Solved

Settings via login script

Posted on 2004-10-09
5
400 Views
Last Modified: 2011-09-20
I am working on a login script for Windows XP clients.  I can't figure out how to do a few things though.  Anyone have thoughts on how to do the following?

- Make IE setting for max disk space to use for temporary internet files
- Set pagefile to "System Managed Size"
0
Comment
Question by:neisner
5 Comments
 
LVL 95

Accepted Solution

by:
Lee W, MVP earned 500 total points
ID: 12268442
The first should be done through Group Policies (basically, it's a registry setting).  If you don't want to use a Group Policy, then you probably need to determine where the Registry entry resides.  Try downloading Regmon from www.sysinternals.com and make the changes while it's running - it should record where the changes take place in the registry and if you track them down, you can then export the settings and use a regedit (see http://people.cornell.edu/pages/nk74/regedit.html for details on using regedit).
0
 
LVL 15

Expert Comment

by:adamdrayer
ID: 12268486
I believe the registry entry for the first one is:
HKLM\Software\Microsoft\Internet Explorer\Main\Cache_Percent_Of_Disk

but i agree it should be done through GP, since messing with the registry isn't the cleanest way of doing things, and it's a REG_BINARY value anyway.

0
 
LVL 4

Author Comment

by:neisner
ID: 12268640
Great, thanks...  Any ideas on the pagefile?
0
 
LVL 15

Expert Comment

by:adamdrayer
ID: 12268662
from what i can gather off the internet... no.  you cannot set the pagefile options the way you would like through Group Policy.  You can however, disable the ability for users and administrators to change the settings on the workstations.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/gp/530.asp
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12271056
"System Managed Size" is the default anyway, so as long as you remove the ability for users to change this, then you're all set.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

We recently endured a series of broadcast storms that caused our ISP to shut us down for brief periods of time. After going through a multitude of tests, we determined that the issue was related to Intel NIC drivers on some new HP desktop computers …
Resolve DNS query failed errors for Exchange
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now