Solved

Remote removal of old roaming profiles

Posted on 2009-05-08
5
311 Views
Last Modified: 2012-05-06
Hi,
Am trying to setup a batch from the server that will interrogate each workstation on the domain and then remove the all romaing profles older than (x) days as parsed to the batch file. It would need to exclude all the important/system ones, but those of "username.domainame".
I can almost manage this, but need to know how to delete the entry from Control Panel; System; Advanced; User Profiles as well - to clean it all up properly.
Has anybody setup anything like this before to clean up their workstations?
Greg  
0
Comment
Question by:hainsNET
  • 2
  • 2
5 Comments
 
LVL 47

Assisted Solution

by:dstewartjr
dstewartjr earned 150 total points
ID: 24340689
0
 
LVL 12

Accepted Solution

by:
zoofan earned 350 total points
ID: 24341589
I second dstewartjr post delprof is the way to handle this correctly

and will add, once you have them cleaned out...

Install the 'User Profile Hive Cleanup Service' to keep it from happening again and again and again.

http://www.microsoft.com/downloads/details.aspx?FamilyID=1b286e6d-8912-4e18-b570-42470e2f3582&displaylang=en





zf
0
 
LVL 47

Expert Comment

by:dstewartjr
ID: 24342034
The 'User Profile Hive Cleanup Service'  isnt for cleaning up or removing profiles, It is meant for resolving unresolved logoffs/hangs that are sometimes a problem with roaming profiles. A better Idea would be to enable the group policy of delete cached profiles.
0
 
LVL 12

Expert Comment

by:zoofan
ID: 24342083
Oh sorry, I didnt mean that it was for cleaning up the profiles I agreed with you on delprof for that, but what it does do is help prevent those profiles from not getting left behind in the first place,  including when you have the GPO set.

http://windowsitpro.com/article/articleid/42257/whats-user-profile-hive-cleanup-service-uphclean.html


zf
0
 

Author Closing Comment

by:hainsNET
ID: 31579666
Between these two options I have attained the info I need. Thanks everybody. Greg.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article (http://rdsrc.us/u3GP7A) first and run the tool TDSSKiller (http://rdsrc.us/GDBBs4) to get rid of the infection. Once done, and if the …
Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine. For this, I arranged a test scenario.I…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now