﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>IT博客-山和云的彼端-随笔分类-AD</title><link>http://www.cnitblog.com/joyclear/category/7208.html</link><description /><language>zh-cn</language><lastBuildDate>Mon, 26 Sep 2011 05:53:34 GMT</lastBuildDate><pubDate>Mon, 26 Sep 2011 05:53:34 GMT</pubDate><ttl>60</ttl><item><title>通过runas来实现组策略脚本安装软件</title><link>http://www.cnitblog.com/joyclear/archive/2009/06/16/59427.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 16 Jun 2009 06:29:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2009/06/16/59427.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/59427.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2009/06/16/59427.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/59427.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/59427.html</trackback:ping><description><![CDATA[<p>脚本如下 <p>Option explicit<br>Dim oShell<br>set oShell= Wscript.CreateObject("WScript.Shell")<br>oShell.Run "runas /noprofile /user:test\admin ""C:\cderp.EXE"""<br>WScript.Sleep 100<br>oShell.Sendkeys "pass01!" <font color="#ff0000">--密码</font><br>Wscript.Quit <p>到微软网站下载vbs加密工具Encoder <p><a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=E7877F67-C447-4873-B1B0-21F0626A6329&amp;displaylang=en">MS Script Encoder Download Page</a> <p>Screnc.exe /l vbscript MSword.vbs MSword.vbe <p>在组策略中发布脚本 <p>参考：<a title="http://xinn.org/RunasVBS.html" href="http://xinn.org/RunasVBS.html">http://xinn.org/RunasVBS.html</a> <p><a title="http://gnaw0725.blogbus.com/logs/23964438.html" href="http://gnaw0725.blogbus.com/logs/23964438.html">http://gnaw0725.blogbus.com/logs/23964438.html</a></p><img src ="http://www.cnitblog.com/joyclear/aggbug/59427.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2009-06-16 14:29 <a href="http://www.cnitblog.com/joyclear/archive/2009/06/16/59427.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>如何清除域内长期没有登录的计算机对象</title><link>http://www.cnitblog.com/joyclear/archive/2009/06/16/59424.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 16 Jun 2009 05:39:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2009/06/16/59424.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/59424.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2009/06/16/59424.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/59424.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/59424.html</trackback:ping><description><![CDATA[<p>根据您的描述，我对这个问题的理解是：<br>您想知道如何清除域内长期没有登录的计算机对象。<br>如果我的理解有误，请告诉我。<br>您可以使用一个叫oldcmp的工具，它能够根据你设置的条件过滤用户帐户或者计算机账户，然后你可以设置如何处置这些过期账户，是删除、移动、还是锁定。该工具的下载地址在<br><a href="http://www.joeware.net/freetools/tools/oldcmp/index.htm">http://www.joeware.net/freetools/tools/oldcmp/index.htm</a><br>您需要在命令行环境下执行它，查询命令行的方式是 oldcmp /?<br>您可以参考下面的这篇文章，上面有详细的图文解说如何使用oldcmp清除旧的计算机帐户：<br>下面我举一个例子来说明使用OldCmp来清除域中长时间不使用的计算机帐户。<br>将工具OldCmp.exe 复制 到C盘根目录，打开命令行窗口。接下来我要把AD中超过60天没有更新计算机账户密码的计算机账户挑选出来并禁用，等过一段时间，若没有用户报告出现问题，就可以统统从域中清除了。<br>注：默认情况下，计算机账户密码每30天自动更新一次。那也就是说我可以认为60天没更新的计算机已经是无效的了。该工具默认是90天，当然您可以根据需要自己设定。<br>在命令行窗口定位到C:\&gt; 然后运行下面的命令：<br>oldcmp –age 60 –disable –unsafe –forreal<br>注释：<br>运行了命令后在工具所在的目录内会出现一份html报告，内容非常详尽。下面介绍一下参数含义<br>-age 60 ：超过60天未更新计算机账户密码的的计算机账户<br>-disable ：禁用计算机账户<br>-unsafe ：比如你有100个符合条件的对象会被执行，但默认情况下只对前10个做了操作，加了这个参数后就是对所有符合条件的对象操作，这么做的目的只有一个，安全。<br>-forreal ：加了这个参数，所有的操作才真正的执行。默认情况下你的操作都只是出现一份报告，告诉你操作的结果，让你可以有个了解。该工具的使用是需要非常小心的，所以该工具作者认为有必要多一个参数来保护。<br>命令运行后，刷新一下OU，你就发现符合条件的计算机账户都被禁用了。过了一段时间一切都运作正常，那么我就来删除当初禁用的这些电脑。 只需要运行下面的命令：<br>oldcmp -onlydisabled -delete -unsafe -forreal<br>参数Onlydisabled就是仅仅对被禁用的计算机账户操作。<br>另外您还可以借助于脚本去查询并删除过期的计算机帐户。 下面是一个脚本的例子， <br>您可以到我们的MSDN 论坛咨询脚本相关的问题<br><a href="http://www.rlmueller.net/MoveOldComputers.htm">http://www.rlmueller.net/MoveOldComputers.htm</a><br>希望我的回答对您有所帮助，如果有不清楚的地方，请告诉我。<br>感谢您选择微软产品并使用微软合作伙伴在线技术支持！<br>马宁<br>在线合作伙伴支持工程师<br>合作伙伴支持部<br>微软全球技术支持中心</p><img src ="http://www.cnitblog.com/joyclear/aggbug/59424.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2009-06-16 13:39 <a href="http://www.cnitblog.com/joyclear/archive/2009/06/16/59424.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>DNS服务器中的老化和清理</title><link>http://www.cnitblog.com/joyclear/archive/2009/04/01/55913.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 31 Mar 2009 16:36:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2009/04/01/55913.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/55913.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2009/04/01/55913.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/55913.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/55913.html</trackback:ping><description><![CDATA[<p>今天一个客户反映DNS中有很多重复的记录，要如何做清理，回复邮件的时候，顺便把blog也一并写了</p>
<p>&nbsp;</p>
<p>在DNS服务器中，可以针对DNS记录做老化和清理的工作。</p>
<p>首先要了解一个概念，时间戳</p>
<p>对于每个动态更新记录,会基于当前的DNS服务器时间创建一个时间戳，但DHCP客户端服务或者DHCP服务器为此区域中的A记录进行动态更新时，会刷新时间戳。手动创建的资源记录会分配一个空的时间戳记录，代表他们不会老化.</p>
<p>我们可以在DNS管理控制台中打开查看的高级选项，然后查看DNS记录。</p>
<p><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns1_2.jpg"><img title=dns1 style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=449 alt=dns1 src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns1_thumb.jpg" width=406 border=0></a> <a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns2_2.jpg"><img title=dns2 style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=450 alt=dns2 src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns2_thumb.jpg" width=408 border=0></a> </p>
<p>动态更新记录的刷新周期请参阅如下表格</p>
<p><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns3_2.jpg"><img title=dns3 style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=350 alt=dns3 src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns3_thumb.jpg" width=925 border=0></a> </p>
<p>
<p>&nbsp;</p>
<p>在DNS区域中有老化的设置</p>
<p><strong>无刷新间隔定义</strong></p>
<p>当无刷新间隔对特定资源记录起作用时，动态刷新其时间戳的尝试将被 DNS 服务器制止。老化/清理机制的该特征能防止服务器对老化资源记录的不必要刷新。这些以前的刷新尝试，如果不如此解决，可能会增加与处理 DNS 区域更改相关的 Active Directory 复制通信。</p>
<p>要确保记录不会过早刷新，&#8220;无刷新间隔&#8221;与每个资源记录的当前刷新间隔在时间长度上必须对应。例如，如果将&#8220;刷新间隔&#8221;增加到更大的值，则必须同样增加无刷新间隔。
<p>在多数情况下，7 天的默认间隔就足够了，无需进行更改。
<p><font color=#ff0000>服务器不接受记录刷新的时间(服务器仍接受更新)，这个值是最后一次刷新和最早可以再次刷新之间的间隔</font>
<p><strong>刷新间隔定义</strong>
<p>当刷新间隔对资源记录起作用时，自动刷新其时间戳的尝试被 DNS 服务器接受和处理。设置该间隔时，所使用的时间长度要比包含在区域中的任何资源记录的最大可能刷新周期长，这一点非常重要。该周期相当于在基于生成记录刷新的特定来源的正常网络环境下刷新记录可能需要的最长时间。
<p>&nbsp;
<p>&nbsp;</p>
<p>从上面的定义来看，刷新间隔，我们设定的这个值一般可以依据最长的DHCP服务器刷新，&gt;=DHCP租约50%</p>
<p>无刷新间隔，设定太长会增加过期记录的保留时间，设定太短会引起不必要的AD复制通讯，因此基本设定与刷新间隔相同。</p>
<p>&nbsp;</p>
<p>因此如果依照默认的设定，在时间戳后14天(7天+7天)，记录将被标志为过期记录。</p>
<p><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns4_2.jpg"><img title=dns4 style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=455 alt=dns4 src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns4_thumb.jpg" width=795 border=0></a> </p>
<p>&nbsp;</p>
<p>当然上面的操作，只是将记录标志为过期，还没有执行清理的操作。</p>
<p>1.自动清理<br><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/image_2.png"><img title=image style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=449 alt=image src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/image_thumb.png" width=406 border=0></a> </p>
<p>2.手动清理(一次性，非重复)</p>
<p><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/image_4.png"><img title=image style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=328 alt=image src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/image_thumb_1.png" width=282 border=0></a> </p>
<p>&nbsp;</p>
<p>那针对我那客户的状况，还有点特殊，客户是以前自己手动添加的记录，那我们针对手动的记录可以勾选Delete this record when it becomes stale这个选项。</p>
<p><a href="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns1_2.jpg"><img title=dns1 style="BORDER-RIGHT: 0px; BORDER-TOP: 0px; DISPLAY: inline; BORDER-LEFT: 0px; BORDER-BOTTOM: 0px" height=449 alt=dns1 src="http://www.cnitblog.com/images/cnitblog_com/joyclear/WindowsLiveWriter/DNS_14CA0/dns1_thumb.jpg" width=406 border=0></a></p>
<p>当记录过期时间到了后也能通过自动清理或手动清理，删除掉。</p>
<p>当然这个操作还是要手动一个记录一个记录改，有这个时间都可以直接删除记录了，嘿嘿！</p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/55913.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2009-04-01 00:36 <a href="http://www.cnitblog.com/joyclear/archive/2009/04/01/55913.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Windows DC TombStone</title><link>http://www.cnitblog.com/joyclear/archive/2009/03/30/55860.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Mon, 30 Mar 2009 05:33:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2009/03/30/55860.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/55860.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2009/03/30/55860.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/55860.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/55860.html</trackback:ping><description><![CDATA[<p>Tombstone生存时间是由tombstoneLifetime属性值所决定的，如果我们希望修改这个默认值，可以按照以下步骤来完成：<br>1．&nbsp; 打开adsiedit.msc<br>2．&nbsp; 在控制台下双击Configuration [DomainControllerName], <br>CN=Configuration,DC=[ForestRootDomain], CN=Services, and CN=Windows NT<br>3．&nbsp; 右键单击 CN=Directory Service, 然后选择属性。<br>4．&nbsp; 在”Attribute” 列中，单击tombstoneLifetime。最小为2天。<br>注意如果该值没有设置，则默认生效的期限分为以下2种：<br>如果是在Windows Server 2003 SP1上，默认是180天<br>如果是在Windows Server 2000或者Windows Server 2003，默认是60天。  <p>&nbsp;</p> <p>即使是在现有域控制器工作都正常的情况下，我们也不建议通过修改默认Tombstone生存时间来重新将一台过了Tombstone时间的域控制器连接到现有的域中。您可以通过修改以下注册表键值来使现有域控制器能够与超时的域控制器进行正常复制：<br>请在所有的域控制器上执行以下步骤：<br>a.&nbsp; Click Start, click Run, type regedit, and then click OK.<br>b.&nbsp; Navigate to <br>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters<br>c.&nbsp; In the details pane, create or edit the registry entry "Allow <br>Replication With Divergent and Corrupt Partner" as follows:<br>如果注册表键值已经存在，请修改为下面的值：<br>a. In the details pane, right-click Allow Replication With Divergent and <br>Corrupt Partner, and then click Modify.<br>b. In the Value data box, type 1, and then click OK.<br>如果注册表键值不存在，请自行创建并修改为下列值:<br>a. Right-click Parameters, click New, and then click DWORD Value.<br>b. Type the name Allow Replication With Divergent and Corrupt Partner, and <br>then press ENTER.<br>c. Double-click the entry. In the Value data box, type 1, and then click OK.<br>当域控制器之间的复制成功以后，请务必将该值修改回到0。</p><img src ="http://www.cnitblog.com/joyclear/aggbug/55860.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2009-03-30 13:33 <a href="http://www.cnitblog.com/joyclear/archive/2009/03/30/55860.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>导出AD 群组中的用户列表</title><link>http://www.cnitblog.com/joyclear/archive/2008/12/05/52230.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Fri, 05 Dec 2008 02:59:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/12/05/52230.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/52230.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/12/05/52230.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/52230.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/52230.html</trackback:ping><description><![CDATA[<font face="Courier New">企业中经常需要导出群组中的用户清单，在ADUC中只能导出OU的用户，<br>可以通过下面的脚本，导出群组中的成员清单<br>Set objGroup = GetObject("LDAP://CN=testgroup,DC=contoso,DC=com")<br>objGroup.GetInfo<br><br>arrMemberOf = objGroup.GetEx("member")<br><br>For Each strMember in arrMemberOf<br>&nbsp; &nbsp; &nbsp; &nbsp; Set objUser = GetObject("LDAP://" &amp; strMember)<br>&nbsp; &nbsp; objUser.GetInfo<br>&nbsp; &nbsp; WScript.Echo objUser.Displayname &amp; "," &amp; objUser.Department<br>Next<br><br></font>
<img src ="http://www.cnitblog.com/joyclear/aggbug/52230.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-12-05 10:59 <a href="http://www.cnitblog.com/joyclear/archive/2008/12/05/52230.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>MsExchchangeCluster 1013 及 Userenv 1054问题解决</title><link>http://www.cnitblog.com/joyclear/archive/2008/12/02/52162.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 02 Dec 2008 15:14:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/12/02/52162.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/52162.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/12/02/52162.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/52162.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/52162.html</trackback:ping><description><![CDATA[<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 下午四点赶往陆家嘴，解决客户Exchange群集问题，问题倒不是很紧急，但是客户环境比较特殊，只能在非工作时间解决，看来今天又要加班咯～～～<br>1.客户邮件服务器是Exchange 2003 Cluster, 群集资源中Exchange HTTP Virtual Server Instance 100 资源不能启用，导致用户无法访问OWA页面。<br>在日志中有MSExchangeCluster 1013等报错信息<br>事件描述：<br>Event Type: Error<br>Event Source: MSExchangeCluster<br>Event Category: Services<br>Event ID: 1013<br>Date: 25/80/2005<br>Time: 9:16:44 AM<br>User: N/A<br>Computer: exchange1<br>Description:<br>Exchange HTTP Virtual Server Instance 100 (exchange1): Failed to get the<br>protocol IP address and port bindings from the metabase.<br><br>打开IIS，里面虚拟服务器是停用状态，因为用户是比较重要的生产环境，所以暂时没有做任何操作，开始检查日志，Cluster日志，应用程序日志，系统日志，然后查EventID,微软KB。 看起来IIS元数据损坏的可能性比较大。<br>突然从网上找到一篇BBS, 里面的问题和现在问题一样，里面提到了<span><strong style="COLOR: red">This problem can be caused by the HTTP Virtual Server not having an SSL port defined when we are requiring SSL.<br></strong>立刻检查IIS里面SSL端口定义，果然是空值。输入443, 应用设定。重新启用群集中HTTP资源，服务正常启动了。<br>OWA页面正常开启。hoho~~， 万幸，还好不是IIS元数据库问题，否则今天加班到几点还是问题，万恶的加班啊～～～，万恶的加班又没有加班费啊～～～～<br><br>2.问题提前解决，时间充裕，那就继续解决客户的其它问题，客户反应DC服务器上周期出现Userenv 1054错误，组策略无法下发。<br>事件描述：<br><span><span>Event Source: Userenv</span></span><span><br><span>Event Category: None</span><br><span>Event ID: 1054</span><br><span>Date: 3/12/2008</span><br><span>Time: 8:42:38 AM</span><br><span>User: NT AUTHORITY\SYSTEM</span><br><span>Computer: ServerName</span><br><span>Description:</span><br><span>Windows cannot obtain the domain controller name for your computer network. (An unexpected network error occurred. ). Group Policy processing aborted. <br></span>经过检查，不光DC上有，多台成员服务器上也有这个现象。<br>这个问题以前也多次见过，一直没有好好解决。<br>看了EventID，很多人都说这个问题和硬件有关。继续查找资料～～<br>功夫不负有心人啊，总算找到篇有用的资料，说明问题和AMD CPU有关，AMD有Fix程序可以解决。<br>打开服务器硬件属性，果然都是用的AMD的CPU，看来问题有眉目。<br>接下来的工作就交还给客户了，请他明天先联系下HP，看下HP的Case记录里面是否对这个错误有解决方案，如果确实是CPU的问题话，应该HP会碰到很多类似问题。<br></p>
<p class=MsoNormal style="MARGIN: 0cm 0cm 0pt"><span class=spnmessagetext><span lang=EN-US style="COLOR: midnightblue; FONT-FAMILY: 'Verdana','sans-serif'">Just thought I'd throw this in here. Spent a bunch of time researching this, finally decided to call MS. </span></span><span lang=EN-US style="COLOR: midnightblue; FONT-FAMILY: 'Verdana','sans-serif'"><br><br><span class=spnmessagetext>Event Source: Userenv</span><br><span class=spnmessagetext>Event Category: None</span><br><span class=spnmessagetext>Event ID: 1054</span><br><span class=spnmessagetext>Date: 3/12/2008</span><br><span class=spnmessagetext>Time: 8:42:38 AM</span><br><span class=spnmessagetext>User: NT AUTHORITY\SYSTEM</span><br><span class=spnmessagetext>Computer: ServerName</span><br><span class=spnmessagetext>Description:</span><br><span class=spnmessagetext>Windows cannot obtain the domain controller name for your computer network. (An unexpected network error occurred. ). Group Policy processing aborted. </span><br><span class=spnmessagetext>-------------------------------------------------------</span><br><span class=spnmessagetext>We were getting this on a bunch of new servers, all running Win2003 R2 64bit. It's also showing up on a number of XP machines. Finally decided to just open a ticket with MS. </span><br><br><span class=spnmessagetext>The problem is apparently a "slow link detection", which is of course abundantly obvious from the errors. Per MS, we did the following reghacks: </span><br><br><span class=spnmessagetext>Registry subkey: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\System </span><br><span class=spnmessagetext>Value name: GroupPolicyMinTransferRate </span><br><span class=spnmessagetext>Value type: DWORD </span><br><span class=spnmessagetext>Value Data: 0 </span><br><br><span class=spnmessagetext>Registry subkey: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System </span><br><span class=spnmessagetext>Value name: GroupPolicyMinTransferRate </span><br><span class=spnmessagetext>Value type: DWORD </span><br><span class=spnmessagetext>Value Data: 0 </span><br><br><span class=spnmessagetext>Note: if the "System" key doesn't exist, please create it under HKCU\Software\Policies\Microsoft\Windows &amp; HKLM\Software\Policies\Microsoft\Windows first.</span><br><br><span class=spnmessagetext>From the MS tech support rep:</span><br><br><span class=spnmessagetext>"It is possible that certain firewall program (such as Windows Firewall) is installed on all your machines and configured to block the normal ICMP packets. Sometimes it may be also caused by some models of CPU.</span><br><br><span class=spnmessagetext>For example, there is a known bug with AMD Opteron Processor driver for Windows XP and Windows Server 2003 Version (x86 and x64 exe) <a href="http://1.3.2.16/"><u><font color=#0000ff>1.3.2.16</font></u></a>, which allows the system to automatically adjust the CPU speed, voltage and power combination that match the instantaneous user performance need. The slow link detection depends on the CPU clock to calculate the speed. However, it may fail when working along with AMD Opteron driver. Recently we have received many reports that this known bug in the AMD CPU driver often causes the group policy detection failure. AMD has provided a new version of driver to solve such similar problems. You can get this point from:</span><br><br></span><span class=spnmessagetext><span lang=EN-US><a href="http://www.amd.com/us-en/Processors/TechnicalResources/0,,30_182_871_9033,00.html" target=_blank><span style="FONT-FAMILY: 'Verdana','sans-serif'"><u><font color=#0000ff>http://www.amd.com/us-en/Processors/TechnicalResources/0,,30_182_871_9033,00.html</font></u></span></a></span></span><span class=spnmessagetext><span lang=EN-US style="COLOR: midnightblue; FONT-FAMILY: 'Verdana','sans-serif'">" </span></span><span lang=EN-US style="COLOR: midnightblue; FONT-FAMILY: 'Verdana','sans-serif'"><br><br><span class=spnmessagetext>All our new servers are 64-bit Opterons. We haven't upgraded the driver yet. </span></span></p>
<p><br><br></span></span>&nbsp;</p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/52162.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-12-02 23:14 <a href="http://www.cnitblog.com/joyclear/archive/2008/12/02/52162.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>查询AD中删除用户信息</title><link>http://www.cnitblog.com/joyclear/archive/2008/11/10/51291.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Mon, 10 Nov 2008 09:35:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/11/10/51291.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/51291.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/11/10/51291.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/51291.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/51291.html</trackback:ping><description><![CDATA[您希望通过repadmin这个命令来检查已经被删除用户的信息，比如删除时间以及操作时的DC等，如果我的理解不正确，请您告诉我！<br><br>通过repadmin来检查已经被删除用户的信息：<br><br>1. 用域管理员登录DC<br>2. 开始－运行ldp.exe<br>3. Connection－connect<br>4. Bind－OK<br>5. View－OK<br>6. Options－controls，在Load选项中选择Return deleted object－OK<br>7. 展开左边区域中的DN，找到CN=Deleted Objects,DC=ibm,DC=com这个目录并展开（存在tombstone记录中的对象）<br>8. 在列表中找到您之前删除的用户，双击打开列表<br>9. 找到该删除账户的DN，如CN=jason\0ADEL:e0272381-ecc9-4391-86e7-4afc9e73b4fe,CN=Deleted Objects,DC=ibm,DC=com，复制下来<br>10. 开始运行 cmd<br>11. 运行repdamin /showmeta &#8220;CN=jason\0ADEL:e0272381-ecc9-4391-86e7-4afc9e73b4fe,CN=Deleted Objects,DC=ibm,DC=com&#8221; 回车后您会看到下面的信息<br><br>27 entries.<br>Loc.USN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Originating DC&nbsp;&nbsp; Org.USN&nbsp; Org.Time/Date&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ver Attribute<br>=======&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =============== ========= =============&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; === =========<br>&nbsp; 20498&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20498 2008-11-10 11:59:26&nbsp;&nbsp;&nbsp; 1 objectClass<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 cn<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 sn<br>&nbsp; 20498&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20498 2008-11-10 11:59:26&nbsp;&nbsp;&nbsp; 1 instanceType<br>&nbsp; 20498&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20498 2008-11-10 11:59:26&nbsp;&nbsp;&nbsp; 1 whenCreated<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 displayName<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 1 isDeleted<br>&nbsp; 20502&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20502 2008-11-10 11:59:27&nbsp;&nbsp;&nbsp; 2 nTSecurityDescriptor<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 name<br>&nbsp; 20504&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20504 2008-11-10 11:59:27&nbsp;&nbsp;&nbsp; 4 userAccountControl<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 codePage<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 countryCode<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 3 dBCSPwd<br>&nbsp; 20499&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20499 2008-11-10 11:59:27&nbsp;&nbsp;&nbsp; 1 logonHours<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 3 unicodePwd<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 3 ntPwdHistory<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 3 pwdLastSet<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 primaryGroupID<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 supplementalCredentials<br>&nbsp; 20498&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20498 2008-11-10 11:59:26&nbsp;&nbsp;&nbsp; 1 objectSid<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 accountExpires<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 3 lmPwdHistory<br>&nbsp; 20498&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20498 2008-11-10 11:59:26&nbsp;&nbsp;&nbsp; 1 sAMAccountName<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 sAMAccountType<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 userPrincipalName<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 1 lastKnownParent<br>&nbsp; 20505&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Default-First-Site-Name\DENVER&nbsp;&nbsp;&nbsp;&nbsp; 20505 2008-11-10 12:00:16&nbsp;&nbsp;&nbsp; 2 objectCategory<br>0 entries.<br>Type&nbsp;&nbsp;&nbsp; Attribute&nbsp;&nbsp;&nbsp;&nbsp; Last Mod Time&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Originating DC&nbsp; Loc.USN Org.USN Ver<br>======= ============&nbsp; =============&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ================= ======= ======= ===<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Distinguished Name<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =============================<br><br>12. 在Ver Attribute这个属性下，你可以找到isDeleted这个属性，该属性对应的信息就是用户帐号的删除时间和操作的服务器信息<br><br>希望我的回答对您有所帮助，如果有不清楚的地方，请告诉我。<br><br>感谢您选择微软产品并使用微软合作伙伴新闻组技术支持！<br><br>Jason Hou 侯铮<br>MCSE 2003＋Security<br>在线合作伙伴支持工程师<br>合作伙伴支持部<br>微软全球技术支持中心<br>
<img src ="http://www.cnitblog.com/joyclear/aggbug/51291.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-11-10 17:35 <a href="http://www.cnitblog.com/joyclear/archive/2008/11/10/51291.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>ADMT 3.0迁移测试</title><link>http://www.cnitblog.com/joyclear/archive/2008/11/10/50143.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Mon, 10 Nov 2008 08:34:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/11/10/50143.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/50143.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/11/10/50143.html#Feedback</comments><slash:comments>2</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/50143.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/50143.html</trackback:ping><description><![CDATA[<p>&nbsp;&nbsp; 正好要写个AD域合并的方案，手头缺少些环境截图，索性做个ADMT 的迁移测试，后面还会写个Quest migration manager做迁移的，做个比较<br><br><span style="COLOR: #0000ff"><strong>一. 虚拟环境</strong></span><br><strong>Target Domain</strong> <br>Domain Name： Msft.Local (windows 2003)<br>IP Address：192.168.0.1<br><strong>Source&nbsp;Domain</strong><br>Domain Name：leaderit.com (windows 2003)<br>IP Address：192.168.0.100<br><strong>Client PC</strong><br>Name: Client<br>IP Address：192.168.0.200<br><img height=337 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/ADMT1.jpg" width=816 border=0><br><br>建立帐号和群组，共享资源<br><img height=154 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/useraccounts.jpg" width=437 border=0><br><br><font color=#0000ff><strong>二. 迁移流程<br></strong><span style="COLOR: #000000">ADMT 3.0可以实现三种环境的迁移<br>1.Windows NT 4.0 Domain Restructure to an Active Directory Forest<br>2.Interforest Active Directory Domain Restructure<br>3.Intraforest Active Directory Domain Resturcture<br></span><span style="COLOR: #000000">其中在Interforest和Intraforest中还是有一些区别的<br><span style="COLOR: #ff0000">主要一点是Interforest里面对象是克隆，而在Intraforest里面对象是移动</span><br></span>&nbsp; </p>
<p>
<table cellSpacing=0 cellPadding=0 border=1>
    <thead>
        <tr>
            <td vAlign=top width=295>
            <p><strong><span>Migration Consideration</span></strong></p>
            </td>
            <td vAlign=top width=295>
            <p><strong><span>Interforest Restructure</span></strong></p>
            </td>
            <td vAlign=top width=295>
            <p><strong><span>Intraforest Restructure</span></strong></p>
            </td>
        </tr>
    </thead>
    <tbody>
        <tr>
            <td vAlign=top width=295>
            <p>Object preservation</p>
            </td>
            </font>
            <td vAlign=top width=295>
            <p>Objects are cloned rather than migrated. The original object remains in the source location to maintain user access to resources.</p>
            </td>
            <td style="COLOR: #ff0000" vAlign=top width=295>
            <p style="COLOR: #000000">Objects are migrated and no longer exist in the source location.</p>
            </td>
        </tr>
        <font color=#0000ff>
        <tr>
            <td vAlign=top width=295>
            <p><span>SID history maintenance</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>Maintaining SID history is optional. </span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>SID history is required.</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=295>
            <p><span>Password retention</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>Password retention is optional.</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>Passwords are always retained.</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=295>
            <p><span>Local profile migration</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>You must use tools such as ADMT to migrate local profiles.</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>For workstations that run the Microsoft Windows&#174;&#176;2000 Server operating system and later, local profiles are migrated automatically because the user&#8217;s GUID is preserved. However, you must use tools such as ADMT to migrate local profiles for workstations that run Windows&nbsp;NT&nbsp;4.0 and earlier.</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=295>
            <p><span>Closed sets</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>You do not need to migrate accounts in closed sets.</span></p>
            </td>
            <td vAlign=top width=295>
            <p><span>You must migrate accounts in closed sets.</span></p>
            </td>
        </tr>
    </tbody>
</table>
</p>
<p><span style="COLOR: #000000">整个迁移的流程图</span><br><strong><img height=326 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/Process1.jpg" width=181 border=0><br><br>三. 迁移前期工作<br></strong></font>target域需要Windows 2000或者Windows 2003域功能级别<br>建立source和target之间的域信任关系<br><img height=414 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/trust1.jpg" width=402 border=0><br><br>关闭SID Filter, 默认在Windows 2000 SP4以上及Windows2003启用了SID Filter, 在迁移过程中，为了让用户可以正常原有资源，我们需要迁移SID Histrory.<br>在命令行中通过netdom命令关闭SID Filter<br><img height=111 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/SIDFilter.jpg" width=643 border=0><br><br>将目标域的Domain Admins群组加入到Source administrators群组<br><br>以下三个步骤可以在ADMT第一次运行时由ADMT自动创建<br>1.在source域中创建source_name$$$本地群组<br>2.在source PDC角色上开启TCP/IP Client Support功能<br>&nbsp;&nbsp;&nbsp;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\LSA<br>&nbsp;&nbsp;&nbsp;TcpipClientSupport&nbsp;&nbsp;&nbsp;DWORD&nbsp;&nbsp;&nbsp;1<br>3.在target和source域上开启审核<br>&nbsp;&nbsp;&nbsp;Group Policy-Default Domain Controllers Policy-Computer Configuration-Windows Settings-Security Settings-Local Policies-Audit Policy<br>&nbsp;&nbsp;&nbsp;Audit accout management&nbsp;&nbsp;&nbsp;Success,Failure<br><br><strong style="COLOR: #0000ff">四.安装ADMT</strong><br>在target domain controller上安装ADMT 3.0 (ADMT 3.1支持Windows 2008)<br>ADMT3.0需要数据库支持，无论是采用SQL还是WMSDE，默认都会在本地安装WMSDE。<br><img height=379 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/ADMTSetup1.jpg" width=503 border=0><br><br><strong><span style="COLOR: #0000ff">五.启用密码迁移</span><br></strong>&nbsp;&nbsp;&nbsp;森林之间迁移使用PES(Password Export Server)服务来迁移密码，PES服务可以安装在source域的任何DC上(支持128位加密，Windows 2003，2000+sp3以上默认支持)。<br>&nbsp;&nbsp;&nbsp;安装PES服务首先需要一个加密钥匙，这个加密钥匙在target域安装ADMT的机器上创建<br>&nbsp;&nbsp;&nbsp;admt key /option:create /sourcedomain:&lt;&gt; /keyfile:&lt;&gt;/keypassword:&lt;&gt;<br><img height=257 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/admt_key.jpg" width=664 border=0><br><br>在source域DC上启动PES服务，需要安装ADMT,<br>执行%systemroot%\windows\ADMT\PES\pwdmig.msi<br>导入刚才在target域导出的加密钥匙<br><img height=386 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/pwdmig1.jpg" width=505 border=0><br>输入服务帐号，建议使用在target域中验证的帐号，如果使用本地系统帐号，确保在target域中，Pre windows 2000 compatible access group中包含everyone group和Anonymous logon group<br><img height=323 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/pwdmig2.jpg" width=456 border=0><br>在services里面启动PES服务<br><br><strong style="COLOR: #0000ff">六.正式迁移</strong><br>&nbsp;&nbsp;&nbsp;按照ADMT迁移文档的建议，共享文件资源，采用Users-&gt;Global Groups-&gt;Local Domain Groups-&gt;Permission的方式<br>&nbsp;&nbsp;&nbsp;迁移帐号顺序：Services Account--&gt;Global Group--&gt;User Account<br>&nbsp;<img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/groupmig1.jpg" width=501 border=0><br>&nbsp;&nbsp;&nbsp;迁移user account步骤：<br>1.迁移所有帐号，选择不更新现有用户密码，生成复杂密码<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig1.jpg" width=502 border=0><br>禁用目标帐户，将用户SID迁移到目标域<br><img height=362 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig2.jpg" width=503 border=0><br>转换漫游配置文件<br><img height=360 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig3.jpg" width=501 border=0><br><br>2.转换用户profile<br>安全性转换向导，先前迁移的对象<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/profile1.jpg" width=503 border=0><br>用户配置文件<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/profile2.jpg" width=501 border=0><br>替换安全性引用<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/profile3.jpg" width=502 border=0><br><br>3.迁移工作站<br>选择工作组和拥护权利<br><img height=362 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/workstation1.jpg" width=501 border=0><br>选择添加<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/workstation2.jpg" width=501 border=0><br>迁移代理<br><img height=528 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/workstation3.jpg" width=515 border=0><br><br>4.再次迁移帐号<br>迁移密码<br><img height=360 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig4.jpg" width=503 border=0><br>启用目标帐户<br><img height=360 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig5.jpg" width=501 border=0><br>转换漫游配置文件,更新用户权利,修复用户的组成员身份<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig6.jpg" width=501 border=0><br>迁移并合并冲突的对象<br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/usermig7.jpg" width=501 border=0><br><br>5.再次迁移所有全局组</p>
<p><img height=360 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/groupmig2.jpg" width=502 border=0><br><img height=361 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/groupmig3.jpg" width=502 border=0><br><br>&nbsp;迁移完成后,使用用户帐号登陆,桌面一切都正常, 结果访问源域共享资源竟然提示不能访问, 奇怪<br>步骤都是按照help的文档<br>使用Adsiedit.msc检查帐号和群组的SIDhistory属性，都已经迁移过来<br>通过Windows Resource Kit工具检查<br>WhoamI /All, SIDhistory也已经存在<br>&nbsp;<br>用户信息<br>----------------</p>
<p>用户名&nbsp;&nbsp;&nbsp;&nbsp; SID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br>========== ============================================<br>msft\user1 S-1-5-21-921174561-3067888446-272819519-1113</p>
<p>组信息<br>-----------------</p>
<p>组名&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 类型&nbsp;&nbsp; SID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 属性&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br>================================ ====== ============================================== ==============================<br>Everyone&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 已知组 S-1-1-0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>BUILTIN\Users&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 别名&nbsp;&nbsp; S-1-5-32-545&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>NT AUTHORITY\INTERACTIVE&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 已知组 S-1-5-4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>NT AUTHORITY\Authenticated Users 已知组 S-1-5-11&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>NT AUTHORITY\This Organization&nbsp;&nbsp; 已知组 S-1-5-15&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>LOCAL&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 已知组 S-1-2-0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>MSFT\Global Group1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 组&nbsp;&nbsp;&nbsp;&nbsp; S-1-5-21-921174561-3067888446-272819519-1111&nbsp;&nbsp; 必需的组, 启用于默认, 启用的组<br>MSFT\user1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 用户&nbsp;&nbsp; S-1-5-21-4123853966-2211756669-3874129515-1108 必需的组, 启用于默认, 启用的组<br><span style="COLOR: red">MSFT\Global Group1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 组&nbsp;&nbsp;&nbsp;&nbsp; S-1-5-21-4123853966-2211756669-3874129515-1112 必需的组, 启用于默认, 启用的组 (SIDHistory)</span></p>
<p>特权信息<br>----------------------</p>
<p>特权名&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 描述&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 状态&nbsp; <br>======================= ============ ======<br>SeChangeNotifyPrivilege 跳过遍历检查 已启用<br><br>从网上翻了下资料，有说到SID Filter开启会导致资源不能访问这个情况，可以明明我已经作过了关闭SID Filter命令了<br>再仔细看看我前面做的Netdom trust命令，突然想到，是不是原来做的时候源域和目标域的方向反了<br>重新执行命令。<br>netdom trust <span style="COLOR: red">leaderit</span> /domain:<span style="COLOR: red">msft</span> /quarantine:no /userd:administrator /passwordd:pass01!</p>
这下问题解决，可以正常访问源域的共享资源了<br>
<img src ="http://www.cnitblog.com/joyclear/aggbug/50143.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-11-10 16:34 <a href="http://www.cnitblog.com/joyclear/archive/2008/11/10/50143.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>DC Group Policy中的 Logon Audit 和 Account Logon Audit</title><link>http://www.cnitblog.com/joyclear/archive/2008/08/05/47628.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 05 Aug 2008 03:17:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/08/05/47628.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/47628.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/08/05/47628.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/47628.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/47628.html</trackback:ping><description><![CDATA[Logon Audit和Account Logon Audit在MCSE的题目中经常出现，老是浑搅概念。<br>从开发小组人员的Blog来看，The Answer is Actually pretty simple-we're bad at choosing names.<br><br>Logon Audit是审核本地登陆信息<br>Account Logon Audit审核域帐号登陆信息<br><br>
<p class=postcontent><font face=Tahoma color=#000000 size=2>One of the most common questions that I get about Windows Auditing is, how come you guys were so @#%! stupid that you put in two logon categories?</font></p>
<p class=postcontent><font face=Tahoma color=#000000 size=2>The answer is actually pretty simple- we're bad at choosing names.&nbsp; "Account Logon" isn't really about logon, it's about credential validation.</font></p>
<p class=postcontent><font face=Tahoma color=#000000 size=2>Here's the low down on what is the difference between Logon/Logoff and Account Logon events, and how to decipher Account Logon events.</font></p>
<p class=postcontent><span class=838255816-03082005><font face=Tahoma color=#000000 size=2><strong>Audit Logon/Logoff generates events for the creation and destruction of logon sessions.&nbsp; These events occur on the machine which was accessed</strong>.&nbsp; In the case of an interactive logon, these would be generated on the machine which was logged on to.&nbsp; In the case of network logon, for example, accessing a share, these events would be generated on the machine hosting the resource that was accessed.</font></span></p>
<p class=postcontent><span class=838255816-03082005><font face=Tahoma color=#000000 size=2><strong>Audit Account Logon generates events for credential validation. These events occur on the machine which is authoritative for the credentials</strong>.&nbsp; For domain accounts, the domain controller is authoritative. For local accounts, the local machine is authoritative.&nbsp; Since domain accounts are used much more frequently in enterprise environments than local accounts, most of the Account Logon events in a domain environment occur on the domain controllers which are authoriative for the domain accounts.&nbsp; However, these events can occur on any machine, and may occur in conjunction with or on separate machines from logon/logoff events.</font></span></p>
<p class=postcontent><span class=838255816-03082005><font face=Tahoma size=2><strong>Logging on interactively to a workstation, using a domain account, can cause more activity than you might expect on the DC.&nbsp; </strong>An interactive logon is pretty complex and involves multiple steps.&nbsp; Typically, from the time you turn on your workstation until the time you are viewing your desktop, the following things happen:</font></span></p>
<div class=postcontent>
<ul>
    <li><span class=838255816-03082005><font face=Tahoma size=2>Machine establishes trust with domain: Kerberos AS request (Event 672 on the DC), Kerberos TGS request for AD (DC, 673)</font></span>
    <li><span class=838255816-03082005><font face=Tahoma size=2>Machine gets policy: Kerberos TGS request for access to Netlogon share on DC [group policy] (DC, 673) (DC, 540, 538, maybe more than once)</font></span> </li>
</ul>
</div>
<p><span class=838255816-03082005><font face=Tahoma size=2>User logs on: Kerberos AS request (DC, 672), Kerberos TGS request for AD (DC, 673), Logon session created (workstation, 528, 576)</font></span> </p>
<ul>
    <li><span class=838255816-03082005><font face=Tahoma size=2>User gets policy: Kerberos TGS request for DC\Netlogon [logon scripts, group policy] (DC, 673), Network logon (DC, 540, 538, usually 2-3 rounds)</font></span></li>
</ul>
<p><font face=Tahoma><font size=2><span class=838255816-03082005><font color=#000000>In Account Logon failures for Kerberos,&nbsp;the KDC has to generate an AS reply with an RFC 1510 error.&nbsp;Since RFC 1510 error codes don't contemplate Windows-specific errors, and we have to return Kerberos-specific errors in Kerberos AS request failure replies, we had to map Windows error conditions to kerberos error codes. </font></span><span class=838255816-03082005><font color=#000000>The error code mappings are described in the Kerberos Troubleshooting document that is available on Microsoft.com: </font><a href="http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/tkerberr.mspx"><font color=#000000><u>http://www.microsoft.com/technet/prodtechnol/windowsserver2003/technologies/security/tkerberr.mspx</u></font></a></span></font></font></p>
<p><span class=838255816-03082005><font face=Tahoma color=#000000 size=2>Here are some questions that you might have about Account Logon events:</font></span></p>
<p><span class=838255816-03082005></span><span class=838255816-03082005><font face=Tahoma color=#000000 size=2>Q: Why do you only have the IP address in the Account Logon event, and not the computer name?<br>A: There are three reasons:</font></span></p>
<ol>
    <li><span class=838255816-03082005><font face=Tahoma color=#000000 size=2>There is no secure method for the KDC to get the remote machine's name at the current time.&nbsp; If the client provides the name (as in NTLM), then it's not trustworthy and can be spoofed.&nbsp; There are Unix-based hacking tools which spoof workstation name in NTLM auth requests.</font></span>
    <li><span class=838255816-03082005><font face=Tahoma color=#000000 size=2><span class=838255816-03082005><font color=#000000 size=2><font face=Tahoma>DNS and NetBIOS reverse lookup are not secure and are not reliable- if we tried this, we'd have a high incidence of incorrect or missing information, and hurt performance.</font></font></span></font></span>
    <li><span class=838255816-03082005><font face=Tahoma color=#000000 size=2><span class=838255816-03082005></span>Even if we chose to do add the name anyway, when we could, there's no field for us to use to carry it&nbsp;in Kerberos AS REQ &amp; TGS REQ messages- we'd have to overload some other field, and run a high risk of loss of compatibility with MIT's reference implementation.</font></span></li>
</ol>
<p><span class=838255816-03082005><font face=Tahoma size=2>Q: How do I correlate the Account Logon event on a DC with the Logon/Logoff event on the machine which was accessed?<br></font></span><span class=838255816-03082005><font face=Tahoma size=2>A:&nbsp;Easy!&nbsp; The Account Logon event and the Logon/Logoff event both contain a field called a Logon GUID, starting in Windows Server 2003.&nbsp; Just compare the GUIDs- if they match, it's the same Kerberos ticket.&nbsp; Unfortunately this only works for Kerberos; other Logon events contain a GUID that is all zeroes.</font></span></p>
<p><span class=838255816-03082005><font face=Tahoma size=2>Q: Is there such a thing as an Account Logoff event?<br>A: No.&nbsp;The DC is only aware of logons, not logoffs (there's no possible way to force a machine to contact a DC when logging off- consider crashes, etc.)</font></span></p>
<p><span class=838255816-03082005><font face=Tahoma size=2>Q: I just want to monitor my DC's logs.&nbsp; Is that good enough?<br>A: Well, the DC has a distorted view of logon as mentioned above.&nbsp; Also, the DC only knows where the logon request came from most recently.&nbsp; Consider using IIS- the logon request originates at a browser somewhere on the internet.&nbsp; IIS receives the request and then sends a logon request to the DC.&nbsp; From the DC's point of view, the source of the logon is IIS.&nbsp; If you only collect the DC's logs, you'll miss the detail of where the request came from.&nbsp; This is true for any network service- RPC, file sharing, remote desktop, etc.&nbsp; Also, the DC doesn't have enough information to answer "how long was the user logged on".&nbsp; However there is one really interesting piece of information in DC logs.&nbsp; In event 673 (Kerberos Service Ticket granted), the service name is listed.&nbsp; This is the most detail that the DC can provide, on what the user was logging on for.</font></span></p>
<p><span class=838255816-03082005><font face=Tahoma size=2>Eric</font></span></p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/47628.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-08-05 11:17 <a href="http://www.cnitblog.com/joyclear/archive/2008/08/05/47628.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>组策略使用中的一些工具</title><link>http://www.cnitblog.com/joyclear/archive/2008/07/23/47031.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Wed, 23 Jul 2008 03:30:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/07/23/47031.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/47031.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/07/23/47031.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/47031.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/47031.html</trackback:ping><description><![CDATA[&nbsp;
<p align=left><strong><span>Dcgpofix </span></strong><span>如果以下两个默认</span><span> GPO </span><span>中的一个出现了问题，则可以使用该工具：默认域策略和默认域控制器策略。如果其中一个或全部两个</span><span> GPO </span><span>损坏，程度严重到仅靠配置方式已经无法修复，或者存在一些其他未知问题，则可以使用</span><span> dcgpofix </span><span>工具将其还原为默认状态。此工具包含在</span><span> Windows Server</span><span>&#174;</span><span> 2003 </span><span>中。不应在</span><span> Windows 2000 </span><span>域控制器上运行此工具；可使用</span><span> Recreatedefpol </span><span>来代替。请记住，使用此工具后会丢失所有自定义设置。</span></p>
<p align=left><strong><span>Recreatedefpol </span></strong><span>该工具类似于</span><span> Dcgpofix</span><span>，但只用于</span><span> Windows 2000 </span><span>服务器。可将两个默认的</span><span> GPO </span><span>返回到其刚安装的状态。此工具应仅用于灾难恢复，不可用于</span><span> GPO </span><span>的日常维护。</span><span><a href="http://go.microsoft.com/fwlink/?LinkId=77612"><span><span>单击此处下载该工具</span></span></a></span><span>。</span></p>
<p align=left><strong><span>Gpotool </span></strong><span>由于</span><span> GPO </span><span>是从域控制器（最初先在此域控制器中进行更改，然后扩展到所有其他域控制器）复制的，因此可能会出现复制失败或聚合无效的现象。结果可能是对各目标计算机所适合应用的更改不一致或失败。像</span><span> Gpresult </span><span>和</span><span> RSOP </span><span>这样的工具可以帮助确定应用了哪些</span><span> GPO</span><span>，而</span><span> Gpotool </span><span>工具则可以帮助确定每个域控制器上的</span><span> GPO </span><span>是否一致。此工具是</span><span> Windows Server 2003 Resource Kit </span><span>的一部分，其网址为</span><span> go.microsoft.com/fwlink/?LinkId=77613</span><span>。</span></p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/47031.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-07-23 11:30 <a href="http://www.cnitblog.com/joyclear/archive/2008/07/23/47031.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Exchange Server 和 Windows Server 2008</title><link>http://www.cnitblog.com/joyclear/archive/2008/06/19/45876.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Thu, 19 Jun 2008 04:20:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/06/19/45876.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/45876.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/06/19/45876.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/45876.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/45876.html</trackback:ping><description><![CDATA[<p><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007 SP1</span><span>是目前支持</span><span>Windows Server 2008</span><span>的唯一版本<br></span></p>
<p>Exchange2007RTM和Exchange2003 SP2支持Windows 2008域控的环境安装<span><br>不能直接从安装</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007 RTM</span><span>或</span><span>SP1</span><span>的系统升级到</span><span>Windows Server 2008, </span><span>因此想在</span><span>Windows Server 2008</span><span>上安装</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge</span><span>的方法是：安装一台新的</span><span>Windows Server 2008 </span><span>然后安装</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007 SP1</span></p>
<p>&nbsp;</p>
<p><span>Windows 2008</span><span>针对</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge</span><span>的改进提高</span></p>
<p>&nbsp;<strong><span>支持多网段冗余群集</span></strong></p>
<p><strong><span>更快的日志文件传送</span></strong><span>：</span><span>CCR</span><span>和</span><span>SCR</span><span>使用</span><span>Server Mess<st1:personname w:st="on">a</st1:personname>ge Block</span><span>（</span><span>SMB</span><span>）协议来复制日志文件，</span><span>Windows 2008</span><span>使用</span><span>SMB V2</span><span>，提高了</span><span>30-40%</span><span>的传送性能</span></p>
<p><strong><span>减少了硬件维护的当机时间：</span></strong><span>Windows Server 2008 </span><span>支持核心硬件的热插拔</span></p>
<p><strong><span>修复</span><span>NTFS</span></strong><strong><span>故障，当机时间接近零：</span></strong><span>在</span><span>Windows 2003</span><span>和以前的版本，修复</span><span>NTFS</span><span>故障需要使服务器离线，然后运行</span><span>Chkdsk</span><span>工具。</span><span>Windows 2008</span><span>包括一个新的功能</span> <span>Self-he<st1:personname w:st="on">a</st1:personname>ling NTFS.</span></p>
<p><strong><span>提高了</span><span>Outlook AnyWhere</span></strong><strong><span>服务的性能</span></strong><span>：</span><span>Windows 2008</span><span>包含下一代</span><span>Tcp/ip</span><span>堆栈，移除了以前版本</span><span>RPC proxy </span><span>服务的</span><span>TCP</span><span>连接限制，现在支持单</span><span>IP</span><span>连接限制。在</span><span>Windows 2003</span><span>里面支持最大</span><span>65535</span><span>个连接，在</span><span>windows 2008</span><span>里面支持每个</span><span>IP</span><span>地址最多</span><span>65535</span><span>个连接。</span></p>
<p><strong><span>更简单部署：</span></strong><span>Windows 2008</span><span>包括</span><span>MMC3.0, Powershell</span><span>，</span> <span>.net Fr<st1:personname w:st="on">a</st1:personname>mework</span></p>
<p><strong><span>支持</span><span>IPv6:</span></strong></p>
<p><strong>&nbsp;</strong></p>
<p><strong><span>一些变化</span></strong></p>
<p><span>Windows 2008</span><span>不包括支持</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge API</span><span>接口的备份工具，</span><span>Windows Server B<st1:personname w:st="on">a</st1:personname>ckup</span><span>不能备份</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007 (</span><span>即将发行的</span><span>SBS2008, </span><span>将支持</span><span>Exch<st1:personname w:st="on">a</st1:personname>nge</span><span>备份</span><span>)</span></p>
<p><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007</span><span>不会使用只读域控和只读</span><span>GC</span></p>
<p><span>Exch<st1:personname w:st="on">a</st1:personname>nge 2007</span><span>不能安装在</span><span>Server Core</span><span>上面：</span><span>Server Core</span><span>上面即不能安装</span><span>Powershell</span><span>也不能安装</span><span>.Net Frem<st1:personname w:st="on">a</st1:personname>work<br><br>摘自：MSExchangeTeam Blog</span></p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/45876.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-06-19 12:20 <a href="http://www.cnitblog.com/joyclear/archive/2008/06/19/45876.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>How to enable Remote Desktop on Windows 2008 Server Core</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/30/44588.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Fri, 30 May 2008 02:02:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/30/44588.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/44588.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/30/44588.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/44588.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/44588.html</trackback:ping><description><![CDATA[1. Logon into the server console.<br>&nbsp;<br>2. To enable remote administration from Windows Vista/Windows 2008; Write the command in<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; the Windows shell:<br>&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "<strong>Cscript %windir%\system32\SCRegEdit.wsf /ar 0</strong>" and press the "<strong>Enter</strong>" button.<br>&nbsp;<br>&nbsp;<br><strong>Note</strong>: &nbsp;To enable remote administration from Windows XP/2003 and earlier operating system; <br>&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Write the command in&nbsp;the Windows shell:<br>&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "<strong>Cscript %windir%\system32\SCRegEdit.wsf /ar 0</strong>" and press the "<strong>Enter</strong>" button.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br><br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;"<strong>Cscript %windir%\system32\SCRegEdit.wsf /cs 0</strong>" and press the "<strong>Enter</strong>" button.&nbsp;&nbsp;<br>
<img src ="http://www.cnitblog.com/joyclear/aggbug/44588.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-30 10:02 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/30/44588.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Exchange2003中的通用组</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/20/43985.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Tue, 20 May 2008 15:44:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/20/43985.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/43985.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/20/43985.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/43985.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/43985.html</trackback:ping><description><![CDATA[<span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: ZH-CN; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">今天在看Exchange2003管理手册中，发现自己原来的理解错误，原来以为GC在多域环境中内容都是一样的...<br>看来要重新看一下AD的资料了<br><br>为了将通讯组列表展开为各个收件人</span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">，</span><span lang=EN-US style="FONT-SIZE: 10.5pt; FONT-FAMILY: 'Times New Roman'; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-font-kerning: 1.0pt; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">Exch<st1:personname w:st="on">a</st1:personname>nge </span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">会</span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: ZH-CN; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">与全局编录服务器联系。全局编录服务器<span style="COLOR: red">具有它所在域中所有全局组和通用组的副本以及其他域中通用组的副本，</span>但没有其他域中全局组的副本。这一点在多域环境中很重要，因为如果邮件发往全局编录服务器不属于的域中的某个全局通讯组，那么</span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 'Times New Roman'; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-fareast-font-family: 宋体; mso-font-kerning: 1.0pt; mso-ansi-language: ZH-CN; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA"> Exch<st1:personname w:st="on">a</st1:personname>nge </span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: ZH-CN; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">无法展开该邮件中包含的通讯组。由于全局编录服务器没有自己所在域之外的域的全局组成员身份的副本，也就不包含有关通讯组列表的任何信息。因此</span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">，</span><span style="FONT-SIZE: 10.5pt; FONT-FAMILY: 宋体; LETTER-SPACING: -0.15pt; mso-bidi-font-size: 12.0pt; mso-font-kerning: 1.0pt; mso-ascii-font-family: 'Times New Roman'; mso-hansi-font-family: 'Times New Roman'; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: ZH-CN; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA">分类程序无法展开通讯组列表。为避免此问题，<span style="COLOR: red">应始终在多域环境中使用通用通讯组。</span>应只在单个域中使用全局组。</span>
<img src ="http://www.cnitblog.com/joyclear/aggbug/43985.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-20 23:44 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/20/43985.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>Windows 2008 Dcpromo新特征</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/09/43553.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Fri, 09 May 2008 08:54:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/09/43553.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/43553.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/09/43553.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/43553.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/43553.html</trackback:ping><description><![CDATA[<p>&nbsp; Windows 2008已经发布一段时间了，IT Pro又要开始跟上微软的脚步，不断学习咯...<br><br>运行Dcpromo<br>在配置选项里面多了create a new domain tree root instead of a new child domain ,还不确定是什么性质</p>
<img height=506 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/dcpromo1.jpg" width=548 border=0><br>可以选择windows2008架构<br><img height=512 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/dcpromo2.jpg" width=541 border=0><br>安装选项增加了设定GC和只读域控RODC选项<br><img height=523 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/dcpromo3.jpg" width=551 border=0><br>恢复模式密码因为2008安全升级了，不能再设置为空<br><img height=523 alt="" src="http://www.cnitblog.com/images/cnitblog_com/joyclear/dcpromo4.jpg" width=544 border=0> 
<img src ="http://www.cnitblog.com/joyclear/aggbug/43553.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-09 16:54 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/09/43553.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>如何禁用USB存储设备</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/08/43525.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Thu, 08 May 2008 15:48:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/08/43525.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/43525.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/08/43525.html#Feedback</comments><slash:comments>4</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/43525.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/43525.html</trackback:ping><description><![CDATA[根据您的描述，我对这个问题的理解是：您想禁止用户使用usb设备。如果我的理解有误，请告诉我。<br><br>我假设您只是想禁止用户使用USB存储设备，而不是所有USB设备。<br><br>根据下面两篇KB，您能通过禁止用户对usbstor.pnf和usbstor.inf的访问来实现禁用USB存储设备：<br>如何禁用 USB 存储设备<br><a href="http://support.microsoft.com/kb/823732/zh-cn"><u><font color=#0000ff>http://support.microsoft.com/kb/823732/zh-cn</font></u></a><br>如何使用 Xcacls.exe 修改 NTFS 权限<br><a href="http://support.microsoft.com/kb/318754/zh-cn"><u><font color=#0000ff>http://support.microsoft.com/kb/318754/zh-cn</font></u></a><br><br>参考上面两篇KB，您只需建立一条使用xcacls，设置usbstor.pnf和usbstor.inf上domain users组用户的拒绝权限的登陆脚本，在用户登陆后他们自然就无法使用USB存储设备了，而administrator由于访问权限没有更改，所以可以继续使用USB存储设备。<br>我以domain users组为例：<br>Xcacls %systemroot%\inf\usbstor.pnf /d &#8220;domain users&#8221; /y<br>Xcacls %systemroot%\inf\usbstor.inf /d &#8220;domain users&#8221; /y<br><br>我以编辑域策略为例提供设置脚本的步骤如下：<br>1. 将xcacls和脚本放在所有用户都能访问的共享目录内（比如netlogon）<br>2. 运行dsa.msc命令<br>3. 右键点击域名，打开属性<br>4. 点击组策略属性页<br>5. 新建一个组策略，给予一个恰当的名称然后点击编辑（或者编辑默认域策略）<br>6. 定位到：计算机配置-&gt;Windows 设置-&gt;脚本-&gt;启动<br>7. 双击启动脚本，将配置的脚本添加进去<br>8. 点击确定<br>9. 运行gpupdate /force刷新这一策略<br>这样下次计算机重启后本地文件的权限酒杯更改了。这一脚本只需运行一次，在您确认所有计算机都执行过这一脚本后，您就可以撤销这条策略了。<br><br>希望我的回答对您有所帮助，如果有不清楚的地方，请告诉我。<br><br>感谢您选择微软产品并使用微软合作伙伴新闻组技术支持！<br><br>SEAN CAI 蔡怡林<br>MCSE2000<br>在线合作伙伴支持工程师<br>合作伙伴支持部<br>微软全球技术支持中心<br>
<img src ="http://www.cnitblog.com/joyclear/aggbug/43525.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-08 23:48 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/08/43525.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>AD通讯端口表</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/08/43505.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Thu, 08 May 2008 06:43:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/08/43505.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/43505.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/08/43505.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/43505.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/43505.html</trackback:ping><description><![CDATA[&nbsp;
<p><span>Active Directory Ports</span></p>
<table cellSpacing=0 cellPadding=0 border=1>
    <tbody>
        <tr>
            <td vAlign=top width=189>
            <p><span>Services</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>Port</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>Protocol</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>DNS</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP/UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>53</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>Kerberos</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP/UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>88</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>RPC</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>135</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>Netbios</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>137</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>Netbios</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>138</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>LDAP </span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TPC/UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>389</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>LDAP SSL</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>636</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>LDAP GC</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP/UDP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>3268</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>LDAP GC SSL</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>3269</span></p>
            </td>
        </tr>
        <tr>
            <td vAlign=top width=189>
            <p><span>SMB</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>TCP</span></p>
            </td>
            <td vAlign=top width=189>
            <p><span>445</span></p>
            </td>
        </tr>
    </tbody>
</table>
<img src ="http://www.cnitblog.com/joyclear/aggbug/43505.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-08 14:43 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/08/43505.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>用户帐号经常锁定</title><link>http://www.cnitblog.com/joyclear/archive/2008/05/07/43463.html</link><dc:creator>joyclear</dc:creator><author>joyclear</author><pubDate>Wed, 07 May 2008 04:01:00 GMT</pubDate><guid>http://www.cnitblog.com/joyclear/archive/2008/05/07/43463.html</guid><wfw:comment>http://www.cnitblog.com/joyclear/comments/43463.html</wfw:comment><comments>http://www.cnitblog.com/joyclear/archive/2008/05/07/43463.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/joyclear/comments/commentRss/43463.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/joyclear/services/trackbacks/43463.html</trackback:ping><description><![CDATA[<p>您好！您可以下再Account Lockout and Management Tools工具，使用Acctinfo.dll以解决账户锁定的问题，在执行ALTools.exe文件后，解压到某一文件夹后就可以使用了。具体的下载地址如下：<br><a href="http://www.microsoft.com/downloads/details.aspx?FamilyId=7AF2E69C-91F3-4E63-8629-B999ADDE0B9E&amp;displaylang=en"><u><font color=#800080>http://www.microsoft.com/downloads/details.aspx?FamilyId=7AF2E69C-91F3-4E63-8629-B999ADDE0B9E&amp;displaylang=en</font></u></a></p>
<p>Acctinfo.dll<br>Acctinfo.dll是一个动态链接库文件，注册这个动态链接库文件之后，管理员可以通过使用&#8220;Active Directory用户和计算机&#8221;管理控制台查看用户属性的时候，增加一个&#8220;Additional Account Info&#8221;选项卡。这个选项卡可以让管理员查看Active Directory中的一些高级信息，例如：用户上次修改密码时间、用户帐户上次登录时间等。使用&#8220;Additional Account Info&#8221;选项卡查看信息，主要是出于以下两个方面的需求。在某些情况下，部分信息没有被存储在Active Directory中，而是被存储在本地。</p>
<p>例如：某用户帐户上次登录时间和上次注销时间仅仅被存储每个域控制器本地，并没有复制到域中的其他域控制器中。Acctinfo.dll可以帮助管理员检查某台域控制器上用户上次登录和注销的具体时间。如果你在域中有多个域控制器，管理员可能需要在每个域控制器上都安装Acctinfo.dll以检查某一个用户帐户在每台域控制器上的登录、注销时间。</p>
<p>此外，使用Acctinfo.dll还可以更加方便的修改用户帐户密码，锁定或解除锁定用户帐户。Acctinfo.dll解除用户帐户的锁定状态的具体步骤如下：<br>1.在使用Acctinfo.dll之前，需要安装注册Acctinfo.dll文件。<br>2.将Acctinfo.dll文件复制到&#8220;%windir%\system32&#8221;文件夹中。在Windows Server 2003中，通常这个文件夹为&#8220;C:Windows\System32&#8221;；在Windows 2000中，这个文件夹通常为&#8220;C:Winnt\System32&#8221;。<br>3.打开命令行窗口，假设&#8220;%windir%\system32&#8221;文件夹为&#8220;C:Windows\System32&#8221;，键入以下内容：regsvr32 c:windows\system32\acctinfo.dll<br>4.如果命令执行成功，将会出现一个成功注册Acctinfo.dll的对话框。<br>5.点击&#8220;开始&#8221;－&gt;&#8220;运行&#8221;－&gt;输入&#8220;DSA.MSC&#8221;－&gt;&#8220;Active Directory用户和计算机&#8221; －&gt;选择被锁定的用户－&gt;右键点击&#8220;属性&#8221;<br>6.在&#8220;Additional Account Info&#8221;选项卡中，单击&#8220;Set PW On Site DC&#8221;按钮。在新出现的对话框中,修改用户帐户的密码。这种密码修改方式是直接连接到用户所在站点的域控制器上执行操作，所以执行速度更快。同时在这个对话框中，也可以解除用户帐户的锁定状态。希望我的回复对您有所帮助。</p>
<p>Tom Zhang 张一平<br>在线技术支持工程师<br>微软全球技术支持中心</p>
<img src ="http://www.cnitblog.com/joyclear/aggbug/43463.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/joyclear/" target="_blank">joyclear</a> 2008-05-07 12:01 <a href="http://www.cnitblog.com/joyclear/archive/2008/05/07/43463.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>