?
Solved

Deploying PRF file via Group Policy

Posted on 2011-09-02
3
Medium Priority
?
3,482 Views
Last Modified: 2012-05-12
We are using a XenApp 6 server farm in an Windows 2K8 R2 environment.  We are tying to not save user profiles for large groups of similar users, so their shortcuts are all being created via Group Policy.  The only real issue left is their Outlook profile, which has to be setup after each login.

I want to use a PRF that I created from the Office 2010 setup to auto-setup their Outlook at login, but I cannot find out how to use group policy to achieve this.
0
Comment
Question by:UnityPG
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 11

Expert Comment

by:KrAzY
ID: 36477076
PRF?  Please explain.
0
 
LVL 24

Accepted Solution

by:
Awinish earned 750 total points
ID: 36480907
0
 

Author Closing Comment

by:UnityPG
ID: 36488442
Thanks, works fine.  I found this before, but the registry was not working.  A few tweaks and is up and running.

Thanks.
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We take a look at some of the most common obstacles that IT teams run into as they work relentlessly to keep all the alarms and sirens from going off at once.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question