Solved

Mapping Drives using Item level Targeting based on Computer Netbios Name using variable logic

Posted on 2011-09-11
5
1,015 Views
Last Modified: 2012-05-12
Below is an example of what I am looking to accomplish using Windows 2008 group policy item level targeting. The key is that I would like to do this without having to create a seperate item level targeted map entry for every single computer. I wopuld like to simply create one entry using variables and logic. This is something that I presently have in place using scripting but would like to move to eliminate the logon script and use GP exclusively.

- Computer names are computer1, computer2, computer3,... etc.
- Shares on server are computer1$, computer2$, computer3$,...etc.

When a user logs on to computer 1 they receive the mapped drive computer1$, computer2 gets computer2$, and so on.
0
Comment
Question by:MonkShines
  • 3
  • 2
5 Comments
 
LVL 53

Expert Comment

by:McKnife
ID: 36522172
Hi.

You leave out to tell us if you have already tried it. I suppose \\server\%computername%$ would work when entered at the "Location" line.
0
 

Accepted Solution

by:
MonkShines earned 0 total points
ID: 36524735
I figured it out .... A hidden root share needed to be created and  F3 item level targeting to the share and %computername% needed to done using the REPLACE on the location field with the "resolve variable" attribute set
0
 

Author Closing Comment

by:MonkShines
ID: 36553481
There was only one other comment and it did not have any real detail to it and did not help the solution
0
 

Author Comment

by:MonkShines
ID: 36524750
agreed
0
 
LVL 53

Expert Comment

by:McKnife
ID: 36553900
No real detail?
I told you to populate the location field of the group policy preferences drive map item with \\server\%computername%$ which works as expected. No further settings needed. Next time feel free to ask if you don't understand a proposed solution :)
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Introduction You may have a need to setup a group of users to allow local administrative access on workstations.  In a domain environment this can easily be achieved with Restricted Groups and Group Policies. This article will demonstrate how to…
If you get continual lockouts after changing your Active Directory password, there are several possible reasons.  Two of the most common are using other devices to access your email and stored passwords in the credential manager of windows.
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
This Micro Tutorial will give you a introduction in two parts how to utilize Windows Live Movie Maker to its maximum editing capability. This will be demonstrated using Windows Live Movie Maker on Windows 7 operating system.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now