Solved

One share works the other doesn't

Posted on 2013-11-20
5
206 Views
Last Modified: 2013-11-27
Hi everyone,

I have a weird issue at a client's place.

Problem goes like this:

Machine maps two drives by on the same file server.  Call them Y: and Z:

map goes like this:

Y:\ -> \\server\mount point 1
Z:\ -> \\server\mount point 2

Both mount successfully.  Y:\ is accessible and browseable.  Z:\ is not accessible giving Network path not found.

If I map Z:\ by IP, it works.  DNS is pointing at the DC and the server user has access to the mount (set to Everyone as it's a public share on both security and sharing)

This is extremely frustrating and makes no sense to me at all from a techincal stand point.  How can Y:\ work every time and Z:\ not work?

Thanks,
Chris
0
Comment
Question by:ottcomputing
  • 3
  • 2
5 Comments
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39665001
Sounds to me like there are stale credentials bound to the "\\server\mount point 2" location.

Have a read of http://serverfault.com/questions/213765/how-do-i-remove-login-credentials-for-a-network-location-in-win7.
You can push this change as part of a logon script.

Cheers
Andrew
0
 
LVL 1

Author Comment

by:ottcomputing
ID: 39667105
If that is the case, how come when I mount it (a la net use z: "\\server\mount point 2") it gives command successful and then when I try to browse it it gives network location not found?
0
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39667979
Try removing the share and then re-creating.

Cheers
Andrew
0
 
LVL 1

Accepted Solution

by:
ottcomputing earned 0 total points
ID: 39670382
I replaced the computer and it works perfectly.  I am going to banish this problem into the abyss.
0
 
LVL 1

Author Closing Comment

by:ottcomputing
ID: 39680261
The problem was not resolved directly, but replacing the offending machine seems to have solved the issue.  I am assuming the image was broken in some way.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now