Solved

Mapping a network drive (Sharepoint)

Posted on 2009-05-12
2
897 Views
Last Modified: 2012-05-06
I just installed a new hard drive and an rebuilding my system.  I can no longer log into a Sharepoint network drive using "Map a Network Drive" as I used to.  I get this error: "The network path could not be found."  The only change I made in my new system is I now use McAfee instead of AVG for my firewall, but I spent a lot of time today with McAfee and we turned off the firewall, and I still can't get in.  It does not appear to be related to McAfee.  Any ideas here?  I have a feeling this must be a simple permissions setting somewhere.
0
Comment
Question by:myrtledr
2 Comments
 
LVL 2

Accepted Solution

by:
KevinNo earned 500 total points
ID: 24372195
Which version of Windows are you using? There are 2 seperate ways to access SharePoint sites using UNC paths.

For Windows XP you must do the following:
Copy the http URL to the landing page of your site on SharePoint. Open My Network Places. Select Add Network Place. Select Choose another network place. Paste the http URL in the location box. SharePoint might ask you for your domain credentials. Click Finish. You will see the new location in the My Network Places list. You can drag it to your desktop or create a shortcut.

For Vista/7 it is alot easier. You can modify the URL to a UNC path e.g.:
http://SharepointServer/Sites/MySite/Subsite. Change the URL to look like \\SharepointServer\Sites\MySite\Subsite.

As a note, don't try to drill down to a document library level or other site features as the URL will have GUID ID's and view options in the URL. Rather just map to your root site URL and browse folders from there.

Failing the above, it could simply be DNS settings on your machine. Ensure your machine's network card has DNS server entries, suffixes for your domains etc. Make sure you can ping the hostname of the SharePoint server and it resolves with it's DNS suffix at the end e.g.:
ping sharepointserver
Pinging sharepointserver.mydomain.com

Hope this helps.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
A Bare Metal Image backup allows for the restore of an entire system to a similar or dissimilar hardware. They are highly useful for migrations and disaster recovery. Bare Metal Image backups support Full and Incremental backups. Differential backup…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now