Solved

Edit Shortcut Porperties on Remote Machine

Posted on 2009-07-11
4
584 Views
Last Modified: 2013-11-21
Hi.

Some shotcuts on remote machines are in the form "\\thiscomputername\c$\program files\myapp\myapp.exe". This was done some time ago as a quick and easy way to edit or create shortcuts on remote machines by mapping to the machine (rather than having to Remote Desktop) and, for the path, using the form \\theremotecomputername\c$\ rather than c:\ which would refer to the c: drive back here on my machine.

Following a tightening of security and permissions on the network these remote machines are now asking for a username and password to run the shortcut.  I don't want to look at permissions at this stage, I just want to change \\theremotecomputername\c$\ back to c:\ without having to Remote Desktop and without the shortcut on the remote machine thinking that the program is here on my c: drive!

Hope this makes sense!

TIA.
0
Comment
Question by:Sat2b
  • 2
  • 2
4 Comments
 
LVL 31

Assisted Solution

by:Henrik Johansson
Henrik Johansson earned 50 total points
Comment Utility
C$ is an administrative share requiring administrator access, and the permissions can't be changed. If you don't want the users to be administrators on the machine with the shared resource, you nead to add an additional share and configure the necessary permissions on the additional share.

Modify the shortcut locally to target the local path and copy the shortcut to the remote machines by using the administrative share.
0
 

Author Comment

by:Sat2b
Comment Utility
Thanks henjoh.

I think we're in this position because we tried that.  On the local machine we tried creating a shortcut to, say, c:\program fles\myapp\myapp.exe mirroring what we wanted on the remote machine. We then copied this shortcut to the remote machine but the shortcut thought the app was back on the local machine and tried to run it across the network. To solve this we created a shortcut locally \\theremotemachine\c$\program files\myapp\myapp.exe and copied that over, the remote user had admin rights on their own machine so it worked OK.

If the shortcut wasn't a shortcut but a batch file we'd just edit \\theremotemachine\c$\ to c:\, what we're trying to do is the same but for a shortcut. Shortcuts seem to be too clever, i.e. when I make a mapping to the the remote machine to edit the shortcut and change \\theremotemachine\c$\ to c: it assumes that the app is on the c: drive on my machine.

This is potentially a problemn on hundreds of shortcuts so all we wanted to do when it was reported was a quick map-edit-save.  We don't want to change shares or permissions, that would be overkill. It looks like Remote Desktop-edit-save may be what we have to do.

Thanks again.
0
 
LVL 31

Expert Comment

by:Henrik Johansson
Comment Utility
I just remembered having some similar issue back in old NT4 days when the shortcuts stored the machine name in the shortcuts. I haven't seen this issue since then, but try to add the following registry setting

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
LinkResolveIgnoreLinkInfo=1 (dword)

http://support.microsoft.com/kb/158682


0
 

Accepted Solution

by:
Sat2b earned 0 total points
Comment Utility
Thanks henjoh, sorry for the delay in responding.

Whilst I appreciate that this registry tweak will fix problems of roaming and losing/finding targets I'm not sure it will fix my problem and probably does more that I want to do in any case. Thanks all the same.

I've been trying to find a method of making a simple low level edit of shortcuts on mapped drives on remote machines without c: referring to my c: drive.  It looks like the old NT Resource Kit shortcut.exe would've worked, the more recent scut.exe even more so.  Shortcut.exe is probably too old now and I couldn't find a downloadable copy of scut.exe.  However I have found a diiferent third party shortcut.exe at http://www.optimumx.com/ and it does exactly what I want so I'm going to go with it.

Thanks again and regards.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

INTRODUCTION The purpose of this document is to demonstrate the Installation and configuration of the Data Protection Manager product. Note that this demonstration was prepared on the basis of Windows OS is 2008 R2 and DPM 2010. DATA PROTECTI…
Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now