Solved

Old Roaming profiles overwrite new ones

Posted on 2004-04-28
3
344 Views
Last Modified: 2012-08-13
Hello to the experts of whom I am definately not one!

I have a network with 4 w2k sp4 servers and 20 w2k sp4 client workstations.

I have 2 users out of 20 that continually have old profiles overwrite new ones.  These two users log onto laptops, Terminal server and their own desktop.  I wonder if this could be causing the problem, however I dont really know where to start looking.

any ideas?
Regards
David
0
Comment
Question by:D_Hartup
  • 2
3 Comments
 
LVL 1

Expert Comment

by:iamgod
Comment Utility
If i understand your question, you're saying that a default profile or similar is uploading to your server(s) and overwriting these 2 users  roaming profile. Usually, the date stamp on the profile (NTUSER.DAT file ) determines which profile is older, i'd check the regioanl settings on the laptops are the same as on the servers. It can cause probs.
0
 
LVL 6

Author Comment

by:D_Hartup
Comment Utility
Yes you do undertand me correctly, however the regional options are all correct.  Do I need to check each NTUSER.dat file on each computer that the user logs onto?
0
 
LVL 1

Accepted Solution

by:
iamgod earned 125 total points
Comment Utility
The only way i quess this is happening is that a local computer is uploading a local profile with a latter date stamp on the Ntuser.dat - why i'm not sure but checking the date on the NTuser.dat file may  give you an idea which computer is responsible.

Hope this helps

0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

I was recently sitting at a desk at work with one of my colleagues and needed some information on my home computer. He watched as I turned on my home computer, established a remote session into it, got the information I needed and then shut it down …
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now