to
not
be listed on the logon screen.
You can change the number of cached logons but let's
fix the real problem first.
It's probably a DNS issue:
DNS for AD
1) Dynamic for the zone supporting AD
2) All internal DNS clients NIC\IP properties must specify
SOLELY that internal, dynamic DNS server (set.)
3) DCs and even DNS servers are DNS clients too -- see #2
Restart NetLogon on any DC if you change any of the above that
affects a DC and/or use:
nltest /dsregdns /server

C-ServerNameGoesHere
Ensure that DNS zones/domains are fully replicated to all DNS
servers for that (internal) zone/domain.
About the GINA--could you either explain that a little more or refer
me
to
an article that explains it? I've never heard about it, and I'm
always open to learning new stuff.
It's not usually imporatant -- I just happen to have worked
with the signon source code, writing and advising on the
writing of a custom GINA: Graphical Identification 'n
Authentication.
You can search for something like this through Google:
[ msgina microsoft: ]
or
[ msgina site:microsoft.com ]
or
[ msgina site:msdn.microsoft.com ]
--
Herb Martin
Thanks!
-John
Thanks for the response. I appreciate the help.
A couple of questions--
How long should it take to remove itself from the list? It's been
a
few
days and it's still there?
What is an external trust?
Generally it should remove on the next boot after
replication of the DCs.
Once the DCs don't know about the trust (it is removed)
and the machine rebuilds (re-queries) from the DCs this
should go.
One must wonder if your DCs are replicating and if the
machines are properly authenticating with (a replicated)
DC.
PT mentioned WINS issues but that is generally only
an issue for domains and servers continuing to show
up in the BROWSE lists.
(The code in the GINA which builds the logon list of
domains does not use directly -- except may to find
it's own DC. GINA==logon screen)
The machines do however remember that list (I believe)
between boots, in case they are offline, and so it can
survive reboots if the machine is not authenticating.
Most authentication problems are really DNS issues
in Win2000+ Domains:
DNS for AD
1) Dynamic for the zone supporting AD
2) All internal DNS clients NIC\IP properties must specify
SOLELY that internal, dynamic DNS server (set.)
3) DCs and even DNS servers are DNS clients too -- see #2
Restart NetLogon on any DC if you change any of the above that
affects a DC and/or use:
nltest /dsregdns /server

C-ServerNameGoesHere
Ensure that DNS zones/domains are fully replicated to all DNS
servers for that (internal) zone/domain.
--
Herb Martin
Thank you
-John
Hi,
As per the advice that I got here, I followed what KB 216498
said
and
I
successfully removed a domain from Active Directory. The
domain
that
was
removed was had a trust relationship with our current
(surviving)
domain
and
consequently at the logon screen of the computers it was
listed
as
an
available domain to log onto. My question has a couple of
parts---1) Now that I've removed the trust and the computer
metadata from AD,
will
that
disappear on the workstations, or do I have to manually remove
it
as
well?
and 2) We want to rejoin the computer that was removed and we
want
to
keep
the same domain and computer name. Will this cause any
problems
if
that
domain is still listed on the workstations before it is
rejoined?
It should disappear after the domain and it's trust are gone,
replicated etc.
IF this was an external trust you should also deleted this
from the machine domain.
Thank you in advance for any help that can be given, and let
me
know
if
I
outlined our problem clearly.
--
Herb Martin
-John