Solved

One share works the other doesn't

Posted on 2013-11-20
5
207 Views
Last Modified: 2013-11-27
Hi everyone,

I have a weird issue at a client's place.

Problem goes like this:

Machine maps two drives by on the same file server.  Call them Y: and Z:

map goes like this:

Y:\ -> \\server\mount point 1
Z:\ -> \\server\mount point 2

Both mount successfully.  Y:\ is accessible and browseable.  Z:\ is not accessible giving Network path not found.

If I map Z:\ by IP, it works.  DNS is pointing at the DC and the server user has access to the mount (set to Everyone as it's a public share on both security and sharing)

This is extremely frustrating and makes no sense to me at all from a techincal stand point.  How can Y:\ work every time and Z:\ not work?

Thanks,
Chris
0
Comment
Question by:ottcomputing
  • 3
  • 2
5 Comments
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39665001
Sounds to me like there are stale credentials bound to the "\\server\mount point 2" location.

Have a read of http://serverfault.com/questions/213765/how-do-i-remove-login-credentials-for-a-network-location-in-win7.
You can push this change as part of a logon script.

Cheers
Andrew
0
 
LVL 1

Author Comment

by:ottcomputing
ID: 39667105
If that is the case, how come when I mount it (a la net use z: "\\server\mount point 2") it gives command successful and then when I try to browse it it gives network location not found?
0
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39667979
Try removing the share and then re-creating.

Cheers
Andrew
0
 
LVL 1

Accepted Solution

by:
ottcomputing earned 0 total points
ID: 39670382
I replaced the computer and it works perfectly.  I am going to banish this problem into the abyss.
0
 
LVL 1

Author Closing Comment

by:ottcomputing
ID: 39680261
The problem was not resolved directly, but replacing the offending machine seems to have solved the issue.  I am assuming the image was broken in some way.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
When you upgrade from Windows 8 to 8.1 or to Windows 10 or if you are like me you are on the Insider Program you may find yourself with many 450MB recovery partitions.  With a traditional disk that may not be a problem but with relatively smaller SS…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now