?
Solved

How do I setup up roaming profiles?

Posted on 2004-10-15
4
Medium Priority
?
124 Views
Last Modified: 2012-05-05
I need to know the specific and detailed instructions on how to properly setup roaming profiles for our employees.

I need the specific sharing/security options detailed on the server side and I would like to know if there is anything I need to do at the local machine.

Thank you,
Joshua A. Brown
0
Comment
Question by:TheJabster
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 11

Expert Comment

by:adonis1976
ID: 12321284
0
 
LVL 11

Accepted Solution

by:
adonis1976 earned 1000 total points
ID: 12321291
here some more information on how to configure client profile

http://support.microsoft.com/default.aspx?scid=kb;en-us;307964
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
We are witnesses that everyone is saying that our children shouldn't "play" with a technology because it is dangerous. This article is going to prove that they are wrong.
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 19 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question