Rename Remote Profile

Posted on 2012-09-10
Last Modified: 2012-09-10

Problem I am facing is remote End User w/possible corrupt profile in XP Pro that I want to re-name.
The End User is connecting via VPN.
I can log in as Local Admin, but only after End User has logged in first.
Because of this, there is still a tie to the End Users profile( NTUSER.DAT) which will not allow me to re-name the EU's profile.
If this was local, I would be able to reboot & sign on has the Local Admin & rename the profile, but that is not the case.

Any thoughts?

Appreciate any assistance.
Question by:jimtrim56
    LVL 76

    Accepted Solution

    It sounds as though you have roaming profiles configured.  You need to rename the profile that is saved on the server with the share.
    Check the user's configuration in AD. Then rename the folder on the server where the roaming profiles are stored.

    If the issue you are trying to addess is a laptop that is remote, create a (server startup task that will run at bootup that will rename the profile).

    You can use scheduled tasks to run once in 20 minutes that will rename the profile.
    then tell the user to logoff and wait the 20 minutes.

    Depending on the VPN, you can create another username for the user to use for login. upon login the user will establish the VPN at which point you will be able to rename the profile.
    If the user has admin rights on the system, they can create another administrative account with which to login and rename the current profile..

    Author Closing Comment

    Turns out there is no way to do this action w/out giving the remote enduser the Local Admin password so they can login as such. Then I could remote in & make my changes ...and so on.

    I want thank Arnold for the prompt response. Sounds like his answer would work for a Roaming Profile saved to a server.
    Unfortunately, this not the cse in my concern. '

    But, thanks again for the response!!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Sometimes people don't understand why download speed shows differently for Windows than Linux.Specially, this article covers and shows the solution for throughput difference for Windows than a Linux machine. For this, I arranged a test scenario.I…
    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    As developers, we are not limited to the functions provided by the VBA language. In addition, we can call the functions that are part of the Windows operating system. These functions are part of the Windows API (Application Programming Interface). U…
    This Micro Tutorial will give you a basic overview of Windows DVD Burner through its features and interface. This will be demonstrated using Windows 7 operating system.

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now