Solved

Printers and profiles in NT/2000 with Terminal Services

Posted on 2004-04-30
7
179 Views
Last Modified: 2013-12-04
Hello,

I'm going to go out on a limb here and see if I can get some help and guidance. I just started at a company where they have a mixed environment of NT, 2000, and Citrix Metaframe 1.8. From what I've learned so far, everything is controlled by policies. If a user id is in the Operations group, they will get the Operations desktop and a logon script operations.cmd will run. The only thing in the cmd file is three mappings for network drives. My question comes in about how the printers are assigned to the users. Ive looked everywhere and can't find it. If a user uses Citrix and logs in, they get the printer that is by them and it's their default. When I set up a test user and log on, there are no printers assigned or even available so I know I'm missing a step somewhere.

Thanks,
Matt Barys
0
Comment
Question by:mbarys
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 4

Expert Comment

by:zombieooo
ID: 10963209
When you log into Citrix, it uses the printer(s) from the workstation that you are logging into Citrix at.  Therefore if you have a test user with no printers set up, you will not see any printers assigned or available.  If you add a printer to the workstation you are at, it will become available in Citrix.

See: http://download2.citrix.com/FILES/en/products/ client/ica/current/docs/icados_en.pdf

Joel
0
 

Author Comment

by:mbarys
ID: 10963249
The machines we use to connect to Citrix are thin clients so there won't be any printers to begin with. This is where I'm getting stumped.

Matt
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
LVL 2

Expert Comment

by:MaryW
ID: 10968041
Metaframe XP has the functionality to auto-create network printers for specific users / specific groups of users. Metaframe 1.8 does not. The users can log on and create printers from the network (connections to network printers only show up for the profile who created them - local printers show up for everyone on a machine), which may be the easiest way to do it provided there aren't too many thin client users.
0
 

Author Comment

by:mbarys
ID: 10968875
Thanks MaryW,

Here's my problem, everyone uses the Neo thin clients so there are no local printers on them. Everyone has group and system policies associated with them and the Settings|Printers option is removed so we are stuck in the water. That's why I'm trying to figure out what they did. The only thing I can think of is that when I user is created, they get access to the printers, the printers are created, then the policy goes in effect to remove Printer access. I think it's kind of silly to disable that feature. I might just add it back to everyone and be done with it. Any other ideas?

Thanks,
Matt
0
 
LVL 2

Accepted Solution

by:
MaryW earned 500 total points
ID: 10969546
Do you have a working user account that is no longer needed? Or one you can mess around with? I'd try renaming or deleting their profile from the Citrix server, logging on as them, then seeing if the printer is still there. If it isn't, there's your answer. Someone did it manually. If does appear, and you don't have any roaming profiles or policy settings to create it, then I don't have any better ideas. Sorry.
0
 
LVL 2

Expert Comment

by:VRAGHAVANS
ID: 10974568
Go to Server .
Start -->Run-->MMC
Add Snapins -->Group Policy
Select User Configuration -->Administrative Templates
Control Pannel --> Printers
Check is the options are set correct

-Venkat
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question