Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Is there a way to immediately execute a network-wide script?

Posted on 2009-03-31
2
234 Views
Last Modified: 2012-05-06
Just out of curiosity, is there a way for a network administrator to instruct all computers on the network to run a batch file or a script, IMMEDIATELY (ala, not on logon or boot-up, just during session)?

In my scenario, I just want to temporarily map a network drive to all workstations for a demonstration purposes, and I'd like to just push a "net use X: \\blah\blah" kind of thing to everyone.
0
Comment
Question by:ringo380
2 Comments
 
LVL 38

Accepted Solution

by:
Shift-3 earned 500 total points
ID: 24030056
You can use PsExec to run local commands on multiple remote machines simultaneously, but this wouldn't work for your particular example since network drives are mapped on a per-user basis and PsExec's commands don't normally run in the user's context.  To do so you'd have to use the -user and -psswd switches and this would require that you know every user's password.  That wouldn't be secure or practical.
0
 

Author Closing Comment

by:ringo380
ID: 31564898
That's pretty much exactly what I was looking for, not to mention an extremely useful program. I had no clue about it, and I appreciate the link immensely. It doesn't quite accomplish the "gpo-equivalent" network-wide thing that I was talking about, but this is about as close as I think I'll get.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question