Solved

I get the error message noted above quite randomly while trying to delete a folder from a network drive.

Posted on 2008-10-14
9
859 Views
Last Modified: 2012-05-05
I am using Windows Vista Business. I am connected to a corporate network/domain. We save our files on a central drive. Frequently, I'll move files around, delete subfolders, etc. Occasionally, when trying to delete a folder, I'll get an error message stating "This operation can only be performed when you are connected to the network". I'm connected to the network and have no problem browsing through any of the files on the network as well as the internet. This seems to happen without rhyme or reason. If I reboot my computer, most of the time, it will then allow me to delete the folder.

What is going on here?
0
Comment
Question by:Forensicbp
  • 3
  • 2
  • 2
  • +2
9 Comments
 
LVL 11

Expert Comment

by:Eric
ID: 22714902
Does it happen with wireless disabled??
Try disableing IPV6
0
 

Author Comment

by:Forensicbp
ID: 22734322
I am not sure. I'll try it but I'd rather not disable wireless as I use a laptop and frequently take it off the docking station to move into another's office.

Might it be related to syncing of offline files?
0
 
LVL 11

Accepted Solution

by:
Eric earned 50 total points
ID: 22734390
as a best practice I disable wireless in the hardware profile for "docked"
you can simply use the switch may pc's now have to disable the radio. Or right click the wirless icon in the system tray and "disable radio"  
 
0
 

Author Closing Comment

by:Forensicbp
ID: 31506027
I have used the profile manager to disable the wireless unless I undock. So far it hasn't happened again but it was very sporadic before so I'll have to wait and see if this fixes the problem. I suspect it may also be related to syncing of offline files. Thanks for you help and I'll update this thread if it happens again.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 11

Expert Comment

by:Eric
ID: 22822959
Thanks.  Good luck, keep us updated. HOpe its fixed
0
 

Expert Comment

by:customcpuview
ID: 22841295
I have the same issue but the wireless connection is my connection method? What would I do in this case?
0
 

Expert Comment

by:Valhalla525
ID: 23540782
Customcpuview: Your issue is likely one of permissions on the server that your Offline Files synchronization is occurring against.  Check the permissions on the server-end folder and make sure they are all correct by selecting Properties -> Sharing and Security -> Security tab.

If the permissions look correct, they may be correct on the parent folder but not on one of the subfolders.  This can be corrected by (from the same window as indicated above) clicking on the Advanced button, selecting "Replace permissions on all child objects with entries shown here that apply to child objects", and clicking on Apply.

Once you have made any changes to the above settings, be sure to sync the folder(s) in question again, so the permissions are pulled down on to the client system!


0
 

Expert Comment

by:Werdus
ID: 25131275
I have the same question as customcpuview. Has there been any resolution for this? My client is running Vista SP2
0
 

Expert Comment

by:Werdus
ID: 25131302
Oops. Didn't see Valhalla525's comment.

I got it working by doing a manual sync, even though restarting the laptop should have done a sync.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now