This forum has migrated to Microsoft Q&A. Za I'm not entirely sure of your most recent question, butI will warn you about using something other than a Local Path. Turn off the display of thumbnails and only display icons. For example - redirect "My Documents" but leave "My Music" local. launch a command prompt, which should start with the home folder you configured being the current directory.. the local path is made for a domain user on a specific machine, where she/he always logon,instead using network shared folders. Interestingly this happens even when a folder does get created for the user. Block launching desktop apps associated with a file. In this context, by "home directory" or "home folder" Windows just means a location, usually on the network, where users can choose to put their files; I believe the terminology dates all the way back to DOS, before there was such a thing as a user profile or a Documents folder. Keep favorites in sync between Internet Explorer and Microsoft Edge, Prevent access to the about:flags page in Microsoft Edge, Prevent bypassing Windows Defender SmartScreen prompts for files, Prevent bypassing Windows Defender SmartScreen prompts for sites, Prevent changes to Favorites on Microsoft Edge, Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start, Prevent Microsoft Edge from starting and loading the Start and New Tab page at Windows startup and each time Microsoft Edge is closed, Prevent the First Run webpage from opening on Microsoft Edge, Prevent using Localhost IP address for WebRTC, Send all intranet sites to Internet Explorer 11, Show message when opening sites in Internet Explorer, Suppress the display of Edge Deprecation Notification, Allow companion device for secondary authentication, Microsoft Office 365 SharePoint Designer 2013, Ping the settings storage location before sync, Sync settings over metered connections even when roaming, Use User Experience Virtualization (UE-V), Prevent OneDrive files from syncing over metered connections, Prevent OneDrive from generating network traffic until the user signs in to OneDrive, Prevent the usage of OneDrive for file storage, Prevent the usage of OneDrive for file storage on Windows 8.1, Don't launch privacy settings experience on user logon, Make Parental Controls control panel visible on a Domain, Allow hibernate (S4) when starting from a Windows To Go workspace, Disallow standby sleep states (S1-S3) when starting from a Windows to Go workspace, Allow RDP redirection of other supported RemoteFX USB devices from this computer, Allow .rdp files from valid publishers and user's default .rdp settings, Configure server authentication for client, Do not allow hardware accelerated decoding, Prompt for credentials on the client computer, Specify SHA1 thumbprints of certificates representing trusted .rdp publishers, Do not use Remote Desktop Session Host server IP address when virtual IP address is not available, Select the network adapter to be used for Remote Desktop IP Virtualization, Turn off Windows Installer RDS Compatibility, Allow users to connect remotely by using Remote Desktop Services, Deny logoff of an administrator logged in to the console session, Restrict Remote Desktop Services users to a single Remote Desktop Services session, Set rules for remote control of Remote Desktop Services user sessions, Suspend user sign-in to complete app registration, Allow audio and video playback redirection, Do not allow smart card device redirection, Do not allow supported Plug and Play device redirection, Hide notifications about RD Licensing problems that affect the RD Session Host server, Use the specified Remote Desktop license servers, Do not set default client printer to be default printer in a session, Specify RD Session Host server fallback printer driver behavior, Use Remote Desktop Easy Print printer driver first, Limit the size of the entire roaming user profile cache, Set path for Remote Desktop Services Roaming User Profile, Set Remote Desktop Services User Home Directory, Use mandatory profiles on the RD Session Host server, Configure RD Connection Broker server name, Optimize visual experience for Remote Desktop Service Sessions, Optimize visual experience when using RemoteFX, Allow desktop composition for remote desktop sessions, Configure H.264/AVC hardware encoding for Remote Desktop Connections, Configure image quality for RemoteFX Adaptive Graphics, Enable RemoteFX encoding for RemoteFX clients designed for Windows Server 2008 R2 SP1, Enforce Removal of Remote Desktop Wallpaper, Prioritize H.264/AVC 444 graphics mode for Remote Desktop Connections, Remove "Disconnect" option from Shut Down dialog, Remove Windows Security item from Start menu, Use advanced RemoteFX graphics for RemoteApp, Use hardware graphics adapters for all Remote Desktop Services sessions, Use the hardware default graphics adapter for all Remote Desktop Services sessions, Use WDDM graphics display driver for Remote Desktop Connections, Always prompt for password upon connection, Do not allow local administrators to customize permissions, Require use of specific security layer for remote (RDP) connections, Require user authentication for remote connections by using Network Level Authentication, Server authentication certificate template, Set time limit for active but idle Remote Desktop Services sessions, Set time limit for active Remote Desktop Services sessions, Set time limit for logoff of RemoteApp sessions, Prevent automatic discovery of feeds and Web Slices, Prevent subscribing to or deleting a feed or a Web Slice, Turn off background synchronization for feeds and Web Slices, Turn on Basic feed authentication over HTTP, Force TIFF IFilter to perform OCR for every page in a TIFF document, Allow Cortana Page in OOBE on an AAD account, Always use automatic language detection when indexing content and properties, Don't search the web or display web results in Search, Don't search the web or display web results in Search over metered connections, Do not allow locations on removable drives to be added to libraries, Enable indexing of online delegate mailboxes, Enable indexing uncached Exchange folders, Enable throttling for online mail indexing, Prevent adding UNC locations to index from Control Panel, Prevent adding user-specified locations to the All Locations menu, Prevent automatically adding shared folders to the Windows Search index, Prevent clients from querying the index remotely, Prevent customization of indexed locations in Control Panel, Prevent indexing files in offline files cache, Prevent indexing Microsoft Office Outlook, Prevent indexing when running on battery power to conserve energy, Prevent the display of advanced indexing options for Windows Search in the Control Panel, Prevent unwanted iFilters and protocol handlers, Set large or small icon view in desktop search results, Stop indexing in the event of limited hard drive space, Turn on Security Center (Domain PCs only), Timeout for hung logon sessions during shutdown, Turn off legacy remote shutdown interface, Allow certificates with no extended key usage certificate attribute, Allow ECC certificates to be used for logon and authentication, Allow Integrated Unblock screen to be displayed at the time of logon, Display string when smart card is blocked, Force the reading of all certificates from the smart card, Notify user of successful smart card driver installation, Prevent plaintext PINs from being returned by Credential Manager, Reverse the subject name stored in a certificate when displaying, Turn on certificate propagation from smart card, Turn on root certificate propagation from smart card, Control Device Reactivation for Retail devices, Turn off KMS Client Online AVS Validation, Only display the private store within the Microsoft Store, Turn off Automatic Download and Install of updates, Turn off Automatic Download of updates on Win8 machines, Turn off the offer to update to the latest version of Windows, Do not allow printing to Journal Note Writer, For tablet pen input, don't show the Input Panel icon, For touch input, don't show the Input Panel icon, Include rarely used Chinese, Kanji, or Hanja characters, Turn off AutoComplete integration with Input Panel, Turn off password security in Input Panel, Turn off tolerant and Z-shaped scratch-out gestures, Hide Advanced Properties Checkbox in Add Scheduled Task Wizard, Allow uninstallation of language features when a language is uninstalled, Prohibit installing or uninstalling color profiles, Allow Corporate redirection of Customer Experience Improvement uploads, Tag Windows Customer Experience Improvement data with Study Identifier, Configure Corporate Windows Error Reporting, List of applications to always report errors for, List of applications to never report errors for, Automatically send memory dumps for OS-generated error reports, Prevent display of the user interface for critical errors, Send additional data when on battery power, Send data when on connected to a restricted/costed network, Enables or disables Windows Game Recording and Broadcasting, Allow enumeration of emulated smart card for all users, Use certificate for on-premises authentication, Use cloud trust for on-premises authentication, Use Windows Hello for Business certificates as smart card certificates, Allow suggested apps in Windows Ink Workspace, Allow users to browse for source while elevated, Allow users to use media source while elevated, Control maximum size of baseline file cache, Prevent Internet Explorer security prompt for Windows Installer scripts, Prevent users from using Windows Installer to install updates and upgrades, Prohibit non-administrators from applying vendor signed updates, Save copies of transform files in a secure location on workstation, Specify the types of events Windows Installer records in its transaction log, Turn off creation of System Restore checkpoints, Configure the mode of automatically signing in and locking last interactive user after a restart or cold boot, Disable or enable software Secure Attention Sequence, Display information about previous logons during user logon, Report when logon server was not available during user logon, Sign-in and lock last interactive user automatically after a restart, Prevent Windows Media DRM Internet Access, Prevent Quick Launch Toolbar Shortcut Creation, Do not automatically start Windows Messenger initially, Set the default source path for Update-Help, Allow remote server management through WinRM, Disallow WinRM from storing RunAs credentials, Specify channel binding token hardening level, Specify maximum amount of memory in MB per Shell, Specify maximum number of processes per Shell, Specify maximum number of remote shells per user, Hide the Device performance and health area, Hide the Security processor (TPM) troubleshooter page. How can one check whether tax money is being effectively used by the government for improving a nation? Recently however, we've run into problems with software that uses the HOMEDRIVE and HOMEPATH that uses those environmental variables to install portions of it's software to. What happens? Configure Microsoft Defender Application Guard clipboard settings, Configure Microsoft Defender Application Guard print settings, Prevent enterprise websites from loading non-enterprise content in Microsoft Edge and Internet Explorer, Turn on Microsoft Defender Application Guard in Managed Mode, Use a common set of exploit protection settings, Allow Address bar drop-down list suggestions, Allow configuration updates for the Books Library, Allow extended telemetry for the Books tab, Allow Microsoft Edge to pre-launch at Windows startup, when the system is idle, and each time Microsoft Edge is closed, Allow Microsoft Edge to start and load the Start and New Tab page at Windows startup and each time Microsoft Edge is closed, Always show the Books Library in Microsoft Edge, Configure search suggestions in Address bar, Configure the Adobe Flash Click-to-Run setting. Allow Secure Boot for integrity validation, Choose how BitLocker-protected operating system drives can be recovered, Configure pre-boot recovery message and URL, Configure TPM platform validation profile (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2), Configure TPM platform validation profile for BIOS-based firmware configurations, Configure TPM platform validation profile for native UEFI firmware configurations, Configure use of hardware-based encryption for operating system drives, Configure use of passwords for operating system drives, Disallow standard users from changing the PIN or password, Enable use of BitLocker authentication requiring preboot keyboard input on slates, Enforce drive encryption type on operating system drives, Require additional authentication at startup (Windows Server 2008 and Windows Vista), Require additional authentication at startup, Reset platform validation data after BitLocker recovery, Use enhanced Boot Configuration Data validation profile, Allow access to BitLocker-protected removable data drives from earlier versions of Windows, Choose how BitLocker-protected removable drives can be recovered, Configure use of hardware-based encryption for removable data drives, Configure use of passwords for removable data drives, Configure use of smart cards on removable data drives, Control use of BitLocker on removable drives, Deny write access to removable drives not protected by BitLocker, Enforce drive encryption type on removable data drives, Choose default folder for recovery password, Choose drive encryption method and cipher strength (Windows 8, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows 10 [Version 1507]), Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later), Choose drive encryption method and cipher strength (Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2), Choose how users can recover BitLocker-protected drives (Windows Server 2008 and Windows Vista), Disable new DMA devices when this computer is locked, Provide the unique identifiers for your organization, Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista), Validate smart card certificate usage rule compliance, Do not display the password reveal button, Enumerate administrator accounts on elevation, Prevent the use of security questions for local accounts, Require trusted path for credential entry, Allow device name to be sent in Windows diagnostic data, Configure Authenticated Proxy usage for the Connected User Experience and Telemetry service, Configure collection of browsing data for Desktop Analytics, Configure Connected User Experiences and Telemetry, Configure diagnostic data upload endpoint for Desktop Analytics. Define the number of days after which a catch-up security intelligence update is required, Define the number of days before spyware security intelligence is considered out of date, Define the number of days before virus security intelligence is considered out of date, Define the order of sources for downloading security intelligence updates, Initiate security intelligence update on startup, Specify the day of the week to check for security intelligence updates, Specify the interval to check for security intelligence updates, Specify the time to check for security intelligence updates, Turn on scan after security intelligence update, Specify threat alert levels at which default action should not be taken when detected, Specify threats upon which default action should not be taken when detected, Allow antimalware service to remain running always, Allow antimalware service to startup with normal priority, Configure detection for potentially unwanted applications, Configure local administrator merge behavior for lists, Define proxy auto-config (.pac) for connecting to the network, Define proxy server for connecting to the network, Allow auditing events in Microsoft Defender Application Guard, Allow camera and microphone access in Microsoft Defender Application Guard, Allow data persistence for Microsoft Defender Application Guard, Allow files to download and save to the host operating system from Microsoft Defender Application Guard, Allow hardware-accelerated rendering for Microsoft Defender Application Guard, Allow Microsoft Defender Application Guard to use Root Certificate Authorities from the user's device, Allow users to trust files that open in Windows Defender Application Guard. Those files can roam around on any computer within the domain where user login. This topic has been locked by an administrator and is no longer open for commenting. If you choose "On the local computer," enter a local path (for example, C:\HomeFolder) in the Path box. I am trying to get out in front of my IT Department. Chrave Information Technology is an IT service provider. It only takes a minute to sign up. Do not prompt for client certificate selection when no certificates or only one certificate exists. I have always, across the majority of networks I've been in charge of, connected the Home folder in AD to a network share
I'm currently in the decision making process of whether I want to change the environmental variables in a post processing logon script for those individuals with this software, or if I want to just change the Home Folder option to a local destination in
When done click Add, Step 6: Search domain users by using Check Names button. Change Group Policy processing to run asynchronously when a slow network connection is detected. What is the highest-level spell that can be cast without a spell slot an unlimited number of times? Disable showing balloon notifications as toasts. Limit Enhanced diagnostic data to the minimum required by Windows Analytics, Allow uploads while the device is on battery while under set Battery level (percentage), Delay Background download Cache Server fallback (in seconds), Delay background download from http (in secs), Delay Foreground download Cache Server fallback (in seconds), Delay Foreground download from http (in secs), Enable Peer Caching while the device connects via VPN, Maximum Background Download Bandwidth (in KB/s), Maximum Background Download Bandwidth (percentage), Maximum Foreground Download Bandwidth (in KB/s), Maximum Foreground Download Bandwidth (percentage), Minimum disk size allowed to use Peer Caching (in GB), Minimum Peer Caching Content File Size (in MB), Minimum RAM capacity (inclusive) required to enable use of Peer Caching (in GB), Select a method to restrict Peer Selection, Set Business Hours to Limit Background Download Bandwidth, Set Business Hours to Limit Foreground Download Bandwidth. The significance of home folder has considerably diminished sinceits when this concept was first introduced. So many reasons, but the one we're going with today is SysAdmin Day! Do not turn off system power after a Windows system shutdown has occurred. The Earth is teleported into interstellar space for 5 minutes. Configure Applications preference extension policy processing, Configure Data Sources preference extension policy processing, Configure Devices preference extension policy processing, Configure Direct Access connections as a fast network connection, Configure Drive Maps preference extension policy processing, Configure Environment preference extension policy processing, Configure Files preference extension policy processing, Configure Folder Options preference extension policy processing, Configure folder redirection policy processing, Configure Folders preference extension policy processing, Configure Group Policy slow link detection, Configure Ini Files preference extension policy processing, Configure Internet Explorer Maintenance policy processing, Configure Internet Settings preference extension policy processing, Configure Local Users and Groups preference extension policy processing, Configure Network Options preference extension policy processing, Configure Network Shares preference extension policy processing, Configure Power Options preference extension policy processing, Configure Printers preference extension policy processing, Configure Regional Options preference extension policy processing, Configure Registry preference extension policy processing, Configure Scheduled Tasks preference extension policy processing, Configure Services preference extension policy processing, Configure Shortcuts preference extension policy processing, Configure software Installation policy processing, Configure Start Menu preference extension policy processing, Configure user Group Policy loopback processing mode, Configure web-to-app linking with app URI handlers, Determine if interactive users can generate Resultant Set of Policy data, Enable AD/DFS domain controller synchronization during policy refresh, Remove users' ability to invoke machine policy refresh, Set Group Policy refresh interval for computers, Set Group Policy refresh interval for domain controllers, Specify startup policy processing wait time, Specify workplace connectivity wait time for policy processing, Turn off background refresh of Group Policy, Turn off Group Policy Client Service AOAC optimization, Turn off Local Group Policy Objects processing, Turn off access to all Windows Update features, Turn off Automatic Root Certificates Update, Turn off downloading of print drivers over HTTP, Turn off handwriting personalization data sharing, Turn off handwriting recognition error reporting, Turn off Help and Support Center "Did you know?"
Sitemap 13