?
Solved

Temporary Internet Files

Posted on 2006-06-28
10
Medium Priority
?
406 Views
Last Modified: 2010-04-13
I have 100+ windows 2000 & Xp workstations on my network. I'm trying to find a way via a script or registry tweak to purge out the temporary internet files every time a user logs off. Any thoughts?
0
Comment
Question by:compdigit44
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
10 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 300 total points
ID: 17006189
0
 
LVL 1

Assisted Solution

by:davidsummers
davidsummers earned 300 total points
ID: 17006982
Below is a Custom ADM file that can be used to set the IE behaviour by group policy.
There is no resident out of the box policy for this setting, so a custom adm file needs to be used. This template will give us the option to add the setting  "Empty Temporary Internet Files folder when browser is closed" and set that to enabled.
This setting will cause IE to clear it’s local Cache when the user closes their browser, therefore keeping the directory size of the temporary internet files down to a minimum.

Copy this into notepad and save the file as an .ADM file. This will allow you to import it as a template into a Group policy Object and then apply that to your users.



CLASS USER
CATEGORY "Internet Explorer User Settings"
 POLICY "Empty Temporary Internet Files folder when browser is closed"
 EXPLAIN !!ExplainEmptyTemporary
 KEYNAME "SOFTWARE|Microsoft|Windows|CurrentVersion|Internet Settings|Cache"
  PART "Empty Temporary Internet Files folder when browser is closed"
  CHECKBOX
  VALUENAME "Persistent"
  VALUEON NUMERIC 0
  VALUEOFF NUMERIC 1
  END PART
 END POLICY
END CATEGORY
[STRINGS]
ExplainEmptyTemporary=Empty Temporary Internet Files folder when browser is closed\n\nI suggest that you keep this option disabled to prevent repeated downloads of frequently accessed web content.
0
 
LVL 26

Assisted Solution

by:MidnightOne
MidnightOne earned 300 total points
ID: 17009677
compdigit44:

Adding onyo Jay_jay70's answer, this is the batch file you want:

@echo off
rd "%userprofile%\local settings\temporary internet files\content.ie5" /s/q
rd "%userprofile%\local settings\history\history.ie5" /s/q
del "%userprofile%\cookies\*.*" /s/q/f
del "%temp%\*.*" /s/f/q
del "%tmp%\*.*" /s/f/q

Note that this also flushes the local history, cleans out cookies, and blows awat the contents of the TEMP directories.

HAND

MidnightOne
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 20

Author Comment

by:compdigit44
ID: 17009980
Great answers everyone. Regarding davidsummers responce. I don't have active directory in place yet. Is it possible to copy the *.adm file to all workstations via a scipt then have the same script run secedit???
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014335
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014336
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014338
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014342
damn freikin internet - i apologise i was getting errors!
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Learn how to use the free Acronis True Image app to easily transfer data between iPhones and Android phones.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month14 days, 1 hour left to enroll

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question