[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Porting peer to peer Win2000/XP machines to Active Directory

Posted on 2006-03-30
Medium Priority
Last Modified: 2010-03-18
We are porting a peer to peer network of Windows 2000 and XP machines to an
Active Directory based network with Windows 2003 servers.
There is one user per client machine.
Is there any way to automatically import the
user's desktop and "My Documents" folder from their local machine account
to the domain account?   thanks

Question by:MikeMCSD
LVL 12

Accepted Solution

Rant32 earned 2000 total points
ID: 16332856
There might be a way to automate this, but since you have to go by the workstations to add them to the domain anyway, and there are several things to take care of:

- Create domain user accounts in AD with a home drive to \\server\homeshare\%username%. This will enable the user to store his documents on the file server (and possibly share and backup those documents). Ideally, use Group Policy to redirect My Documents to their home drive, but you can save that for later.

- The local user accounts must be removed or disabled, so users don't accidentaly use their local accounts. It'll screw things up, like duplicate documents.

- When a domain user with the same name as the local user logs on, then a new profile is created in C:\Documents and Settings. (in the form username.DOMAIN)
- Log on as the administrator, assign ownership and Full Control permissions on the *OLD* user profile to the domain user.
- Delete the newly created (empty) username.DOMAIN profile and rename the old user profile to the username.DOMAIN profile you deleted before.

Then, when the domain user logs on, they should have the same profile and documents. If you have the backup ready, have them move their documents to the server right away.

Hope this helps!
LVL 16

Author Comment

ID: 16333902
thanks Rant . . I'll give it a try.

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Whether it be Exchange Server Crash Issues, Dirty Shutdown Errors or Failed to mount error, Stellar Phoenix Mailbox Exchange Recovery has always got your back. With the help of its easy to understand user interface and 3 simple steps recovery proced…
Suggested Courses

872 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question