Solved

User profile cannot be loaded at login

Posted on 2004-03-21
5
908 Views
Last Modified: 2013-12-04
For a certain user of a stand alone Windows XP Pro computer, I have recently tightened user privilages/access to regedit.exe, regedt32.exe, control.exe, Control Panel, and Documents and Settings/UserName/Local Settings.  When attempting to login under this user's account, the following error is displayed:

Windows cannot log you on because your profile cannot be loaded. Check that you are connected to the network, or that your network is functioning correctly. If this problem persists, contact your network administrator.

I am new to adjusting security setting for users and am concerned that I may have placed such tight restrictions on these applications/folders as to render them unusable by the entire system for this user.  Is there a simple fix?

James

0
Comment
Question by:jgoussy
  • 2
5 Comments
 
LVL 4

Accepted Solution

by:
jcoppin earned 250 total points
ID: 10646657
give the user back full access to "Documents and Settings/UserName/Local Settings"
this is part of the users profile that gets loaded on logon, if you take away permissions to it, the profile will not load
0
 
LVL 12

Assisted Solution

by:trywaredk
trywaredk earned 250 total points
ID: 10647209
The most easy way, is to make them member of the local guest group, and nothing else.

If they should be able to save files on drive c:, make a share, and grant everyone full control on the share, and then grant write permissions on ntfs.

Builtin and predefined groups in Windows XP
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/prodtechnol/winxppro/proddocs/lsm_local_groups.asp

Understanding NTFS permissions:
http://www.windowsitlibrary.com/Content/592/1.html

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 12

Expert Comment

by:trywaredk
ID: 10647211
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
What is S-1-5-90-2? 16 308
Clickfree HD 7 96
Design of sending events/logs to SIEM/Arcsight 2 111
Penetration Testing home based work 3 41
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now