Posted on 2009-12-16
Last Modified: 2012-05-08
I have a strange issue. When I open GPMC there is a setting to redirect a users favorites file to a specific location. This location is wrong and needs to be changed. When I click edit and it opens gpedit for me I scroll down to that setting and it does not exist. The folder is empty. Please see screen shot to confirm.

Any help is appreciated.

Question by:patrick_ewen
    LVL 74

    Accepted Solution

    This would normally be configured under Windows Settings > Internet Explorer Maintenance > URL's

    The folder you are looking at doesn't exist on my Group Policies so it must be a custom ADM, if you right click on Administrative Templates then select Add/Remove Templates are there any templates listed?
    If so what are they called?
    LVL 82

    Expert Comment

    With Administrative Templates selected in the left pane, choose View > Filter, uncheck "Show only policies that can be fully managed".
    Note that this policy is what Microsoft calls "Branding", "Tattooing" or "Preferred Setting", not a "real" policy, as it writes outside the Policies keys. Settings configured like this will remain active even after the GPO is deleted, just as if you'd changed the registry manually.

    Author Closing Comment

    You were on the right track.
    "This would normally be configured under Windows Settings > Internet Explorer Maintenance > URL's"
    This is where you would set the sites that you want to show up in favorites but not where to store the favorites.

    The custom ADM is what did it. The reason that it did not show up in GPEDIT is that I had not unchecked "Only show policies that can be fully managed" Once I did that, I could change the setting.

    Here is a link to the custom ADM and a very thorough explanation of using it.

    Many Thanks to Windomaker.

    Author Comment

    Thanks oBdA, but you were just a bit late for the points. I wish I had seen your post sooner because I had to also figure out that removing the ADM did not change the setting.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    I'm sure that every Windows systems administrator has written, or at least used, a batch or VBS login script at some point in their career, whether it is to map network drives, install printers, or set some user preferences.  No more! With Window…
    Do you have users whose passwords are expiring and they are constantly calling you?  Well I sure did and needed a way to put an end to this.  We have a lot of remote users which would not be notified that their passwords were expiring since they wer…
    This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
    This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now