Solved

search drive

Posted on 2014-12-04
4
269 Views
Last Modified: 2015-01-02
for the longest, Users have logged into a Novell client which has mapped a search drive usually as the letter Z. I had a database which uses an executable on said drive called appload.exe. I updated the database to Access 2013, but if the search drive is absent, the database does not work. Is there an equivelent of a search drive that can be implemented in Active directory which maps the dirves (other than the Novell drives) through Group Policy?
0
Comment
Question by:geriatricgeek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 24

Expert Comment

by:NVIT
ID: 40481466
0
 
LVL 1

Author Comment

by:geriatricgeek
ID: 40481671
Mapping the drives i'm good with. My question is mapping a search drive which is a concept carryover from Novell.
0
 
LVL 24

Expert Comment

by:NVIT
ID: 40481732
Can you explain how it works?
0
 
LVL 19

Accepted Solution

by:
deroode earned 500 total points
ID: 40482562
The Novell login map s1: =z:= \\server\volume\path (map search drive) maps a drive (Z:) to a server share, *and* inserts it into the path environment variable.
You could do the same with the Windows 2003 resource kit utility Pathman (found at http://www.microsoft.com/en-us/download/details.aspx?id=17657)

Net use Z: \\server\volume
pathman /au Z:

Open in new window


PATHMAN.EXE /?

USAGE:

        /as path[;path[;path ...]]
                Adds the semicolon-separated paths to the system path.

        /au path[;path[;path ...]]
                Adds the semicolon-separated paths to the user path.

        /rs path[;path[;path ...]]
                Removes the semicolon-separated paths from the system path.

        /ru path[;path[;path ...]]
                Removes the semicolon-separated paths from the user path.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
In-place Upgrading Dirsync to Azure AD Connect
In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question