ARD User - Standard or Administrator on client Mac?

When using ARD 3 to 'Create Client Installer...' I end up with a new user on my network Macs who is a 'Standard' user for that Mac. Don't I really want the ADR User to be an 'Administrator' for that machine - or if not, why not?!
For example say I want to be control the System Preferences of a Mac in my office, to unlock these I need to be an Administrator.
I can't see reference to this in the ARD Admin Guide but surely I want ARD User to be an administrator user for the computer and other users just 'Standard' users.
I'm interested to hear what others do and their reasoning.
Thanks!
  Mac OS X (10.4.9)  

Please note: I'm NEW with ARD
Didn't you FIRST set up each machine in the System Preferences > Sharing> with a check mark beside Apple Remote Desktop then select the Access Privileges and set there what you want to be able to do.
Hope this helps
PowerBook G4   Mac OS X (10.4.9)   Active user group member; 12 years + on Mac.

Similar Messages

  • AnyConnect error " User not authorized for AnyConnect Client access, contact your administrator"

    Hi everyone,
    it's probably just me but I have tried real hard to get a simple AnyConnect setup working in a lab environment on my ASA 5505 at home, without luck. When I connect with the AnyConnect client I get the error message "User not authorized for AnyConnect Client access, contact your administrator". I have searched for this error and tried some of the few solutions out there, but to no avail. I also updated the ASA from 8.4.4(1) to 9.1(1) and ASDM from 6.4(9) to 7.1(1) but still the same problem. The setup of the ASA is straight forward, directly connected to the Internet with a 10.0.1.0 / 24 subnet on the inside and an address pool of 10.0.2.0 / 24 to assign to the VPN clients. Please note that due to ISP restrictions, I'm using port 44455 instead of 443. I had AnyConnect working with the SSL portal, but IKEv2 IPsec is giving me a headache. I have stripped down certificate authentication which I had running before just to eliminate this as a potential cause of the issue. When running debugging, I do not get any error messages - the handshake completes successfully and the local authentication works fine as well.
    Please find the current config and debugging output below. I appreciate any pointers as to what might be wrong here.
    : Saved
    ASA Version 9.1(1)
    hostname ASA
    domain-name ingo.local
    enable password ... encrypted
    xlate per-session deny tcp any4 any4
    xlate per-session deny tcp any4 any6
    xlate per-session deny tcp any6 any4
    xlate per-session deny tcp any6 any6
    xlate per-session deny udp any4 any4 eq domain
    xlate per-session deny udp any4 any6 eq domain
    xlate per-session deny udp any6 any4 eq domain
    xlate per-session deny udp any6 any6 eq domain
    passwd ... encrypted
    names
    name 10.0.1.0 LAN-10-0-1-x
    dns-guard
    ip local pool VPNPool 10.0.2.1-10.0.2.10 mask 255.255.255.0
    interface Ethernet0/0
    switchport access vlan 2
    interface Ethernet0/1
    interface Ethernet0/2
    interface Ethernet0/3
    interface Ethernet0/4
    interface Ethernet0/5
    interface Ethernet0/6
    interface Ethernet0/7
    interface Vlan1
    nameif Internal
    security-level 100
    ip address 10.0.1.254 255.255.255.0
    interface Vlan2
    nameif External
    security-level 0
    ip address dhcp setroute
    regex BlockFacebook "facebook.com"
    banner login This is a monitored system. Unauthorized access is prohibited.
    boot system disk0:/asa911-k8.bin
    ftp mode passive
    clock timezone PST -8
    clock summer-time PDT recurring
    dns domain-lookup Internal
    dns domain-lookup External
    dns server-group DefaultDNS
    name-server 10.0.1.11
    name-server 75.153.176.1
    name-server 75.153.176.9
    domain-name ingo.local
    object network obj_any
    subnet 0.0.0.0 0.0.0.0
    object network LAN-10-0-1-x
    subnet 10.0.1.0 255.255.255.0
    object network Company-IP1
    host xxx.xxx.xxx.xxx
    object network Company-IP2
    host xxx.xxx.xxx.xxx
    object network HYPER-V-DUAL-IP
    range 10.0.1.1 10.0.1.2
    object network LAN-10-0-1-X
    access-list 100 extended permit tcp any4 object HYPER-V-DUAL-IP eq 3389 inactive
    access-list 100 extended permit tcp object Company-IP1 object HYPER-V-DUAL-IP eq 3389
    access-list 100 extended permit tcp object Company-IP2 object HYPER-V-DUAL-IP eq 3389 
    tcp-map Normalizer
      check-retransmission
      checksum-verification
    no pager
    logging enable
    logging timestamp
    logging list Threats message 106023
    logging list Threats message 106100
    logging list Threats message 106015
    logging list Threats message 106021
    logging list Threats message 401004
    logging buffered errors
    logging trap Threats
    logging asdm debugging
    logging device-id hostname
    logging host Internal 10.0.1.11 format emblem
    logging ftp-bufferwrap
    logging ftp-server 10.0.1.11 / asa *****
    logging permit-hostdown
    mtu Internal 1500
    mtu External 1500
    ip verify reverse-path interface Internal
    ip verify reverse-path interface External
    icmp unreachable rate-limit 1 burst-size 1
    icmp deny any echo External
    asdm image disk0:/asdm-711.bin
    no asdm history enable
    arp timeout 14400
    no arp permit-nonconnected
    object network obj_any
    nat (Internal,External) dynamic interface
    object network LAN-10-0-1-x
    nat (Internal,External) dynamic interface
    object network HYPER-V-DUAL-IP
    nat (Internal,External) static interface service tcp 3389 3389
    access-group 100 in interface External
    timeout xlate 3:00:00
    timeout pat-xlate 0:00:30
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server radius protocol radius
    aaa-server radius (Internal) host 10.0.1.11
    key *****
    radius-common-pw *****
    user-identity default-domain LOCAL
    aaa authentication ssh console radius LOCAL
    http server enable
    http LAN-10-0-1-x 255.255.255.0 Internal
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    crypto ipsec ikev2 ipsec-proposal DES
    protocol esp encryption des
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal 3DES
    protocol esp encryption 3des
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES
    protocol esp encryption aes
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES192
    protocol esp encryption aes-192
    protocol esp integrity sha-1 md5
    crypto ipsec ikev2 ipsec-proposal AES256
    protocol esp encryption aes-256
    protocol esp integrity sha-1 md5
    crypto ipsec security-association pmtu-aging infinite
    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
    crypto map External_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
    crypto map External_map interface External
    crypto ca trustpoint srv01_trustpoint
    enrollment terminal
    crl configure
    crypto ca trustpoint asa_cert_trustpoint
    keypair asa_cert_trustpoint
    crl configure
    crypto ca trustpoint LOCAL-CA-SERVER
    keypair LOCAL-CA-SERVER
    crl configure
    crypto ca trustpool policy
    crypto ca server
    cdp-url http://.../+CSCOCA+/asa_ca.crl:44435
    issuer-name CN=...
    database path disk0:/LOCAL_CA_SERVER/
    smtp from-address ...
    publish-crl External 44436
    crypto ca certificate chain srv01_trustpoint
    certificate <output omitted>
      quit
    crypto ca certificate chain asa_cert_trustpoint
    certificate <output omitted>
      quit
    crypto ca certificate chain LOCAL-CA-SERVER
    certificate <output omitted>
      quit
    crypto ikev2 policy 1
    encryption aes-256
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 10
    encryption aes-192
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 20
    encryption aes
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 30
    encryption 3des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 policy 40
    encryption des
    integrity sha
    group 5 2
    prf sha
    lifetime seconds 86400
    crypto ikev2 enable External client-services port 44455
    crypto ikev2 remote-access trustpoint asa_cert_trustpoint
    telnet timeout 5
    ssh LAN-10-0-1-x 255.255.255.0 Internal
    ssh xxx.xxx.xxx.xxx 255.255.255.255 External
    ssh xxx.xxx.xxx.xxx 255.255.255.255 External
    ssh timeout 5
    ssh version 2
    console timeout 0
    no vpn-addr-assign aaa
    no ipv6-vpn-addr-assign aaa
    no ipv6-vpn-addr-assign local
    dhcpd dns 75.153.176.9 75.153.176.1
    dhcpd domain ingo.local
    dhcpd option 3 ip 10.0.1.254
    dhcpd address 10.0.1.50-10.0.1.81 Internal
    dhcpd enable Internal
    threat-detection basic-threat
    threat-detection scanning-threat shun except ip-address LAN-10-0-1-x 255.255.255.0
    threat-detection statistics access-list
    threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
    dynamic-filter use-database
    dynamic-filter enable interface Internal
    dynamic-filter enable interface External
    dynamic-filter drop blacklist interface Internal
    dynamic-filter drop blacklist interface External
    ntp server 128.233.3.101 source External
    ntp server 128.233.3.100 source External prefer
    ntp server 204.152.184.72 source External
    ntp server 192.6.38.127 source External
    ssl encryption aes256-sha1 aes128-sha1 3des-sha1
    ssl trust-point asa_cert_trustpoint External
    webvpn
    port 44433
    enable External
    dtls port 44433
    anyconnect image disk0:/anyconnect-win-3.1.02026-k9.pkg 1
    anyconnect profiles profile1 disk0:/profile1.xml
    anyconnect enable
    smart-tunnel list SmartTunnelList1 mstsc mstsc.exe platform windows
    smart-tunnel list SmartTunnelList1 putty putty.exe platform windows
    group-policy DfltGrpPolicy attributes
    vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless
    webvpn
      anyconnect profiles value profile1 type user
    username write.ingo password ... encrypted
    username ingo password ... encrypted privilege 15
    username tom.tucker password ... encrypted
    class-map TCP
    match port tcp range 1 65535
    class-map type regex match-any BlockFacebook
    match regex BlockFacebook
    class-map type inspect http match-all BlockDomains
    match request header host regex class BlockFacebook
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns preset_dns_map
    parameters
      message-length maximum client auto
      message-length maximum 1500
      id-randomization
    policy-map TCP
    class TCP
      set connection conn-max 1000 embryonic-conn-max 1000 per-client-max 250 per-client-embryonic-max 250
      set connection timeout dcd
      set connection advanced-options Normalizer
      set connection decrement-ttl
    policy-map type inspect http HTTP
    parameters
      protocol-violation action drop-connection log
    class BlockDomains
    policy-map global_policy
    class inspection_default
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny 
      inspect sunrpc
      inspect xdmcp
      inspect sip 
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect dns preset_dns_map dynamic-filter-snoop
      inspect http HTTP
    service-policy global_policy global
    service-policy TCP interface External
    smtp-server 199.185.220.249
    privilege cmd level 3 mode exec command perfmon
    privilege cmd level 3 mode exec command ping
    privilege cmd level 3 mode exec command who
    privilege cmd level 3 mode exec command logging
    privilege cmd level 3 mode exec command failover
    privilege cmd level 3 mode exec command vpn-sessiondb
    privilege cmd level 3 mode exec command packet-tracer
    privilege show level 5 mode exec command import
    privilege show level 5 mode exec command running-config
    privilege show level 3 mode exec command reload
    privilege show level 3 mode exec command mode
    privilege show level 3 mode exec command firewall
    privilege show level 3 mode exec command asp
    privilege show level 3 mode exec command cpu
    privilege show level 3 mode exec command interface
    privilege show level 3 mode exec command clock
    privilege show level 3 mode exec command dns-hosts
    privilege show level 3 mode exec command access-list
    privilege show level 3 mode exec command logging
    privilege show level 3 mode exec command vlan
    privilege show level 3 mode exec command ip
    privilege show level 3 mode exec command failover
    privilege show level 3 mode exec command asdm
    privilege show level 3 mode exec command arp
    privilege show level 3 mode exec command ipv6
    privilege show level 3 mode exec command route
    privilege show level 3 mode exec command ospf
    privilege show level 3 mode exec command aaa-server
    privilege show level 3 mode exec command aaa
    privilege show level 3 mode exec command eigrp
    privilege show level 3 mode exec command crypto
    privilege show level 3 mode exec command ssh
    privilege show level 3 mode exec command vpn-sessiondb
    privilege show level 3 mode exec command vpnclient
    privilege show level 3 mode exec command vpn
    privilege show level 3 mode exec command dhcpd
    privilege show level 3 mode exec command blocks
    privilege show level 3 mode exec command wccp
    privilege show level 3 mode exec command dynamic-filter
    privilege show level 3 mode exec command webvpn
    privilege show level 3 mode exec command service-policy
    privilege show level 3 mode exec command module
    privilege show level 3 mode exec command uauth
    privilege show level 3 mode exec command compression
    privilege show level 3 mode configure command interface
    privilege show level 3 mode configure command clock
    privilege show level 3 mode configure command access-list
    privilege show level 3 mode configure command logging
    privilege show level 3 mode configure command ip
    privilege show level 3 mode configure command failover
    privilege show level 5 mode configure command asdm
    privilege show level 3 mode configure command arp
    privilege show level 3 mode configure command route
    privilege show level 3 mode configure command aaa-server
    privilege show level 3 mode configure command aaa
    privilege show level 3 mode configure command crypto
    privilege show level 3 mode configure command ssh
    privilege show level 3 mode configure command dhcpd
    privilege show level 5 mode configure command privilege
    privilege clear level 3 mode exec command dns-hosts
    privilege clear level 3 mode exec command logging
    privilege clear level 3 mode exec command arp
    privilege clear level 3 mode exec command aaa-server
    privilege clear level 3 mode exec command crypto
    privilege clear level 3 mode exec command dynamic-filter
    privilege cmd level 3 mode configure command failover
    privilege clear level 3 mode configure command logging
    privilege clear level 3 mode configure command arp
    privilege clear level 3 mode configure command crypto
    privilege clear level 3 mode configure command aaa-server
    prompt hostname context
    no call-home reporting anonymous
    call-home
    profile CiscoTAC-1
      no active
      destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    Cryptochecksum:41a021a28f73c647a2f550ba932bed1a
    : end
    Many thanks,
    Ingo

    Hi Jose,
    here is what I got now:
    ASA(config)# sh run | begin tunnel-group
    tunnel-group DefaultWEBVPNGroup general-attributes
    address-pool VPNPool
    authorization-required
    and DAP debugging still the same:
    ASA(config)# DAP_TRACE: DAP_open: CDC45080
    DAP_TRACE: Username: tom.tucker, aaa.cisco.grouppolicy = DfltGrpPolicy
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username = tom.tucker
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username1 = tom.tucker
    DAP_TRACE: Username: tom.tucker, aaa.cisco.username2 =
    DAP_TRACE: Username: tom.tucker, aaa.cisco.tunnelgroup = DefaultWEBVPNGroup
    DAP_TRACE: Username: tom.tucker, DAP_add_SCEP: scep required = [FALSE]
    DAP_TRACE: Username: tom.tucker, DAP_add_AC:
    endpoint.anyconnect.clientversion="3.1.02026";
    endpoint.anyconnect.platform="win";
    DAP_TRACE: Username: tom.tucker, dap_aggregate_attr: rec_count = 1
    DAP_TRACE: Username: tom.tucker, Selected DAPs: DfltAccessPolicy
    DAP_TRACE: Username: tom.tucker, DAP_close: CDC45080
    Unfortunately, it still doesn't work. Hmmm.. maybe a wipe of the config and starting from scratch can help?
    Thanks,
    Ingo

  • Changing or deleting the user name administrator folder in Mac OS X system preferences

    Hello!
    Does changing or deleting the user name administrator folder in Mac OS X system preferences affects my Creative Cloud license?
    [personal information removed... Mod - https://forums.adobe.com/docs/DOC-3731]
    [This is an open forum, not Adobe support, please do not post personal information]
    [If you are posting using email, please turn your 'sig file' function OFF for posting]

    Moving this discussion to the Creative Cloud Download & Install forum.
    Rodrigolima74 at minimum it is likely you will need to sign back in after changing the name.  I have not personally tested the behavior so please feel free to update this discussion after you have made the change.

  • My mom is the administrator of my Mac os x and we want to make her a standard account... How do I do that?

    My mom is the administrator of my Mac os x and we want to make her a standard account... How do I do that?

    If her account is the only admin one, the OS shouldn't allow it. If it did no-one would be able to install anything or authenticate when required.
    If she just wants a standard account for normal day-to-day use, she needs to create a new admin account, then downgrade the original one to Standard.
    Of course, if you're just trying to bypass parental controls… well you need her permission to do it!

  • Accessing user's local Time Machine backup on client Mac?

    I'm trying to configure a file server with backup for local Macs.
    I've set up file sharing, users and groups in Server.app and it works as intended – after logging to the server, users see their home folders and other shared folders where they store their files.
    The idea is to use Time Machine backups on the server Mac. I've enabled it on the server and used a separate hard drive. It works well, and I can enter the Time machine from the server.
    Now, is it possible for users on client Macs connected to and working on the server volume to access Time Machine backups of their files?
    Thanks!

    Yes, I'm using OS X Mavericks Server. There's a shared volume "Design Work" where clients keep their files. It's backed up to a separate volume "Backup" via Time Machine. What I would like to do is to let clients access Time Machine backup of their files (stored on "Design Work" volume on the server) without the need to physically go to the server computer. Is that at all possible?
    I've tried to follow this instruction but it doesn't seem to work. I can select the shared TM backup from a client via "browse other backup disks" option but I can't see the files on "Design Work" share, just local files.

  • How do I convert a standard user to an administrator if i have no other admins on the computer, re-bootimg NOT an option,  please help!!!!!!

    how do I convert a standard user to an administrator if i have no other admins on the computer, re-bootimg NOT an option,  please help!!!!!! 

    Please take these steps to restore administrator privileges to your account. This somewhat tedious procedure is only necessary if you've confirmed that no adminstrator account exists on the system.
    If you don't already have a current backup of all your data, you must back up before taking any of the steps below. Ask if you need guidance. You won't need the backup unless something goes wrong—which is always a possibility.
    Step 1
    Start up in Recovery mode. The OS X Utilities screen will appear.
    Step 2
    Take this step only if you use FileVault 2. Launch Disk Utility, then select the icon of the FileVault startup volume ("Macintosh HD," unless you gave it a different name.) It will be nested below another icon with the same name. Click the  Unlock button in the toolbar and enter your login password when prompted. Then quit Disk Utility to be returned to the main screen.
    Step 3
    Select
    Utilities ▹ Terminal
    from the menu bar. In the window that opens, type this:
    res
    Press the tab key. The partial command you typed will automatically be completed to this:
    resetpassword
    Press return. A Reset Password window opens. Select your startup volume if not already selected. Pull down the menu labeled
    Select the user account
    and select
    System Administrator (root)
    Follow the prompts to set a password. It's safest to choose a password that includes only the characters a-z, A-Z, and 0-9. I suggest you write down the password. If you don't write it down and forget it, you'll have to start over from Step 1.
    Select
     ▹ Restart
    from the menu bar.
    Step 4
    This step, like Step 2, applies only if you use FileVault. Log in as usual, then select
     ▹ Log Out...
    from the menu bar, or press the key combination shift-command-Q. Don't restart. You'll be returned to the login screen.
    Step 5
    At the login screen, click Other... Enter "root" (without the quotes) in the Name field, and enter the password you set in Step 3 in the Password field. You should now be logged in as root. This is a potentially dangerous condition. Do nothing while logged in as root except as indicated below. You'll be fine as long as you don't deviate from the plan.
    Open the Users & Groups preference pane. Select your usual administrator account in the list of users and check the box marked
    Allow user to administer this computer
    You'll be prompted to restart. Do that and log in as yourself—not as root. Your administrator status should now be restored.
    Step 6 (optional, but recommended)
    Follow the instructions in this support article under the heading "Disable the root user." You must authenticate in Directory Utility as "root" with the password you set in Step 3. Authenticating as another administrator won't work.
    Credit for this idea to ASC member wessongroup.

  • User Groups Missing - Administrative Privileges are Inaccessable

    I really can't figure this one out - somehow all of the system's user groups have somehow been removed from my mac therefore disabling any administrative privileges, other than the root user. Even when logging in as root and selecting my user as an administrator, it doesn't recognize the privileges and I remain a 'Standard' user.
    I've even tried removing the setup file (/var/db/.applesetupdone) in hopes that completing the initial setup with a NEW user again would allow an admin and reset the groups. This proved pointless as even the newly created user is merely a 'Standard' user and still cannot be activated as an admin from root.
    I've already run just about every self-repair function that I have, and none of them see a problem. If anyone has a method to fix this without reinstalling leopard, please let me know - I can reinstall leopard if need be, but I would really rather just fix the problem.

    did it really happen to all groups? then perhaps a reinstall is in order. if it only happened to the admin group you can fix its directory services entry as described here
    http://discussions.apple.com/thread.jspa?messageID=10043721&#10043721
    credit to biovizier for that method.

  • Same  Desktop Wallpaper Between Client Macs

    Hi,
    I am wondering if there is a way I can keep my desktop paper in sync acrosss the client macs. I know I could have a standard desktop paper set that if a user changed it would reset back next time they log in, but this is not what I am looking for. Any ideas? Can I sync some type of plist file that would enable me to have the same desktop paper across all macs? Thanks for your help!
    Also is there a way to sync safari bookmarks?

    Have you tried looking at the server logs, particularly the 'System' & 'Open Directory' log sets?
    Anything seen in there?
    Also logs on the client machines using the Console app. It's a bit tedious going though logs but they can be very illuminating.

  • How to add first log on user to local administrator group

    Hi All,
    When first time user log in to system, i need to add that particular user to local administrator group?
    How to achieve it using vbscript?
    Thanks
    Divakar

    It is also now against federal law in the US, Canada and, I believe, the UK. 
    In the US HIPAA and the federal network security act (???) and Sarbanes-Oxley all prohibit users running as Admins.   This may not specifically affect your
    installation but it does show how important this is.
    There is NEVER a good reason to make a user an administrator.  It is only lack of technical know how that leads to this scenario.  Any vendor product that
    requires this is not a safe product to use in a corporate network.  Malware specifically looks for this as an attack vector.
    I spent three years arguing with Inuit to get there software to work.  Every time they said you have to run as an admin I told them it would never be.  We
    were always able to find a way.  Now QuickBooks installs as a standard user with no issues.
    It can be done.
    ¯\_(ツ)_/¯
    It is also now against federal law in the US, Canada and, I believe, the UK. 
    In the US HIPAA and the federal network security act (???) and Sarbanes-Oxley all prohibit users running as Admins.   This may not specifically affect your
    installation but it does show how important this is.
    There is NEVER a good reason to make a user an administrator.  It is only lack of technical know how that leads to this scenario.  Any vendor product that
    requires this is not a safe product to use in a corporate network.  Malware specifically looks for this as an attack vector.
    I spent three years arguing with Inuit to get there software to work.  Every time they said you have to run as an admin I told them it would never be.  We
    were always able to find a way.  Now QuickBooks installs as a standard user with no issues.
    It can be done.
    ¯\_(ツ)_/¯

  • How to setup Wireless Clients MAC+Active Directory based acess

    Dear Gents,
    I want to setup Wireless Clients MAC+Active Directory based acess on AP 1242 standalone Wireless series .
    Steps i have configured :
    1) SSID manger  under Open authentication : Selected with EAP.
    2) under advacned Radius : s
    MAC Address  Authentication
    MAC Addresses Authenticated by:
    Authentication Server Only
    3) Server Manger : Current server list
    added the radius ip address 10.1.200.x
    EAP  Authentication
    MAC  Authentication
    Accounting
    Priority  1:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  1: < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  1: < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  2:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  2:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  2:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  3:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  3:  < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    Priority  3: < NONE >10.113.253.1010.1.200.23410.8.200.1510.15.200.15
    From ACS - Radius  we have choose a Group x( named as Mac-address group )
    All the wireless Client ( laptops ) mac-address are added as add username option and enter username
    as mac-address & enter the mac-address as pwd second option of password TAB.

    Hi Akber,
    I think you didnt understood what i was trying to say here :-( No problem..I will explain my theory again.Your requirment is to autheticate user from ACS internal database (you have already added the MAC address as the username on your ACS internal database) as well as from ACS external database (in your case this is AD).
    What i was saying is when when authetication request comes to raidus server it checks its internal database and if it find a valid username and password (here it will the MAC address and password which you have entered to the ACS database) the ACS will not query the external database (in your case the AD) for authetication.
    You can not have ACS to look in to both MAC and AD database at the same time.
    Hope this clears your doubt.
    Regards
    Najaf

  • OS X Server 4 - Time Machine Restore of client Mac

    Can anyone confirm that a client Mac when booted into its Recovery HD is able to perform a full system Restore over the network from a Time Machine back up on OS X Server 4 (Yosemite)? Are the user's login credentials accepted and a list of back ups with dates presented to choose from?
    OS X Server 2.2.5 (Mountain Lion) works fine, but OS X Server 3.2.2 (Mavericks) has always given me fits where the client Mac's login credentials would result in the following error.
    "There was a problem connecting to the server "sever.local. The server may not exist or it is unavailable at this time. Check the server name or IP address, check your network connection, and then try again"
    I was told by Apple Support back on 7/16/2014 Engineering was aware of the issue, but had no ETA for a solution. At the time I was running OS X Server 3.1 but each and every update since then including the most current Mavericks version (3.2.2) has had the above issue. I'm just wondering if Apple fixed it in OS X Server 4.x.x.

    Launch the Console application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Console in the icon grid.
    Make sure the title of the Console window is All Messages. If it isn't, select All Messages from the SYSTEM LOG QUERIES menu on the left. If you don't see that menu, select
    View ▹ Show Log List
    from the menu bar.
    Click the Clear Display icon in the toolbar. Then try the action that you're having trouble with again. Select any messages that appear in the Console window. Copy them to the Clipboard by pressing the key combination command-C. Paste into a reply to this message by pressing command-V.
    When posting a log extract, be selective. In most cases, a few dozen lines are more than enough.
    Please do not indiscriminately dump thousands of lines from the log into this discussion.
    Important: Some private information, such as your name, may appear in the log. Anonymize before posting.

  • Indesign standard version installation error for Mac OS: "installer failed to initialize.

    Indesign standard version installation error for Mac OS: "installer failed to initialize. Please download Adobe Support Advisor to detect problem". Transferred by application over to new laptop, application considered damaged, with instructions to reinstall. Attempting from downloaded file.

    go to HD>library>application support>adobe>caps and rename the caps folder.
    go to USER library>application support>adobe>OOBE and rename OOBE folder
    install Adobe application manager from below link.
    http://www.adobe.com/support/downloads/detail.jsp?ftpID=4774

  • Airport network + 1 admin account + 1 standard account on the same Mac

    Hello,
    I have not succeeded yet in finding in this forum any answer to my problem but I guess this is a quite familiar one and may be some of you could help.
    My configuration:
    1) one Imac G5 Power PC (OS 10.4.6) + 1 Airport Express base station with firmware 6.3 (mostly to play Itunes on distant loudspeakers and, sometimes, for Ethernet connection).
    2) one domestic Airport network protected with a WAP key.
    3) 1 admin user account + 1 standard user account, both on the same Mac.
    My concern:
    1) When I am connected to to the admin account, my Airport network starts automatically (especially, thanks to the configuration settings "automatically connect to to the last network used" (or smthg like that) => so far, so good.
    2) When I try to connect to the standard account (even when the admin one is already started), I always receive a window for authentification requiring an admin name and password for Airport (com.apple.airport.allow.network.cha): at this time the Airport icon in the menu bar is gray (no signal nor no activity?) and, in the list of the possible networks, my own one is not marked (meaning "not started"). Of course, as soon as I key in the correct data in the authentification window, the AE network starts for the standard account session => this behavior concerns me since the interest of a standard account is to have it running without the support of the admin user.
    3) Last but not least and very strange behavior: when I am at step 2) (connection to the standard account), if I do not fill immediately the authentification form and go back to the admin account, when coming back again to the standard one, the authentification window has disappeared and the AE network is already running => magic but not comfortable in a normal way of doing.
    Is this a problem of configuration of the AE network or configuration of the user accounts or a keychain problem? I have investigated in all areas for a while but without success at this time. Hope some of you will be able to help.
    Sincerely
    Christophe

    Hello again,
    I have not received yet any answer to my initial post (see above) but, unfortunately, the troubles described keep going. I noticed that, some of you, seem to be very familiar with Airport troubleshooting. May be, some of you will be able to help.
    In addition to my initial description here is the content of the authentification window and, especially, the system element which requires an admin password for the standard account. May be it could help for a better understanding of the problem and a better investigation:
    " Authorization : com.apple.airport.allow.network.cha
    Tool : airport (complete path = Imac G5 de myname / System / Library / PrivateFrameworks / Apple80211.framework / Resources / airport "
    Looking forward to hearing from you.
    Christophe
    Imac (2GHz PowerPC G5)   Mac OS X (10.4.7)   Airport Express station (firmware 6.3)
    Imac G5 (2GHz PowerPC G5)   Mac OS X (10.4.6)  

  • Help giving some users standard connections, other users secure

    We've setup firewall forwarding and security, and everything works well over port 443.
    Need to also give some users standard connections, however.
    Have ready the manual front to back, but can't get this to work. Have done this:
    -Followed instructions for setting up SGD security services and firewall forwarding. As stated, it works fine if everyone is over a secure connection
    -Have ports 3144, 5307, 80, and 443 open
    -want to have some users connect over standard connection.
    Every time, I get to the login screen, but after entering credentials, it times out and says "No response from the Secure Global Desktop Client"
    Can someone please point to where in the manual it explains how to make some people connect with secure connections and some connect with standard connections? We really need a 'how to' as I find I'm chasing down disparate parts of the manual to try to figure this out and am getting pretty lost.
    Thank you

    Hi,
    You can do that, but it needs to open more ports, In the Array Manager Secure connections should be to 443 and standard connections should be to 3144.
    So from that starting poing, the users connecting in secure mode will use only 443.
    Users connecting in standard mode will use 443 for the first AIP connection before the login process, after the users loggs in, the AIP connection will be changed to port 3144.
    Believe me, I see that working from version 3.xx, and I tested it too in 4.30.
    So as the previous folk says you can not use only 443 for standard and secure connections.
    I hope that helps,

  • How do assign mutiple client Macs my new Printer List? What do I copy over?

    The only thing that changed is our IP addresses. We moved. Same Printers & Same Macs, just new IP addresses. I want ARD to delete every clients printer list and apply my new Printer List that I created on my Admin ARD Mac. All my printers were 'Printer Browser' created under the IP Printer tab, using protocol LPD. I really don't want to login to each client Mac and do each one individually. What do I copy from local to my 46 clients?? Desparate :-P
    G5 Quad 2.5   Mac OS X (10.4.10)   ARD v2.2

    There is a document that talks about how you can configure printers with Apple Remote Desktop. It is based on older versions of Apple Remote Desktop, but the concepts, I'm told (I've not done this) still hold true:
    How to Setup 300 Printers in Just Under 3 Minutes
    http://www.acc.southernct.edu/files/SetPrintersInMacOSX.pdf

Maybe you are looking for