Bobcares

Map Network Drives or Shared Folders with Group Policy

by | Mar 26, 2021

Wondering how to map network drives or shared folders with Group Policy? We can help you.

We can use Group Policies to map shared network folders flexibly from SMB file servers as separate Windows network drives. Initially, .bat logon scripts containing ‘net use M: \\ro-fs01\sharename’ commands were used to map network drives in Windows.

When we map a network drive, it looks like a new drive under This PC in File Explorer, allowing us to quickly access the shared files we need.

Here at Bobcres, we map network drives or shared folders with Group Policy for our customers as apart of our Server Management Services. Today let’s see the steps that our Support Engineers follow for this mapping.

Advantages of Mapping Drives or Shared Folders with Group Policy

Group Policies are flexible, faster, and can also get updated in the background. It is very easy as it requires no scripting experience.

Furthermore, it helps to speed up the user login process. Also, there is no need to reboot a computer or log off to map network drives via Group Policy.

Following are some of the advantages of using group policy:

  1. Firstly, they are much easier than logon scripts. Checkboxes and drop-down lists, no need to understand scripting.
  2.  It is scalable, as big as our Active Directory will grow logon scripts will scale no problem.
  3. Also, it is very flexible. With item-level targeting, we can target groups, users, OUs, operating systems, and so on.

The support of network drive mapping in GPO appeared in Windows Server 2008.

Steps to Map Network Drive or Shared Folders with Group Policy

Here we will see how to map a department shared network folder automatically based on AD security groups and users’ personal network drives.

1. Creating a new security group for a Marketing department in Active Directory.

We will create a new security group for a Marketing department in AD and add the employee accounts to it.

We can create and fill the group using the graphic ADUC console (dsa.msc) or use the PowerShell cmdlets to manage AD groups.

Using the following command we can do this:

New-ADGroup “IT-Marketing” -path ‘OU=Groups,OU=Rome,OU=IT,dc=bobcares,DC=com’ -GroupScope Global -PassThru –Verbose
Add-AdGroupMember -Identity IT-Marketing -Members b.bob, k.kevin, a.arthur, m.michael

2. Creating a GPO to map the shared folder as a network drive.

We can do this using the following steps:

1. Firstly, open the Group Policy Management Console (gpmc.msc) to manage the domain GPO.

2. Then create a new GPO and link it to the user account OU, then select Edit.

3. After that Go to User Configuration and take Preferences

4. From there go to Windows Settings and take Drive Maps.

5. Now create a new policy setting: New -> Mapped Drive

4. In the General tab, specify the following connection settings for our network drive:

a. Action: Update (this mode is used the most often)
b. Location: a UNC path to the shared folder you want to connect
c. Label as: a drive label
d. Reconnect: makes a network drive permanent (it will be reconnected every time we log in, even if we remove the policy. There is a /persistent analog option in net use)
e. Drive Letter: assign a drive letter for the shared folder
f. Connect as: this option is not available now since Microsoft currently does not allow storing passwords in Group Policy settings.

5. After that Go to the Common tab, check the Run in logged-on users’ security context and Item-level Targeting options. Then click Targeting.

6. Here we will specify that this policy must be applied only to the members of the AD security group created earlier. Select New Item -> Security Group -> our group name
7. Finally, save the changes

8. Once the GPO is updated the mapped network drive will be available in File Explorer and other programs appears in the user session.

3. Using Group Policy to Map a Drive for Individual Users

We can do this using the following steps:

1.  Firstly create another policy rule to map personal network folders of the users as network drives.

Suppose, we have a file server where personal user folders are stored. And we want these folders to be automatically mounted as network drives in user sessions during logon.

2. We will create a separate folder for each user matching their AD names (sAMAccountName) and assign the corresponding NTFS permissions.

3. Then create another drive mapping rule in the same GPO.

4. After that we can specify the path to the shared folder with user personal folders as \\ro-fs01\shared\home\%LogonUser%. Let us set %LogonUser% – Personal as a drive label.

5. For displaying the full list of environment variables available in GPP  we can press F3.

6. Finally, save the changes and update the group policy settings on user computers using the following command:

gpudate /force

Now the users will be able to see their personal folders from a file server mapped as network drives. Also, they will be able to store their personal data on them. The network drive will be mapped on any computer a user is logged on to.

[Need Assistance? We are available 24*7]

Conclusion

In short, we saw how our Support Engineers map network drives or shared folders with Group Policy.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF