Solved

Quick mobile user login

Posted on 2009-05-17
7
294 Views
Last Modified: 2012-05-07
Our environment has a windows server 2008 as DC and 250 users. All users are using roaming profiles and that works great. We have 10 mobile users and when they are onsite there are no issues. All machines run Windows XP Pro, and if 32 bit SP3 and if 64bit SP2. But when they leave and log-on to their laptops locally outside of the office the log-on is rather long in some cases taking as long as 3 minutes.

Users are also receiving this error, Windows cannot locate the server copy of your roaming profile and is attempting to log you on with your local profile. Changes to the profile will not be copied to the server when you logoff. Possible causes of this error include network problems or insufficient security rights. If this problem persists, contact your network administrator.  
DETAIL - The network location cannot be reached. For information about network troubleshooting, see Windows Help.

Which would make sense seeing as how they are not connected to the DC where their profiles are.

So, how can I speed up logins and suppress this message?
Best,
Doug.
0
Comment
Question by:Dmichaelson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 23

Expert Comment

by:debuggerau
ID: 24408273
are you logging in via dial-up-networking before the login process begins? ie. at the login screen?
0
 

Author Comment

by:Dmichaelson
ID: 24408277
No, just locally to the machine.  And we do not what to be using DUN for logins.
0
 
LVL 23

Expert Comment

by:debuggerau
ID: 24408315
yea, but DUN is where you connect to your VPN host for access....
Without that, you'll be using cached accounts...

0
Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

 

Author Comment

by:Dmichaelson
ID: 24408332
The machine caches the profiles.
0
 
LVL 23

Expert Comment

by:debuggerau
ID: 24408362
So would you want to change the timeouts as that will affect the other machines trying to locate server on the LAN.

Easiest way is to boot/login without any network connectivity, so it times out quicker.

The message is a security feature, I don't think there is a way to disable it...

0
 

Author Comment

by:Dmichaelson
ID: 24408436
What timeout... Slow connection?
0
 
LVL 23

Accepted Solution

by:
debuggerau earned 250 total points
ID: 24409203
The timeout the PC need to establish a connecting with a domain that is non contactable.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question