Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

How to disable an individual roaming profile

Posted on 2010-11-23
4
Medium Priority
?
856 Views
Last Modified: 2012-05-10
Hi,

It's been a while since I worked with Windows. But to disable an individual roaming profile do I go under the account Active Directory or is GPO related?

Thanks
0
Comment
Question by:Sainai
  • 2
4 Comments
 
LVL 35

Accepted Solution

by:
Ernie Beek earned 2000 total points
ID: 34195260
0
 
LVL 10

Expert Comment

by:abhijitmdp
ID: 34195594
You can disable from the users' properties for a particular user.
0
 
LVL 10

Expert Comment

by:abhijitmdp
ID: 34195603
Even this was configured from the domain gpo. This can be disabled from the user's property.
0
 
LVL 5

Expert Comment

by:9660kel
ID: 34208079
Go into active directory users and computers, find the OU that contains the user, (by default the users OU) right click on the user and select disable.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
Transferring FSMO roles is done when an admin wants to split roles between certain Domain Controllers or the Domain Controller holding the Roles has been forcefully demoted using dcpromo / forceremoval
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question