Solved

Mapped Drives in a user profile

Posted on 2014-01-24
5
323 Views
Last Modified: 2014-01-24
Is there any easy way to search the registry or use a remote power shell GET command to detect the mapped drive of a users profile?  (Even if created by them and not in the login script.)

I do not want to use user state migration and rest their password,  or access their pc.  

The question management asks - Can you tell where a user has drive mappings without getting on their pc, or resetting their password.

I was thinking DUMPsec but not sure if it would pick up user defined maps.

Thanks in advance.
0
Comment
Question by:PostQ
  • 2
  • 2
5 Comments
 
LVL 13

Accepted Solution

by:
lciprianionut earned 500 total points
ID: 39806708
Hi, maybe this link can be a point of start for what are you looking for.
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 39806735
I haven't tried the above suggestion, although a brief look suggests it is a good one, but have you tried using LUSER from safetoland.com?
0
 
LVL 2

Author Closing Comment

by:PostQ
ID: 39806809
I think this will work fine.

User Solution 2 goes to a photog site  - Thanks
0
 
LVL 27

Expert Comment

by:Thomas Zucker-Scharff
ID: 39807267
I noticed that. The site is correct, but he may have stopped hosting the download.  If you still want it I can send it.
0
 
LVL 2

Author Comment

by:PostQ
ID: 39807506
The first solution worked well but thank you anyway.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question