Solved

Configuring Virtual Memory Settings via GPO

Posted on 2007-12-04
9
5,229 Views
Last Modified: 2011-08-18
Hi,

Is it possible to configure Windows XP virtual memory settings to 'system managed' page file size using Group Policy?

Thanks,

Mike
0
Comment
Question by:Barnardos_2LS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
9 Comments
 
LVL 66

Expert Comment

by:johnb6767
ID: 20404539
I dont think there is a GPO for it, but here is  areg command that will do it. Can easily deploy it in a login script, or PSEXEC?
0
 
LVL 66

Expert Comment

by:johnb6767
ID: 20404543
Guess the reg command might be helpful....

reg add "hklm\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v pagingfiles /t reg_multi_sz /d "C:\pagefile.sys 0 0" /f
0
 
LVL 1

Author Comment

by:Barnardos_2LS
ID: 20404551
I wanted to avoid using login scripts if possible...
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 1

Author Comment

by:Barnardos_2LS
ID: 20404561
How does the reg command work?
0
 
LVL 66

Expert Comment

by:johnb6767
ID: 20404582
From a command prompt.....if you have a listing of PCNames, you could use PSEXEC as well...

Are you famiiliar with that?
0
 
LVL 66

Accepted Solution

by:
johnb6767 earned 500 total points
ID: 20404612
Or take a shot at creating a custom ADM file....

Using Administrative Template Files with Registry-Based Group Policy
https://www.microsoft.com/downloads/details.aspx?FamilyId=E7D72FA1-62FE-4358-8360-8774EA8DB847&displaylang=en
0
 
LVL 1

Author Comment

by:Barnardos_2LS
ID: 20404663
I'll take a shot at creating the ADM...
0
 
LVL 66

Expert Comment

by:johnb6767
ID: 20404761
This is a great reference, probably a little overkill for you now though.....

Windows System Policy Editor
http://www.oreilly.de/catalog/winsyspe/chapter/ch08.html
0
 

Expert Comment

by:JohnWolski
ID: 23708351
Just a note to anyone who views this: According to the document http://www.frickelsoft.net/blog/downloads/howto_admTemplates.pdf creating a custom ADM file won't work in this case as the registry key containing the Paging File settings is a REG_MULTI_SZ which (along with REG_BINARY) can't actually be modfied by group policy. (I just tried) For any registry key which is not one of these two types creating a custom ADM should work fine however.
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question