Solved

Moving a user from a pc to a winterm, keeping all there icons, files, etc. intact

Posted on 2006-07-06
3
217 Views
Last Modified: 2010-04-18
Hello, I am trying to move the receptionist from a regular PC to a winterm, to utilize less space. She has several icons on her desktop and personal folders in her c drive. How can I copy all of her prefrences through the server so that when she logs onto the terminal server through her new winterm instead of her PC - she can still have everything in her desktop like in her PC? We are running in a windows 2003 server (standard). & she will be logging onto the terminal server through a winterm.
Thank you.
0
Comment
Question by:Solar6838
  • 2
3 Comments
 
LVL 13

Accepted Solution

by:
Kini pradeep earned 400 total points
ID: 17051032
well, create a shared folder for the users terminal server profile.copy the user profile from the computer to the server, give the user full control on the profile as well as make the user the owner of that folder.
0
 

Author Comment

by:Solar6838
ID: 17051131
where can i do this from and how?
0
 
LVL 13

Expert Comment

by:Kini pradeep
ID: 17051499
in ad users and computers go to the user properties, on the terminal server profile tab furnish the path of the shared folder \\servername\share.
copy the existing user profile from the pc to this location. check permissions and ownership.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The HP utility "HP Lights-Out Online Configuration Utility for Windows Server 2003/2008" could be of great use when it comes to remotely configure a HP servers ILO WITHOUT rebooting the server. We would only need to create and run scripts using thi…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question