?
Solved

Network drives mapping

Posted on 2014-01-24
2
Medium Priority
?
513 Views
Last Modified: 2014-01-27
Hi all

Hope someone can help! I have inherited a bit a weird issue,

Basically we have a DR site and when the link is broken (for a test), when logging on servers they hang failing to load windows explorer, server manager will load so we can browse to the C: drive, cmd then start explorer.

We believe it is the network drives that are mapped, as when these are removed and the user logs back in explorer loads instantly without issue,

One of the network drives points back to a network share at our head office which is causing the hang

I have tried to find what is forcing the mapped drives for any new users/profiles logging onto the server, I have made sure there are no login scripts, gpo's applied and even disabled mapped drives within a gpo but it still maps the drives for new users.

Any ideas would be grateful!

Thanks
0
Comment
Question by:mike_jmc
2 Comments
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 1500 total points
ID: 39806453
The places scripts can map from are below...
- Profile Tab in active directory
- Netlogon Folder
- GPO

When you login to the server check what drives are mapped
- Open cmd
- type: net use

You should also run rsop.msc and check to see what GPO's are being applied to the user and or computer. From there check the gpo's to make sure that no scripts are being pushed to that machine.

Will.
0
 
LVL 99

Expert Comment

by:John Hurst
ID: 39806492
Turn Persistence OFF to the network share in question.

NET USE Z: /Delete  (where Z is the network share)

NET USE /PERSISTENCE:NO

Perhaps use a NET USE Z: /Delete in the script before mapping to ensure the map dies when you log off.

.... Thinkpads_User
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Suggested Courses

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question