Solved

Win2K Pro shut down script

Posted on 2002-03-25
3
141 Views
Last Modified: 2010-04-13
I have a batch file that deletes the mapped network drives and I want it to run when the notebook is shutdown/restarted.

Where in the registry do I put it?

Derek.
0
Comment
Question by:dgwest
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
geoffryn earned 100 total points
ID: 6894941
Why don't you map the drives with the /persistent:no switch and allow the OS to remove them on shutdown.

NET USE \\servername\share /PERSISTENT:NO
0
 

Author Comment

by:dgwest
ID: 6896535
Well that's a good idea.  I don't do much work with scripts so I didn't know you could do that.  The problem is that the notebook is remote and it seems to stay at the "Restoring Network Connections" box for 30 seconds and I'm assuming it's because it's trying to re-connect to the mapped drives and I want to make sure they are deleted before the machine is powered down.

I'll monitor the situation today to see if it works.

Derek.
0
 

Author Comment

by:dgwest
ID: 7206350
Better late then never I guess.  Sorry for the late response.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malw…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question