User Objects

Because servers are all configured somewhat differently, it’s most useful to apply the Sesame Street principle to user-oriented objects that live on your network. By convention, user objects (user logins, profiles, associated security rights, and the user’s workstation itself) are typically configured at least somewhat the same—if for no other reason than your vendor or internal systems administrator found it easier to roll them out this way.

In its simplest form, finding out what’s different is pretty easy: You know that the group of users has been working reasonably well for a while. Let’s say that one user reports that she can’t use a particular application; because others are working using their workstations and their logins, ...

Get Sams Teach Yourself Network Troubleshooting in 24 Hours, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.