?
Solved

Mystery drive mappings

Posted on 2008-10-23
3
Medium Priority
?
432 Views
Last Modified: 2013-11-21
Here's my situation. Some user accounts are finding old drive mappings. They used to have a logon batch file in AD on the profile tab under logon script. I deleted the entry from AD and removed the actual batch file from the sysvol directory.
Is there any way to trace what script caused the drive mapping?
Any pointer would be appreciated.
0
Comment
Question by:sherryfitzgroup
  • 2
3 Comments
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22789724
1.see if this helps
http://support.microsoft.com/kb/812933

2.Simply delete them from the registry:
[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Network\Persistent Connections]
Reboot, done

0
 
LVL 18

Expert Comment

by:sk_raja_raja
ID: 22789729
0
 
LVL 2

Accepted Solution

by:
sherryfitzgroup earned 0 total points
ID: 22789797
I deleted the TS profile worked a charm. THanks for the suggestions though guys
0

Featured Post

[Webinar] Kill tickets & tabs using PowerShell

Are you tired of cycling through the same browser tabs everyday to close the same repetitive tickets? In this webinar JumpCloud will show how you can leverage RESTful APIs to build your own PowerShell modules to kill tickets & tabs using the PowerShell command Invoke-RestMethod.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I’m willing to make a bet that your organization stores sensitive data in your Windows File Servers; files and folders that you really don’t want making it into the wrong hands.
Native ability to set a user account password via AD GPO was removed because the passwords can be easily decrypted by any authenticated user in the domain. Microsoft recommends LAPS as a replacement and I have written an article that does something …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

600 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question