Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Clear mapping histories

Posted on 2006-11-16
4
Medium Priority
?
558 Views
Last Modified: 2008-02-01
Is there a way to clear the mapped drive history?
0
Comment
Question by:eli290
4 Comments
 
LVL 10

Accepted Solution

by:
fostejo earned 1000 total points
ID: 17959262
eli290,

Not sure if this is exactly what you're looking for, but, the following registry key contains the MRU list related to network drives:  

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Map Network Drive MRU

Fire up RegEdit, browse to the above key and (carefully) delete the appropriate entries - the MRU list contains the last 26 or so entries with the 'MRUList' key itself specifying the order or the list..

Hope that helps..
0
 
LVL 21

Assisted Solution

by:jvuz
jvuz earned 1000 total points
ID: 17963716
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question