Solved

search drive

Posted on 2014-12-04
4
211 Views
Last Modified: 2015-01-02
for the longest, Users have logged into a Novell client which has mapped a search drive usually as the letter Z. I had a database which uses an executable on said drive called appload.exe. I updated the database to Access 2013, but if the search drive is absent, the database does not work. Is there an equivelent of a search drive that can be implemented in Active directory which maps the dirves (other than the Novell drives) through Group Policy?
0
Comment
Question by:geriatricgeek
  • 2
4 Comments
 
LVL 23

Expert Comment

by:NVIT
ID: 40481466
0
 
LVL 1

Author Comment

by:geriatricgeek
ID: 40481671
Mapping the drives i'm good with. My question is mapping a search drive which is a concept carryover from Novell.
0
 
LVL 23

Expert Comment

by:NVIT
ID: 40481732
Can you explain how it works?
0
 
LVL 19

Accepted Solution

by:
deroode earned 500 total points
ID: 40482562
The Novell login map s1: =z:= \\server\volume\path (map search drive) maps a drive (Z:) to a server share, *and* inserts it into the path environment variable.
You could do the same with the Windows 2003 resource kit utility Pathman (found at http://www.microsoft.com/en-us/download/details.aspx?id=17657)

Net use Z: \\server\volume
pathman /au Z:

Open in new window


PATHMAN.EXE /?

USAGE:

        /as path[;path[;path ...]]
                Adds the semicolon-separated paths to the system path.

        /au path[;path[;path ...]]
                Adds the semicolon-separated paths to the user path.

        /rs path[;path[;path ...]]
                Removes the semicolon-separated paths from the system path.

        /ru path[;path[;path ...]]
                Removes the semicolon-separated paths from the user path.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
The recent Microsoft changes on update philosophy for Windows pre-10 and their impact on existing WSUS implementations.
In this Micro Tutorial viewers will learn how to use Boot Corrector from Paragon Rescue Kit Free to identify and fix the boot problems of Windows 7/8/2012R2 etc. As an example is used Windows 2012R2 which lost its active partition flag (often happen…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now