Netwrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide

Total Page:16

File Type:pdf, Size:1020Kb

Netwrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide NetWrix Active Directory Change Reporter Version 6 Freeware and Standard Editions Quick Start Guide _______________________ NetWrix Active Directory Change Reporter User Guide Contents 1. INTRODUCTION ........................................................................................................................................................ 3 1.1 KEY FEATURES .................................................................................................................................................................... 3 1.2 LICENSING .......................................................................................................................................................................... 4 1.3 HOW IT WORKS .................................................................................................................................................................. 5 2. GETTING STARTED .................................................................................................................................................... 7 2.1 SYSTEM REQUIREMENTS ....................................................................................................................................................... 7 2.2 CONFIGURING ACTIVE DIRECTORY CHANGES AUDITING USING AUDIT CONFIGURATION WIZARD ........................................................ 9 2.3 INSTALLATION ................................................................................................................................................................... 10 3. WORKING WITH STANDARD OR FREEWARE EDITIONS ............................................................................................ 11 3.1 CONFIGURATION ............................................................................................................................................................... 11 3.2 DATA COLLECTION AND REPORTING ...................................................................................................................................... 14 3.3 MANUALLY CONFIGURE THE AUDITING SETTINGS .................................................................................................................... 15 3.3.1 Audit Object Security Settings ........................................................................................................................ 15 3.3.2 Audit "Who/When" Information for AD Object Modifications ....................................................................... 15 3.3.3 Audit Active Directory Access ......................................................................................................................... 15 3.3.4 Audit Changes to Configuration and Schema Containers ............................................................................... 16 4. FUTURE STEPS ........................................................................................................................................................ 19 5. ABOUT NETWRIX PRODUCTS .................................................................................................................................. 20 6. ADDITIONAL SOFTWARE LINKS ............................................................................................................................... 21 7. CONTACTING NETWRIX .......................................................................................................................................... 22 8. DISCLAIMER ........................................................................................................................................................... 22 _______________________________________ ___ NetWrix Active Directory Change Reporter Administrator’s Guide 1. Introduction Active Directory change auditing is an important procedure for limiting unauthorized changes and errors to Active Directory configuration. One single change can put your organization at risk, introducing security breaches and compliance issues. Built-in Active Directory auditing lacks many important features (for example, it does not provide you the before and after values for changed properties) and does not have reporting capabilities. Careful analysis of multi-megabyte Security logs can take enormous resources and still never paint the whole picture. NetWrix Active Directory Change Reporter is a tool that reports the changes made to Active Directory and delivers reports, containing summary and detailed information on a daily basis. These reports include the 4 W — Who, What, When, and Where for all changes, plus before and after values for each of the settings, and also changes made to Active Directory configuration, schema, and other Active Directory objects. You can use these reports to: • Monitor day-to-day administrative activities. • Prepare compliance reports for your SOX, GLBA and HIPAA auditors. NetWrix Active Directory Change Reporter records all modifications, including both user and administrative activity, and e-mails daily reports to Active Directory administrators detailing every Active Directory change. Collected audit data is archived and can be stored for years, so you can build a summary of changes made to Active Directory during any period and drill down to detailed information as necessary. This archiving function allows organizations to analyze any policy violations, adhere to security best practices and maintain established internal policies. (*) The Standard and Enterprise Editions are available. The Enterprise Edition includes advanced features, such as ‘Who’ and ‘When’ fields, long term change archiving, schema change detection, and comes with technical support and NetWrix Enterprise Management Console. 1.1 Key Features NetWrix Active Directory Change Reporter helps you to carry out the following auditing and reporting tasks: • Detect and report on changes made to Active Directory objects, Group Policies, Exchange Servers. Reports include information about what changes were made, who (*) made the changes and when (*) were they made. • Report on previous and current values for every change. • Generate on-demand Web-based reports. (*) • Create custom reports (can also be ordered from NetWrix). (*) • Store collected audit data and enable historical reporting for any period of time. (*) * - Only available in the Standard and Enterprise Editions of the product. 3 _______________________________________ ___ NetWrix Active Directory Change Reporter Administrator’s Guide 1.2 Licensing Active Directory Change Reporter comes in three Editions: Freeware, Standard and Enterprise. The table below outlines the differences between them. Feature Freeware Standard Enterprise Edition Who and When fields for every change No Yes Yes Advanced reports based on SQL Reporting Services, with filtering, No Detailed Detailed grouping and sorting Yes. Create manually or order Yes. Create manually or order from Custom reports No from NetWrix NetWrix Enterprise-class scalability No No Full Long-term archiving and reporting No Any period of time Any period of time Technical support Support forum Phone, e-mail, Support forum Phone, e-mail, Support forum Licensing Free of charge Per user Per user; please request a quote a single installation handles numerous managed No No Yes objects(domains, multiple domains) integrated interface for all NetWrix products which provides No No Yes centralized configuration and settings management integrated advanced reporting with lots of predefined out-of-the- No Yes Yes box reports for all the major platforms The Free Edition can be used by companies and individuals for an unlimited time, at no charge. The Standard and Enterprise Editions can be evaluated free of charge for 20 days. Please note that different parts of the Active Directory Change Reporter: Active Directory Change Reporter, Group Policy Change Reporter and Exchange Change Reporter have to be bought separately. 4 _______________________________________ ___ NetWrix Active Directory Change Reporter Administrator’s Guide 1.3 How It Works Figure 1: Product Architecture and data flow 5 _______________________________________ ___ NetWrix Active Directory Change Reporter Administrator’s Guide The NetWrix Active Directory Change Reporter data collection and reporting workflow is usually as follows: 1. A user launches the configuration utility and sets the parameters for the automated data collection and reporting, choosing whether to report on: • Active Directory changes - Users configuration changes - Changes to Active Directory groups - Active Directory Configuration and Schema changes - Domain structure changes - Changes to OUs - Additions to OUs - Additions to domains - Domains object properties changes • Group Policy changes - Group Policy Objects changes - Group Policy Objects creation - Group Policy Objects removal • Exchange Servers changes - Security policy violations - Exchange objects and permissions changes - Unauthorized and unplanned changes 2. A dedicated scheduled task which is launched periodically (every night, at 3 AM by default; it can also be launched manually when needed) collects Active Directory and/or Group Policy and/or Exchange snapshots and/or audit data, and e-mails the change reports to the specified recipients. The task name is NetWrix Management Console – Active Directory Change Reporter - <your domain name> where <your domain name> is the actual name of your managed domain. 3. If SSRS-based reporting is enabled and configured, the task will also store information about the Active
Recommended publications
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • What Is Active Directory
    What is Active Directory Originally created in the year 1996, Active Directory, also referred as an AD, was first used with Windows 2000 Server as a directory service for Windows domain networks. Active Directory is a special purpose database, which serves as a central location for authenticating and authorizing all the users and computers within a network. Active Directory uses the Lightweight Directory Access Protocol (LDAP), an application protocol used for accessing and maintaining directory information services distributed over an IP network. What is Active Directory? The basic internal structure of the Active Directory consists of a hierarchical arrangement of Objects which can be categorized broadly into resources and security principles. Some of the examples of Active Directory objects are users, computers, groups, sites, services, printers, etc. Every Object is considered as a single entity with some specific set of attributes. The attributes of Objects along with the kind of objects that can be stored in the AD are defined by a Schema. The intrinsic framework of Active Directory is divided into a number of levels on the basis of visibility of objects. An AD network can be organized in four types of container structure namely, Forest, Domains, Organizational Units and Sites. y Forests: It is a collection of AD objects, their attributes and set of attribute syntax. y Domain: Domain is a collection of computers objects in the AD which share a common set of policies, a name and a database of their members. y Organizational Units: OUs are containers in which domains are grouped. They are used to create a hierarchy for the domain to resemble the structure of the Active Directory's company in organizational terms.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide i Cygwin User’s Guide Cygwin User’s Guide ii Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 Red Hat, Inc. Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .5 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select .
    [Show full text]
  • Netiq Securelogin Installation Guide 9 Installing, Configuring, and Deploying Desktop Automation Services 67 9.1 Installing Desktop Automation Services
    Installation Guide SecureLogin 8.0 October, 2013 www.netiq.com/documentation Legal Notice NetIQ Product Name is protected by United States Patent No(s): nnnnnnnn, nnnnnnnn, nnnnnnnn. THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOT ALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOT APPLY TO YOU. For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditions of the End User License Agreement for the applicable version of the NetIQ product or software to which it relates or interoperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree to the terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy all copies of the Module and contact NetIQ for further instructions. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of NetIQ Corporation.
    [Show full text]
  • Windows Tool Reference
    AppendixChapter A1 Windows Tool Reference Windows Management Tools This appendix lists sets of Windows management, maintenance, configuration, and monitor- ing tools that you may not be familiar with. Some are not automatically installed by Windows Setup but instead are hidden away in obscure folders on your Windows Setup DVD or CD- ROM. Others must be downloaded or purchased from Microsoft. They can be a great help in using, updating, and managing Windows. We’ll discuss the following tool kits: ■ Standard Tools—Our pick of handy programs installed by Windows Setup that we think are unappreciated and not well-enough known. ■ Support Tools—A set of useful command-line and GUI programs that can be installed from your Windows Setup DVD or CD-ROM. ■ Value-Added Tools—Several more sets of utilities hidden away on the Windows Setup CD-ROM. ■ Windows Ultimate Extras and PowerToys for XP—Accessories that can be downloaded for free from microsoft.com. The PowerToys include TweakUI, a program that lets you make adjustments to more Windows settings than you knew existed. ■ Resource Kits—A set of books published by Microsoft for some versions of Windows that includes a CD-ROM containing hundreds of utility programs. What you may not have known is that in some cases you can download the Resource Kit program toolkits with- out purchasing the books. ■ Subsystem for UNIX-Based Applications (SUA)—A package of network services and command-line tools that provide a nearly complete UNIX environment. It can be installed only on Windows Vista Ultimate and Enterprise, and Windows Server 2003.
    [Show full text]
  • Rsview SE V4.0 CPR7+ Distributed System Design Considerations (Rev
    RSView SE V4.0 CPR7+ Distributed System Design Considerations (Rev. 4, Sep. 2007) This page left intentionally blank. RSView SE V4.0 (CPR7+) Distributed System Design Considerations Rev. 4, September, 2007, page 2 of 46 Table of Contents Introduction............................................................................................................................................................7 Prerequisite reading before application development........................................................................................7 Revision History ....................................................................................................................................................7 RSView SE Component Terminology...................................................................................................................8 FactoryTalk Directory™....................................................................................................................................8 RSView Studio ..................................................................................................................................................8 RSView SE Server.............................................................................................................................................8 Data Server.........................................................................................................................................................8 RSView SE Client..............................................................................................................................................8
    [Show full text]
  • Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If You Need Technical Assistance, You Can Contact Customercare
    Notices Carbonite Availability for Windows User's Guide Version 8.2.1, Wednesday, October 17, 2018 If you need technical assistance, you can contact CustomerCare. All basic configurations outlined in the online documentation will be supported through CustomerCare. Assistance and support for advanced configurations may be referred to a Pre-Sales Systems Engineer or to Professional Services. Man pages are installed and available on Carbonite Availability and Carbonite Migrate Linux servers. These documents are bound by the same Carbonite license agreement as the software installation. This documentation is subject to the following: (1) Change without notice; (2) Furnished pursuant to a license agreement; (3) Proprietary to the respective owner; (4) Not to be copied or reproduced unless authorized pursuant to the license agreement; (5) Provided without any expressed or implied warranties, (6) Does not entitle Licensee, End User or any other party to the source code or source code documentation of anything within the documentation or otherwise provided that is proprietary to Carbonite, Inc.; and (7) All Open Source and Third-Party Components (“OSTPC”) are provided “AS IS” pursuant to that OSTPC’s license agreement and disclaimers of warranties and liability. Carbonite, Inc. and/or its affiliates and subsidiaries in the United States and/or other countries own/hold rights to certain trademarks, registered trademarks, and logos. Hyper-V and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds. vSphere is a registered trademark of VMware. All other trademarks are the property of their respective companies.
    [Show full text]
  • Windows Server 2008 Network Infrastructure, Configuring
    Microsoft TS 70-642 Network Infrastructure 2008 2013-01-02 Number : 70-642 Passing Score : 700 Time Limit : 180 min File Version : 1.1 http://www.gratisexam.com/ EXAM:70-642 TS: Windows Server 2008 Network Infrastructure, Configuring CHANGE LOG: Removed all duplicated question (even if is very similar) Added a few new questions Added many technet links and explanations PS: plz comment at ==> www.examcollection.com/70-642.html It's important to learn the question! Don’t just memorize the answers!! ;) GOOD LUCK Sections 1. Exam A 2. Exam B 3. Exam C 4. Exam D 5. Exam E 6. Exam F 7. Exam G 8. Exam H 9. Exam I 10.Exam J 11.Exam K 12.Exam L 13.Exam M 14.Exam N Exam A QUESTION 1 Your network contains 100 servers that run Windows Server 2008 R2. A server named Server1 is deployed on the network. Server1 will be used to collect events from the Security event logs of the other servers on the network. You need to define the Custom Event Delivery Optimization settings on Server1. Which tool should you use? A. Event Viewer B. Task Scheduler C. Wecutil D. Wevtutil Correct Answer: C Section: Exam A Explanation Explanation/Reference: Explanation: Wecutil.exe is a Windows Event Collector utility that enables an administrator to create and manage subscriptions to events forwarded from remote event sources that support the WS-Management protocol. QUESTION 2 Your network contains a server that runs Windows Server 2008 R2. You plan to create a custom script. You need to ensure that each time the script runs, an entry is added to the Application event log.
    [Show full text]
  • How to Run Nesstar with IIS Socket Pooling
    Unlocking | data | creating | knowledge How to run Nesstar with IIS Socket Pooling November 2006 Nesstar Socket Pooling Contents 1 Introduction ......................................................................................................... 1 1.1 What is Socket Pooling? ............................................................................. 1 1.1.1 How to confirm this is the problem ...................................................... 1 2 Solving the Problem ............................................................................................ 1 1.1 Solving the Problem for IIS 5.0.................................................................... 1 2.2 Solving the Problem for IIS 6.0.................................................................... 2 Nesstar Socket Pooling 1 Introduction The Nesstar Service will not start under Win 2K or Win 2K3 Server when IIS 5/6 (Internet Information Server) is running. This is because of IIS Socket Pooling. The instructions below explain how to change IIS setting to enable the Nesstar Service to run. 1.1 What is Socket Pooling? Socket pooling is non-blocking socket usage, introduced in IIS 5.0 where more than one application can use any given socket. When IIS 5.0 and 6.0 start on 2000 or 2003 server, IIS binds to all IP addresses on the server and not just the IP addresses that are assigned to web sites. The HTTP service, for example, listens to port 80 on all unassigned IP addresses even if you specify a particular IP address for the default virtual server. The same is true for the FTP and SMTP services on port 21 and 25 respectively. 1.1.1 How to confirm this is the problem To check if IIS socket pooling is the cause of the problem: 1. Open a ‘Command Prompt’ by clicking Start > Run, and typing ‘cmd’. 2. Type “netstat –na” in the command prompt window.
    [Show full text]
  • Lab Setup Guide
    CS490 Windows Internals Software Setup for Labs & Exercises CS490 Windows Internals Lab Setup Guide The tools referenced in the labs are from the following sources: Windows Support Tools Windows Resource Kit Tools Windows Debugging Tools Kernrate (only needed for Unit 3) Freeware tools from www.sysinternals.com For a general description of these tool sources and their use for exploring Windows OS internals, see Windows Internals, 5th edition pp. 24-31. HARDWARE REQUIREMENTS: Any supported Windows 2000, Windows XP, or Windows Server 2003 system Disk space: at least 1GB free after installation ACCOUNT REQUIREMENTS: Some of the labs require local administrator rights: specifically, any lab using Windbg for performing local kernel debugging as well as labs using Filemon and Regmon from Sysinternals.com. INSTALLATION STEPS: 1. Install Windows Support Tools To install: run \support\tools\setup.exe from the Windows CD (make sure to install the Support Tools that matches the OS you are running on, e.g. XP Support Tools for XP, etc) 2. Install Windows Server 2003 Resource Kit Tools http://www.microsoft.com/downloads/details.aspx?FamilyID=9d467a69-57ff-4ae7-96ee- b18c4790cffd&DisplayLang=en © 2005-2010 David A. Solomon, Mark Russinovich and Kenny Zhu 1 CS490 Windows Internals Software Setup for Labs & Exercises 3. Install Debugging Tools for Windows http://www.microsoft.com/whdc/ddk/debugging You may need to install Microsoft .NET framework version 4.0 from http://www.microsoft.com/downloads/en/details.aspx?FamilyID=9cfb2d51-5ff4-4491-b0e5- b386f32c0992&displaylang=en before installing the debugging tools. Configure symbols (required for kernel debugging) as explained on the “Getting Started” page, available from the above web page.
    [Show full text]
  • Implementation Guide of R7.1.X
    This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • Access Denied: Error Message - Windows Update
    Access Denied: Error Message - Windows Update Network policy settings prevent you from using Windows Update to download and install updates on your computer. If you believe you have received this message in error, please check with your system administrator. For Windows XP Pro: Start/Run/gpedit.msc. User Configuration/Administrative Templates/Windows Components/Windows Update. In the right pane, double click, Remove access to all Windows Update Features and set it to disabled. For Windows XP Home Edition: Start/Run/Regedit HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpda te Locate the value in the right pane called DisableWindowsUpdateAccess. Double click this entry and change the value to 0 (zero) or right click it and select Delete. If editing the Registry manually isn't to your liking click here for a small Visual Basic Script that will make the change for you. More information here: Why can't I download updates? WINUP-Err Msg: "Cannot Display Page" Accessibility Options Restore Accessibility Options to Default Settings (Line 135) http://www.kellys-korner-xp.com/xp_tweaks.htm Acdsee Acdsee.exe May Cause an Error Message Activation - Troubleshooting Blank Activate Windows Page in the WPA Wizard Service Pack 1 Changes to Product Activation Windows XP Prompts You to Re-activate After You Restore Your Computer Activation - Explained: Windows XP will typically remind you to activate the product (most users will have 30 days to activate XP after installation). To activate XP manually, you can use the Start menu shortcut in the System Tools Accessories folder. At the command prompt, type: oobe/msoobe /a or Start/All Programs/Accessories/System Tools/Activate Windows.
    [Show full text]