Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Copy file during execute Login.cmd

Posted on 2000-03-22
3
Medium Priority
?
192 Views
Last Modified: 2013-12-19
I want to copy some files every time a user log in with a batch command file (NETLOGON folder). The batch should get the name of the user, check the desktop settings of his profile and copy some files in his specific desktop folder (profile). Any chance?
0
Comment
Question by:Linuxbaer
3 Comments
 
LVL 3

Expert Comment

by:kinsey
ID: 2645636
check out http://netnet.net/~swilson/kix/download.htm 
or... create a separate login script for each user
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 2645685
NETLOGON will be READ only for logged on users, so you'll have to store it somewhere else, where users have write access.
Unfortunately, this means users can delete these files too.
Bit of a dillemna !
The username variable is stored in %username% automatically - what exactly do you want to do with the profiles ?
0
 
LVL 1

Accepted Solution

by:
gkollar earned 40 total points
ID: 2646693
Be careful the NETLOGON becomes from the PDC or the SDC. So if you want write some information from the %username% and the %computername% you must share a path into the PDC with RWD for every body. I can get you a example my e-mail gkollar@uapl.fr.

To modify the profile for specific user or a group you can use POLEDIT.EXE.
When a user log in the file .pol overwrite the register /HKEY_USER with the entry from the pol.
You can get more information on the web site microsoft, item ZAK ( Zero Administration Kit)

Best Regard from France.


0

Featured Post

Fill in the form and get your FREE NFR key NOW!

Veeam is happy to provide a FREE NFR server license to certified engineers, trainers, and bloggers.  It allows for the non‑production use of Veeam Agent for Microsoft Windows. This license is valid for five workstations and two servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Despite its rising prevalence in the business world, "the cloud" is still misunderstood. Some companies still believe common misconceptions about lack of security in cloud solutions and many misuses of cloud storage options still occur every day. …

782 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question