Windows XP SP3 temporary profile

Posted on 2009-12-22
Last Modified: 2012-06-27
We have had several PC's in the last few months experience this problem.  For no good reason the user will log into their machine and be running under a temporary profile.  Normally, just shutting the machine down for a minute fixes the issue, but this doesn't always work for us.  The machines are part of an Active Directory, Server 2003 domain.  Just lately we've started to have a whole bunch of machine have this problem.  We aren't sure if an update released by Microsoft has caused this or not.  Anyone have an idea what could be causing this?  Their normal profile is not corrupt.  We normally just log in as the local admin and delete the temp profile(s) - there can be several sometimes.  It doesn't matter if its a laptop or desktop.
Question by:mousefhaddad
    LVL 2

    Expert Comment

    i know this problem an dit's resolved with me by made scandisk for drive "C" that hade system files.
    LVL 22

    Expert Comment


    Author Comment

    This link is for Windows 7.  I'm talking about XP.
    LVL 22

    Expert Comment

    I had the same problem that started about 3 months ago. I never knew what created it. It happened exactly as you described it. First one user, then other users. Before it became an epidemic... I tried the below procedure: it worked.
    The way I fixed it was deleting the user account on both the server and on the local client machine. I recreated the account with a slightly different name: instead of MaryB, I used Mary_B for the new account (this eliminates any remnants of SID's that might confuse either the server or client computer).
    After this.... the problem disappeared.
    Hope this helps. Please keep me posted.
    LVL 22

    Accepted Solution

    If this does not resolve the problem for you, Microsoft has a download that was created specifically to clean the User Profile Hive (it seems that lots of people are now having this same problem):

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Can you find a fax from a vendor you saved a decade ago in seconds? Have you ever cursed your PC under your breath during an audit because you couldn’t find the requested statement or driver history?  If you answered no to the first question or yes …
    If you have done a reformat of your hard drive and proceeded to do a successful Windows XP installation, you may notice that a choice between two operating systems when you start up the machine. Here is how to get rid of this: Click Start Clic…
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    794 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    16 Experts available now in Live!

    Get 1:1 Help Now