Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Copy file during execute Login.cmd

Posted on 2000-03-22
3
183 Views
Last Modified: 2013-12-19
I want to copy some files every time a user log in with a batch command file (NETLOGON folder). The batch should get the name of the user, check the desktop settings of his profile and copy some files in his specific desktop folder (profile). Any chance?
0
Comment
Question by:Linuxbaer
3 Comments
 
LVL 3

Expert Comment

by:kinsey
ID: 2645636
check out http://netnet.net/~swilson/kix/download.htm 
or... create a separate login script for each user
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 2645685
NETLOGON will be READ only for logged on users, so you'll have to store it somewhere else, where users have write access.
Unfortunately, this means users can delete these files too.
Bit of a dillemna !
The username variable is stored in %username% automatically - what exactly do you want to do with the profiles ?
0
 
LVL 1

Accepted Solution

by:
gkollar earned 20 total points
ID: 2646693
Be careful the NETLOGON becomes from the PDC or the SDC. So if you want write some information from the %username% and the %computername% you must share a path into the PDC with RWD for every body. I can get you a example my e-mail gkollar@uapl.fr.

To modify the profile for specific user or a group you can use POLEDIT.EXE.
When a user log in the file .pol overwrite the register /HKEY_USER with the entry from the pol.
You can get more information on the web site microsoft, item ZAK ( Zero Administration Kit)

Best Regard from France.


0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question