Solved

Make remote desktop the same as local desktop in office

Posted on 2008-10-08
2
176 Views
Last Modified: 2012-05-05
When in our office my users have roaming profiles so their desktop follows them wherever they go.
Currently when they log into our terminal server from home they get a different desktop.  How can I make it so when they log into the terminal server they get their roaming profile desktop.
0
Comment
Question by:steveLaMi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22674272
1. Removing the copies of the profiles - this can be done by changing the following Computer GPO setting:
- Computer Configuration \ Administrative Templates \ System \ User Profiles.
- Locate "Delete cached copies of roaming profiles" and select Enabled.
, Redirect the user's documents and desktop folders. These are usually large folders and make logon very slow. I would recommend ensuring these are redirected. Also if you do this for the TS and Desktop profiles - users can access the same locations.

2.Ref the below links,

http://support.microsoft.com/kb/243535
http://www.msterminalservices.org/articles/Terminal-Server-profile-challenge.html
http://technet2.microsoft.com/windowsserver/en/library/a1b7ce04-708b-4145-830a-cadfc003acd31033.mspx?mfr=true
http://www.windowsdevcenter.com/pub/a/windows/2004/08/24/folder_redirect.htmlAdd to Knowledgebase View More Solutions Bookmark:

3.
0
 
LVL 18

Accepted Solution

by:
sk_raja_raja earned 500 total points
ID: 22674279
3.In User properties in AD, there's a tab called Terminal Services Profile, you set the roaming profile path there.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question