Solved

Roaming Profiles using Windows Server 2008 Std and Wyse Terminals logging in to a Terminal Server

Posted on 2010-11-19
4
770 Views
Last Modified: 2012-05-10
Is it possible and/or recommended to use roaming profiles for users logging in to a Terminal Server?

Also, these users would need to have their Outlook .PST file saved to the 2008 Std server along with the rest of their roaming profile.  Is this best practice?

Most of the users will be using Wyse Terminals so saving info to the local “PC” is not an option.
0
Comment
Question by:computerconcepts
  • 2
  • 2
4 Comments
 
LVL 4

Accepted Solution

by:
cmrayer earned 500 total points
ID: 34177156
We have several hundred users set up this way (but do use Citrix rather than simple TS), however the profile issue is still the same.

It is important to exclude as much as possible from copying to the TS server from the profile server or the logon process is v.slow.  This is simple to do in group policy and directories such as java cache are a good place to start.  Also if you serve apps and not a desktop then it is easier (only possible really with 2008R2 TS or Citrix).

The outlook .pst files can be on a mapped drive rather than the profile as long as all users have the same path (i.e. h:\data\*)
0
 

Author Comment

by:computerconcepts
ID: 34187928
We are going with 2008 R2 Std so that is one less worry.  

As for the email, I would bsically leave the PSTs off the profile and have a separate directory/location for that?  

You also mentioned java cache, is there a standard list of items to leave off the profiles or is that something I will have to trial and error?
0
 
LVL 4

Expert Comment

by:cmrayer
ID: 34191999
Yes, leave them off and as you are using 2008R2 you can simply serve apps to limit desktop sprawl.

There is no standard list but generally anything that is temporary should be excluded.
0
 

Author Closing Comment

by:computerconcepts
ID: 34192572
Thanks for the input!!  
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Normally after a failure of Domain Controller, when promoting new DC the DC is renamed, we will discuss the options in Dcpromo to re-create the DC with the same name. Scenario: You are a small IT shop with two Domain Controllers (Domain Contr…
Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now