Printing Rights?

Posted on 2012-09-11
Last Modified: 2013-11-29
I'm a tech at a school, have full access to Dmoain Controller to create users.

I'm having an issue with a laptop, I need to install a network printer when I go to "Find Printer In a Directory" a list of network printers come up when I double click on the one I want I get:

"Windows cannot connect to the printer. Either the printer name was typed icorrectly, or the specified printer has lost its connection to the server."

I know it hasn't lost its connection but for some reason this user account won't allow access to install printers.

Whats strange is that on these laptops (that were ment for students) even when I log on as Administrator I still can't add printers, are there certain rights for specific computers?

I am an Administrator and want to give this specific laptop rights to install printers, is this something I do on the domain controller? What needs to be done?

Running Windows XP
Question by:DMH1083
    LVL 7

    Accepted Solution

    That error isn't indicationg a rights problem, it's indicating a communications problem.

    Make sure the DNS settings are correct and try to manually ping the printer from the laptop using the ip / dns name as specified in the printer definition on the server.

    If you look at the "ports" dialog for the printer in question on the server and hit configure port, you'll see the "Printer Name or IP address" - however this is listed must be reachible from the notebook in question.
    LVL 10

    Expert Comment

    by:Gajendra Rathod
    First please clear the ARP cache

    Go to Start|Run | netsh interface ip delete arpcache | press "Enter"

    Please try using UNC path of printer,

    Add Printer | Network Printer | Connect to this printer
    type the UNC path to the printer \\Computername\SharePrintername

    Author Comment

    I've requested that this question be deleted for the following reason:

    Figured it out, people that commented provided no answers.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Suggested Solutions

    Healthcare providers, insurance companies and other covered entities trust eFax Corporate to transmit their most sensitive documents. eFax Corporate can help your organization implement a HIPAA compliant cloud faxing solution.
    Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now