IMPORTANT: The configuration utility must be:
|
Before running the configuration utility, you need to configure the version control server to use SQL as the configuration store. See Editing the Version Control server configuration store to change the storage from AD/AD LDS to SQL.
SQL Injection inserts malicious code into SQL statements which can lead to security vulnerabilities. To protect your environment from a SQL Injection attack, you can mark SQL statement inputs that are not permitted. See Editing the Version Control server properties. By default, we have marked the following inputs as not permitted. If you allow these inputs, malicious code may be inserted in a SQL statement resulting in security vulnerabilities:
To change the GPOADmin service account in an existing deployment, consider the following:
To bring GPOs back into compliance complete the one of the following:
This assignment is also valid for the PowerShell commands and the GPOADmin snap-in for GPMC.
1 |
2 |
Select the Root Container Assignment tab and assign the users or groups who are going to see this as their Root Container. |
1 |
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center