I know there are several ways to map a drive letter to a networked resource in a Windows environment. What I would like to know is how to quickly determine the means for which each mapped drive is being mapped.
Many of our users have up to 15 mapped drives. After a few hours of searching I've learned that some of those drives are mapped via Group Policies while others are mapped via scripts. But there are still others that I cannot figure out the source that is automatically mapping those drives for them.
How do I identify the method that is mapping one or more drives (e.g. Group Policy, Script, etc.)? If it's a Group Policy, which one? If it's a script, which one and from where? Thanks.
Ah, sounds like an ex-NetWare shop. They were always fond of drive letters.
Windows doesn't track where they come from, unfortunately, so you're left with the forensic task of looking at everything that can cause a script to be mapped. That's a long slog, and I feel for you. There are many:
For tracking GPOs, the way that works for me is to:
That'll give you a big start on the source of the drive-mappings that's coming from automation you manage. You can't do much about stuff users do themselves, some never clear the "remember this mapping" button.
Another reply to an old thread. In my case, after much Sherlock Holmes'ing, I found they were mapping a drive by adding a line to the USRLOGON.CMD file (standard in every Terminal Services/Remote Desktop Services installation), which is executed every time a user logs on. Hope that helps some people.
Just a thought (old thread, but I found it so others might too) - the "Home Folder" drive is normally mapped through the "Profile" tab in the Properties window for each User in AD Users and Computers. If new AD User accounts are created by copying a template account, the username part of the Home Folder path is automagically renamed to the target username on copying the template user.
Hope this helps.