Solved

Differences between Roaming profils and ProfileimagePath ?

Posted on 2011-03-09
4
2,668 Views
Last Modified: 2012-05-11
Hello,

I've got some RDS Server with RemoteApp, everythings is working fine.
I use roaming profils, redirection is working as well.

But i can see some personnal folder in C:\Users\ of the RDS Server.

I checked the registry, and i can see 2 keys about profils : PIC 1
- you can see that the redirection is OK : Centralprofile (in my exemple \\localhost)
- you can see a ProfileImagePath to C:\Users

PIC 1
What question is :
- What is ProfileImagePath ?
- Can I redirect everything ? even the ProfileImagePath to the same location that CentralProfile ?

thanks !!

Mathias
0
Comment
Question by:Mathias75000
  • 2
  • 2
4 Comments
 

Author Comment

by:Mathias75000
ID: 35093344
no idea ?
0
 
LVL 13

Accepted Solution

by:
connectex earned 250 total points
ID: 35094806
C:\Users\<username> is the local cache of the roaming profile. I've never seen a setting to avoid caching of the profile on the local system entirely. But there is a group policy setting to automatically delete the cached copy upon user logout. It's under Computer Configuation->Policies->Administrative Templates->System->UserProfiles->Delete cached copies of roaming profiles. Note while this avoids disk space from caching the users profiles it will probably increase the logon time as the full profile will have to copy every time.
0
 

Author Comment

by:Mathias75000
ID: 35094853
Thanks Connectex !
0
 
LVL 13

Expert Comment

by:connectex
ID: 35094883
Another possible issue if you choose to do this. If the roaming profile location is unavailable the users will be logged with a temporary profile. This may be worst as some things may not be configured and therefore won't work properly. Normally, the user would just be logged on with the cached copy and the roaming profile would be updated when it was available again.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

In this article, I'll explain how to setup a Plex Media Server (https://plex.tv/) on a Redhat (Centos) 7 based NAS with screenshots to help those looking for assistance.  What is Plex? If you aren't familiar with Plex, it’s a DLNA media serv…
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now