Solved

Deploy shortcuts using Group Policy

Posted on 2008-10-30
2
701 Views
Last Modified: 2010-04-21
What's easiest way to deploy shortcuts (simple ones like to \\server\share\folder\) via group policy?  I need to have some on the desktop and some in \system32\ as well.
0
Comment
Question by:nstd-sts
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 12

Accepted Solution

by:
StuFox100 earned 500 total points
ID: 22865797
We use scripts (bat or VBS).
For the desktop script - place it in USER LOGON scripts
For \system32\ - place it in SYSTEM STARTUP
This was permissions will ok.

Cheers
Stu
0
 
LVL 1

Author Closing Comment

by:nstd-sts
ID: 31513556
sorry for the delay, underground for a while

I'll give you cred since that is what we ended up doing but the script itself would have been cooler.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It is a common problem that often server suffers from the lack of space on system volume. Old servers or new ones from vendors come with preformatted small volume - 5-6GB in total and after installing updates or applications the free space on system…
Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question