?
Solved

File item

Posted on 2010-11-22
4
Medium Priority
?
428 Views
Last Modified: 2012-05-10
Can someone explain to me clearly what File item in GPO Settings does?
http://technet.microsoft.com/en-us/library/cc772536.aspx


Thanks
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 2000 total points
ID: 34193514
It does exactly what the page says there

File preference items allow you to copy, modify the attributes of, replace, and delete files. (To configure folders rather than individual files, see Folders Extension.) Before you create a File preference item, you should review the behavior of each type of action possible with this extension.

So take a look at my screen shot for example.  I'm copying  all the files in the test folder to the documents folder.

Thanks

Mike
file-properties-1.png
0
 

Author Comment

by:jskfan
ID: 34196093
is this like creating a logon script that copies a file from the network share to a user computer?

So how can be the file item GPO used, for instance to copy the pcf file(cisco vpn client profilr) to end users computers desktop?
0
 
LVL 57

Assisted Solution

by:Mike Kline
Mike Kline earned 2000 total points
ID: 34196769
You would select that pcf file and then have it copy to the desktop folder.  You may have to use the wildcard like I did in the screenshot so that you are able to select a folder.  It looks like the GUI for this GPP could definitely be improved.
0
 

Author Closing Comment

by:jskfan
ID: 34209557
thanks
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Here's a look at newsworthy articles and community happenings during the last month.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question