HOW WINDOWS DOMAIN USERS CAN RESTRICT PINNED COMPUTER LOGINS

Updated on technology 2024-02-09
5 answers
  1. Anonymous users2024-02-06

    It can be solved by setting up a small virtual LAN, using a firewall, or using a Windows messenger service.

    1) You can treat all users on the whole computer as a whole, establish a small virtual local area network, and restrict the computers with specific IPs to be connected, and the computers that cannot be connected will of course not be able to log in.

    2) The solution is the same as that of (1) and is to use a firewall for connection management. Only computers with specific IP addresses can be accessed to prevent other computers from logging in remotely. However, it is recommended to use a hardware firewall, which may lead to a system crash or even compromise in the event of a DDoS attack (traffic attack).

    3) The Windows Messenger service is only available when a computer tries to log in remotely, and can be set to "prompt the administrator when the 'remote user login' rule is triggered". However, this method can only be used to alert the administrator account when a computer triggers the rule, and the administrator account must ** to receive the information, and the user must be manually logged out by the administrator to terminate the connection, and if you want to actively restrict, you must establish a small virtual area network.

  2. Anonymous users2024-02-05

    It is not possible for two computer names to exist at the same time within a domain.

  3. Anonymous users2024-02-04

    Just set it up on AD:

    1. Open the user and computer on the AD.

    2. User Properties - Account - This user can log in to: Select the following computer.

    Add the computers that are allowed to log in to the list.

    It is not possible to have two computers with the same name in the same domain. The second one is untakable.

    Other than that. You say swap computer names. This administrator doesn't need to give permissions.。。 Ordinary domain accounts cannot modify the computer name...

  4. Anonymous users2024-02-03

    In addition to modifying the configuration files inside Linux, you can also use PAM to control the access of users who use the virtual hail. In China, it is called privilege management, that is, identity authentication and access control for people with high authority in the enterprise. PAM is a flexible authentication framework that can be used to control user access to various services and applications in a Linux system.

  5. Anonymous users2024-02-02

    In a domain environment, how to set a specified domain username to log in to the machine, other domain usernames are not allowed to log in, and the administrator is not restricted?

    1. Open [Control Panel] - [Management] - [Computer Management] 2, and [Groups] under [Local Users and Groups] on the left

    3. Open 'administrators''attributes, add the specified domain username as the native administrator, and apply OK.

    4. Open'guests'property, delete the guest user inside the guest, and apply OK.

    5. Open'power

    users'attributes, remove all domain users inside, apply OK.

    6. Open'remote

    desktop

    users'attributes, remove all domain users inside, apply OK.

    7. Open'users'attributes, remove all domain users inside, apply OK.

    Software Tutorial Recommendation:

    The computer is powered on to display CMOS

    setting

    Several workarounds for wrong.

    What should I do if the file cannot be opened or displayed for renaming when double-clicking on the computer mouse?

    Win8 sets the implementation method that the computer will not shut down when pressing the power button.

Related questions
7 answers2024-02-09

It is recommended to restart the domain server to take a look.

3 answers2024-02-09

【Hello】【

I don't understand what you mean by memory limit cracking. >>>More

7 answers2024-02-09

By default, XP retains 20% of the bandwidth of a NIC. If you're using broadband, you may exceed this limit, so you need to remove it by doing the following: >>>More

5 answers2024-02-09

On the Windows 7 development platform, the Android Studio development tools use the following methods to limit the maximum number of characters that can be entered in EditText. >>>More

7 answers2024-02-09

Use new modes and new ways to play to retain users, don't stay the same all the time, and look for changes.