Solved

Temporary Internet Files

Posted on 2006-06-28
10
398 Views
Last Modified: 2010-04-13
I have 100+ windows 2000 & Xp workstations on my network. I'm trying to find a way via a script or registry tweak to purge out the temporary internet files every time a user logs off. Any thoughts?
0
Comment
Question by:compdigit44
10 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 75 total points
ID: 17006189
0
 
LVL 1

Assisted Solution

by:davidsummers
davidsummers earned 75 total points
ID: 17006982
Below is a Custom ADM file that can be used to set the IE behaviour by group policy.
There is no resident out of the box policy for this setting, so a custom adm file needs to be used. This template will give us the option to add the setting  "Empty Temporary Internet Files folder when browser is closed" and set that to enabled.
This setting will cause IE to clear it’s local Cache when the user closes their browser, therefore keeping the directory size of the temporary internet files down to a minimum.

Copy this into notepad and save the file as an .ADM file. This will allow you to import it as a template into a Group policy Object and then apply that to your users.



CLASS USER
CATEGORY "Internet Explorer User Settings"
 POLICY "Empty Temporary Internet Files folder when browser is closed"
 EXPLAIN !!ExplainEmptyTemporary
 KEYNAME "SOFTWARE|Microsoft|Windows|CurrentVersion|Internet Settings|Cache"
  PART "Empty Temporary Internet Files folder when browser is closed"
  CHECKBOX
  VALUENAME "Persistent"
  VALUEON NUMERIC 0
  VALUEOFF NUMERIC 1
  END PART
 END POLICY
END CATEGORY
[STRINGS]
ExplainEmptyTemporary=Empty Temporary Internet Files folder when browser is closed\n\nI suggest that you keep this option disabled to prevent repeated downloads of frequently accessed web content.
0
 
LVL 26

Assisted Solution

by:MidnightOne
MidnightOne earned 75 total points
ID: 17009677
compdigit44:

Adding onyo Jay_jay70's answer, this is the batch file you want:

@echo off
rd "%userprofile%\local settings\temporary internet files\content.ie5" /s/q
rd "%userprofile%\local settings\history\history.ie5" /s/q
del "%userprofile%\cookies\*.*" /s/q/f
del "%temp%\*.*" /s/f/q
del "%tmp%\*.*" /s/f/q

Note that this also flushes the local history, cleans out cookies, and blows awat the contents of the TEMP directories.

HAND

MidnightOne
0
 
LVL 19

Author Comment

by:compdigit44
ID: 17009980
Great answers everyone. Regarding davidsummers responce. I don't have active directory in place yet. Is it possible to copy the *.adm file to all workstations via a scipt then have the same script run secedit???
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014335
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014336
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014338
it is possible i am sure - all things are somehow, but much simpler with a simple batch until you have AD, then your whole world gets better!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 17014342
damn freikin internet - i apologise i was getting errors!
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this step by step tutorial with screenshots, we will show you HOW TO: Enable SSH Remote Access on a VMware vSphere Hypervisor 6.5 (ESXi 6.5). This is important if you need to enable SSH remote access for additional troubleshooting of the ESXi hos…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now