Solved

Windows Explorer in Windows 2012 RDS environment.

Posted on 2016-08-17
2
54 Views
Last Modified: 2016-10-10
We have a Windows 2012 RDS environment. We do not want our users to see the desktop, documents, downloads, music, pictures and videos folders when they launch the published apps and click FILE>OPEN.

We follow this link http://carlwebster.com/removing-desktop-documents-downloads-music-pictures-and-videos-folders-from-navigation-pane/ and remove the below folders in
HKLM\SOFTWARE\Microsoft\Windows\Current Version\explorer\MyComputer\NameSpace


Desktop Folder – {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
Documents Folder – {A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}
Downloads Folder – {374DE290-123F-4565-9164-39C4925E467B}
Music Folder – {1CF1260C-4DD0-4ebb-811F-33C572699FDE}
Pictures Folder – {3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}
Videos Folder – {A0953C92-50DC-43bf-BE83-3742FED03C9C}

From the application's FILE>OPEN of the users, we are still seeing DESKTOP, DOWNLOADS, Recent places under "FAVORITES".  Anyone knows how to hide this too?

We do not see the above folders under "This PC" which is good.  

Thanks.
Window-Explorer-in-RDS.png
0
Comment
Question by:nav2567
2 Comments
 
LVL 38

Accepted Solution

by:
Adam Brown earned 500 total points
ID: 41760371
That's the Favorites menu in Windows Explorer. http://www.techrepublic.com/blog/windows-and-office/remove-favorites-from-windows-explorer-in-windows-7/ has a guide on removing it.
0
 

Expert Comment

by:Svein Tore Finnset
ID: 41836897
To remove the user folders from the save / open. Delete the same GUIDs from the following subkey:
("Wow6432Node")


HKLM\SOFTWARE\Microsoft\Wow6432Node\Windows\Current Version\explorer\MyComputer\NameSpace

Desktop Folder – {B4BFCC3A-DB2C-424C-B029-7FE99A87C641}
Documents Folder – {A8CDFF1C-4878-43be-B5FD-F8091C1C60D0}
Downloads Folder – {374DE290-123F-4565-9164-39C4925E467B}
Music Folder – {1CF1260C-4DD0-4ebb-811F-33C572699FDE}
Pictures Folder – {3ADD1653-EB32-4cb0-BBD7-DFA0ABB5ACCA}
Videos Folder – {A0953C92-50DC-43bf-BE83-3742FED03C9C}
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

#Citrix #XenApp #Citrix Scout #Citrix Insight Services #Microsoft VMMAP #Microsoft ADEXPLORE #Microsoft RAMMAP #Microsoft TCPVIEW #Microsoft AUTORUNS #Microsoft PROCESS EXPLORER #Microsoft PROCESS MONITOR
What to do when Windows Update is not working correctly? What tools can I use to detect the cause of the malfunction problem? What does this numeric error code mean? These and other questions that you have been asking in the past are answered here (…
In this Micro Tutorial viewers will learn how they can get their files copied out from their unbootable system without need to use recovery services. As an example non-bootable Windows 2012R2 installation is used which has boot problems.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now