maintaining Rotation Systems Are Shaping Next-gen Photonics
Author: Ryan
12. Top Dns Security Services Provider In India!
Author: GIGABITTechnologies
13. Cloud Backup For Business: Ensuring Data Protection With Offsite Solutions
Author: Entrust Network Services
14. Level Up Your Connection: Best Internet Plans For Gaming
Author: Jamesanderson
15. Boc Package Substrate: Advancing Semiconductor Packaging Technology
Author: Ryan