Win2KPro login with cached profile

Posted on 2001-06-06
Last Modified: 2010-04-12
Scenario: Windows 2000 Professional logs on a NT 4.0 domain
through a ISDN router (Cisco 803).

Problem: About 50% of each time the user logs on with cached user profile.
That means the login script does not run. Everything else seems okay.
It looks like the Win2K Pro times out too quickly and just logs on
with cached profile. I've tried Microsoft Q163204, but that didn't work.
The client uses WINS and DNS for name resolution.

Could anyone please give me some leads where to look for the solution?
ANY suggestions is VERY appreciated.

Frank Aune
Oslo, Norway
Question by:ITpro

Expert Comment

ID: 6162710
why not try to disable using the cached profile, thus enforce the workstation to use the domain, and thus make sure that your login scripts work ...

to disable using the cached profiles, you must edit the registry and do the following on each workstation:

1. Start the registry editor (regedit.exe)
2. Move to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
3. From the Edit menu select New - DWORD value
4. Enter a name of DeleteRoamingCache and press Enter
5. Double click the new value and set to 1
6. Click OK

Best Of Luck | Khaled

Expert Comment

ID: 6162744
I am pretty certain that you can use the local policy under computer management in Win2kpro on an NT4 domain to prevent using cached profiles rather than editing the registry......there are many settings regarding optimising profiles there

Expert Comment

ID: 6176123
sure, it does the same job ...

just you dont find the local security policy under the computer management tobyk... it's a stand alone MMC, you can find the local security polcy under the Administrative Tools.

and from the Security Options under Local Policies ... you can set [Number of previous logons to cache (in case domain controller is not available)] to [ 0 ] which means no logons cached... the default is set to 10 logons.

Best Regards | Khaled

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.


Author Comment

ID: 6176258
Thank you for the suggestions so far.

The real problem is that the login process times out because it doesn't find a domain controller. The 64Kbit line doesn't give the client enough time to find a BDC.

If I disable the cached profile completely the user just doesn't get logged on at all. And that is a bigger problem.

Does anyone know any values to adjust in registry to make the client use longer time to search for a Domain Controller? The dialup router is up and running when the client tries the login and the network connection is working okay. So the BCD is there. I just need to force the client to find it.

Expert Comment

ID: 6179252
have you tried Q207552?

Expert Comment

ID: 7859001
Dear questionner/expert(s)

No comment has been added lately, so it's time to clean up this TA.
I'll leave a recommendation in the Cleanup topic area that this question is to be:

- PAQ'd and pts removed

Please leave any comments here within the next seven days.



Cleanup volunteer

Accepted Solution

SpideyMod earned 0 total points
ID: 7924685
per recommendation

Community Support Moderator @Experts Exchange

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question