Solved

ntconfig.pol and Novell

Posted on 1997-04-04
1
355 Views
Last Modified: 2013-12-23
Can the NTCONFIG.POL file be used on a non-domain network such as Novell?  If so how?  I am unable to located any reference in the Microsoft Documents.
0
Comment
Question by:esnipes
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
cer earned 100 total points
ID: 1559650
You need the domain for automatic and easy distributing the policy. If you choose "manual mode" and give a valid (maybe local) path it should work.
To change this setting from automatic (wich in the netlogon dir of a PDC) to manual you must change the Registry with regedt32 (hklm/system/ccs/control/update,  2=manual, 1=auto) or better with the policy editor. Be careful: there are currently 3 settings wich will always reset when opening the local registry (See www.microsowst.com Windows NT server FAQ:

  Network\Sharing\Create hidden drive (workstation)
  Network\Sharing\Create hidden drive (server)
  Printers\Beep for error enabled

For Novell the documentation at www.microsowst.com (search for "Policy") say that you must put the .POL file in the PUBLIC directory. In this case automatic download must be enabled.
There are various reason why it can still not work. Look in the old questions (at least 2 are about policy) or leave a comment (without grade) so I can give more information.

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question