Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Use of %USERNAME% through GPMC remotely

Posted on 2009-07-07
4
267 Views
Last Modified: 2013-11-10
I've got a Win 2003 64-bit server but am running the GPMC remotly on my workstation (XP).  WHile logged into the workstation as myself, I am attempting to setup Folder Redirection through GPMC.  After setting 'redirect to following location', and setting the path to be '\\servername\path\%username%\documents', and press OK, there are no error messages.  But close GPMC and go back to the folder redirection and it has changed the folder redirection back to 'create a new folder', and '\\servername\path'\.

Any ideas why this %username% keeps breaking??  The folders DO exist, because if I take '\\servername\path\%username%\documents to the run command, a windows explorer opens up the currently logged on user's documents folder...
0
Comment
Question by:tru504187211
4 Comments
 
LVL 4

Accepted Solution

by:
tech_beast earned 500 total points
ID: 24799287
We use a similar policy but share each users home directory as username$ (the dollar makes it a hidden share)

So the redirection path in the gpo looks like this \\servername\%username%$

It looks like it doesnt like the path you have set in the gpo, try the above for a single user and see if this sorts you out.

P
0
 

Author Closing Comment

by:tru504187211
ID: 31600840
tech_beast: Your test suggestion led me to the correct solution...MS already has this %username% built in by selecting 'basic - redirect all users to same directory' and after that, the bottom of that window basically says 'for clair, the redirection will be \\servername\share\clair\documents.  So THANK YOU!
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question