473,396 Members | 2,098 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

Workgroup Security

Hello All. I am the Network Admin for a medium sized company, that
refuses to make impacting changes to the current Implementation. Long
storey short, up to 2 years ago, the standard was P1 100, Win95, and a
printer along side every computer. (there were approx 70) The company
took off, and now have 500 Workstations running windows XP. They
refuse to pay for a domain controller, and I need to know if there is
anything I have missed in the WORKGROUP setup. I have users installing,
changing whatever they feel like. I have Party Poker servers running
on every night shift computer. I tried using MMC, and GPEDIT on the
local Workstations, but I am disabling those policies accross the Admin
accounts as well.
Any Ideas...This is a very long storey to post, Trust me Gurus, im not
new to this..

Dec 5 '06 #1
1 1064
This .NET, a MS software developing platform, NG. I do not see it has
something to do with your topic.

However, 500 workstations without a domain/directory control? If I was the
network admin, I'd find new job somewhere else immediately.

"IT Craig" <cr*******@gmail.comwrote in message
news:11**********************@l12g2000cwl.googlegr oups.com...
Hello All. I am the Network Admin for a medium sized company, that
refuses to make impacting changes to the current Implementation. Long
storey short, up to 2 years ago, the standard was P1 100, Win95, and a
printer along side every computer. (there were approx 70) The company
took off, and now have 500 Workstations running windows XP. They
refuse to pay for a domain controller, and I need to know if there is
anything I have missed in the WORKGROUP setup. I have users installing,
changing whatever they feel like. I have Party Poker servers running
on every night shift computer. I tried using MMC, and GPEDIT on the
local Workstations, but I am disabling those policies accross the Admin
accounts as well.
Any Ideas...This is a very long storey to post, Trust me Gurus, im not
new to this..

Dec 5 '06 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
by: Newbillian | last post by:
Is there some way of using vba to automate the processe of joining an Access 97 security workgroup? I typed wrkgadm /? at a command prompt and it just opens the gui, so I'm not sure what the...
1
by: Daniel | last post by:
Thank you for reading... I have developed two separate dbases using Access 2002. Each has their own workgroup specifications. On each users desktop I created a shortcut to the front end dbase...
4
by: Chris Tyson | last post by:
My problem is this: I have created a database, using Workgroup security features. Unique Workgroup. New users added. Permissions to Admins, Admin, and Users revoked. 'Ownership' of database...
7
by: Paul T. Rong | last post by:
A card where I wrote my name and WID (work group ID) was stolen (unfortunately together with other things), therotically the one who have my name and WID can create the same mdw file which I use...
1
by: Dom | last post by:
Hi, I have a problem in getting Access 2002 to read my workgroup file. I've created different groups and users and when the db is opened the user is prompted to enter a username and password...
1
by: raydelex | last post by:
I am new to securing a database with logins. My questions is: I want only one database to use a new Workgroup file that I have created, not all the Access databases that I bring up under my...
1
by: paulsmith5 | last post by:
Hi, I secured a database a while back using the User-Level Security Wizard. During this process I created a new workgroup file, modified the Admins group by adding a new administrator and...
1
by: Andrew Chanter | last post by:
I have taken over support of an A97 application which has presented an interesting and confounding scenario involving workgroup security. I cant figure out whether my predecessor deliberately...
3
by: JaBo | last post by:
Our company computers were recently upgraded to Windows XP with Microsoft Office 2003. We have 3 different Access Databases (in different directories on our network) which all require the user to...
2
by: dogman_2000 | last post by:
Hi All I am new to working with Access workgroup files and have a question. I joined a new access workgroup (one which was already created by a previous access developer) via the access Tools...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.