Solved

Can I force user shares to close or logoff

Posted on 2011-09-14
8
383 Views
Last Modified: 2012-05-12
Last night I thought I had logged everyone off their workstations – used my master key to access all but 2 offices. I determined everybody was logged off. Still I got a message that I did not have exclusive access to the Access database which usually means that someone is still logged on the database.

I am using SBS 2008. All workstations are either Vista or Win 7.

How can I have all computers log off after a certain period of inactivity? Or after a certain time of day? Or can I force all user shares to close?
0
Comment
Question by:LostInWindows
  • 4
  • 3
8 Comments
 
LVL 84

Accepted Solution

by:
Scott McDaniel (Microsoft Access MVP - EE MVE ) earned 250 total points
ID: 36540299
Here's a Microsoft article which shows how to detect idle time, and how to logoff users if they exceed your idle timeout period:

http://msdn.microsoft.com/en-us/library/bb243861%28v=office.12%29.aspx

Note, however, that even after logging everyone off, you can still end up with a "hanging" ldb file. If you do, then you'll have to delete the .ldb file (Access will create it as needed).
0
 
LVL 1

Author Comment

by:LostInWindows
ID: 36540305
Is the .ldb file created on the workstation or on the server? If on the server, is it in the Database directory?
0
 
LVL 77

Assisted Solution

by:Rob Williams
Rob Williams earned 250 total points
ID: 36540310
One solution that was introduced with WinNT that is still used today is the Winexit screen saver:
http://support.microsoft.com/kb/314999

You can also use the Microsoft psshutdown tool to force a text list of computers ,or all using wild card, to close applications and logoff, reboot, or shut down. This could be run as a command, or scheduled event from the domain controller.
http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/SBS_Small_Business_Server/Q_27309029.html
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 1

Author Comment

by:LostInWindows
ID: 36540314
Hmmm, sounds interesting. let me ask...
0
 
LVL 84
ID: 36540326
<Is the .ldb file created on the workstation or on the server? If on the server, is it in the Database directory? >

Assuming you're working with a split database architecture (a Backend consisting of Tables ONLY, and multiple FrontEnds consisting of everything else):

The .ldb file for the Backend will be in the same directory as the Backend, and it'll have the same name. For example, a file named MyBackend.mdb will produce a Lockfile name MyBackend.ldb.

The .ldb file for the Frontend will be on the user machine in the folder that holds the FE database (assuming you've deployed a COPY of the FE to each user). If you haven't deployed an FE to each users, then you'll need to search the target machines for .ldb files and attempt to delete them.
0
 
LVL 1

Author Comment

by:LostInWindows
ID: 36540336
Hi LSM,
There is 1 database located on the server with everything in it. The database has a lot of links to picture files also located on the server.  
All users except for 3 'programmers' are using Access Runtime 2007.
0
 
LVL 84
ID: 36541774
<There is 1 database located on the server with everything in it. >

Then the .ldb file should be on the folder where that database is located. You might also consider rebooting the machine hosting the database, as this will remove all Windows locks on that file.

Further: The database should be split to a Backend and Frontend scenario, and you should deploy a copy of the FE to each user. While you may have been fortunate enough to have no issues so far, you'll eventually run into them - corruption, performance issues, record locking, etc etc.
0
 
LVL 1

Author Closing Comment

by:LostInWindows
ID: 36557238
Thanks for the great suggestions
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
changing harddisk on computer in corporate 10 46
Set up secondary Domain Controller 4 71
backup programme - VBA 3 24
is Microsoft Access going to Die? 9 50
Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html?cid=Gene_Skyport) provided 218 attendees with a step-by-step guide for…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Learn how to number pages in an Access report over each group. Activate two pass printing by referencing the pages property: Add code to the Page Footers OnFormat event to capture the pages as there occur for each group. Use the pages property to …

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question