title
Setting Up Roaming Profiles in Windows Server 2012

description
Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 22, 2013 Length of Class: 17:47 Research Assistance: Tracks Windows Server 2012 Prerequisites Comfortable working in the Windows Server 2012 Environment Be able to create User Accounts Be able to Share Folders on Windows Server 2012 Purpose of Class This class introduces students to Roaming Profiles in a Windows Server Environment. Class Notes Roaming Profiles allow users to be able to log into different machines and automatically be give their own Profile Shared Profile Folder can be on any File Server on the Network, but for small to medium sized environments it is usually on the Domain Controller. If network connection is down you will use the cached profile from the last time you logged in. Profiles encompass: files, folders, settings. Applications/ Programs must be installed locally on each machine.. Steps: Create a Share on Your Server called PROFILES and share is with Everyone with Read/ Write Permission Create New User (If Needed) Open User Profile Go to Profile Tab Type in Profile Path \\SERVERNAME\profile\%username% (Substitute SERVERNAME with your Server's Name) Login to a computer with User Account that will be made Roaming Profile in PROFILES folder will be automatically created. Caution Profile Information gets Cached on Local Machine (Hacking Vector) Cached Profiles take up hard drive space Corrections Lab Setup Used in Demonstration The ETCG Host Computer Specs are: ASUS Model: CM6870US01 16 GB of RAM 1 TB 7200 RPM Hard Drive i7 3.4 GHz Intel Processor Windows Server 2012 Virtual Machine AD, DNS, and DHCP ETCG.com Domain Created Internal Network Connection in VirtualBox 2 Windows 8 Virtual Machines Both machines are members of ETCG.com domain Internal Network Connection in VirtualBox Study Guide Resources http://technet.microsoft.com/en-us/library/jj649079.aspx

detail
{'title': 'Setting Up Roaming Profiles in Windows Server 2012', 'heatmap': [{'end': 727.451, 'start': 548.048, 'weight': 0.721}], 'summary': 'Covers the implementation of roaming profiles in windows server 2012, emphasizing benefits such as consistent user settings and configurations, preventing financial losses, and setting up roaming profiles on windows 8 with practical examples and real-world application considerations.', 'chapters': [{'end': 442.709, 'segs': [{'end': 127.995, 'src': 'embed', 'start': 103.473, 'weight': 4, 'content': [{'end': 110.977, 'text': "Well, if they only have local profiles, when they sit down at that other computer on the network, they're going to get a default configuration.", 'start': 103.473, 'duration': 7.504}, {'end': 117.504, 'text': "So, whatever the Windows default configuration is, you know the Windows default background they won't have any other files.", 'start': 111.138, 'duration': 6.366}, {'end': 119.947, 'text': "they won't have any other folders, they won't have any other settings.", 'start': 117.504, 'duration': 2.443}, {'end': 127.995, 'text': 'Why? All of their profile information is stored locally on the computer that they logged into originally.', 'start': 120.067, 'duration': 7.928}], 'summary': 'Local profiles result in default configuration on other network computers.', 'duration': 24.522, 'max_score': 103.473, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg103473.jpg'}, {'end': 181.519, 'src': 'embed', 'start': 148.389, 'weight': 0, 'content': [{'end': 152.611, 'text': 'i will get the background setting that i configured over here.', 'start': 148.389, 'duration': 4.222}, {'end': 155.033, 'text': 'i will have all my files, i will have all my folders.', 'start': 152.611, 'duration': 2.422}, {'end': 156.854, 'text': 'i will have all my configurations.', 'start': 155.033, 'duration': 1.821}, {'end': 167.571, 'text': 'So what Roaming Profiles allows is it allows you to sit down at any computer on the network and always be presented with your customized profile.', 'start': 157.205, 'duration': 10.366}, {'end': 170.553, 'text': 'So this is a really, really, really useful tool.', 'start': 167.891, 'duration': 2.662}, {'end': 181.519, 'text': 'The big place that Roaming Profiles are used is in things like call center environments where you truly have COG employees.', 'start': 170.933, 'duration': 10.586}], 'summary': 'Roaming profiles enable access to customized profiles on any network computer, a valuable tool for call center environments with contract employees.', 'duration': 33.13, 'max_score': 148.389, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg148389.jpg'}, {'end': 275.829, 'src': 'embed', 'start': 229.054, 'weight': 1, 'content': [{'end': 238.386, 'text': 'Basically, your call center employees can sit down at any one of those 1, 000 different computers and they will get their own customized profile.', 'start': 229.054, 'duration': 9.332}, {'end': 245.691, 'text': 'they can make modifications, and when they sit down at a different computer, all of those changes will follow them.', 'start': 238.806, 'duration': 6.885}, {'end': 249.253, 'text': 'So the first reason you may use a roaming profile is one of those environments.', 'start': 246.011, 'duration': 3.242}, {'end': 258.66, 'text': 'The other reason a roaming profile can be very useful is when you are dealing with high power executives or very important employees.', 'start': 249.534, 'duration': 9.126}, {'end': 265.244, 'text': 'Again, our job as support engineers, as support people, is for maximum uptime.', 'start': 259, 'duration': 6.244}, {'end': 269.646, 'text': "We always want our C-level executives' computers to be working right?", 'start': 265.284, 'duration': 4.362}, {'end': 275.829, 'text': "If the C-level executives' computer is working, then they're making the company money, which helps us get paid.", 'start': 270.086, 'duration': 5.743}], 'summary': 'Roaming profiles provide customized profiles for 1,000 call center employees, ensuring seamless transition and maximum uptime, especially for c-level executives.', 'duration': 46.775, 'max_score': 229.054, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg229054.jpg'}, {'end': 372.333, 'src': 'embed', 'start': 340.874, 'weight': 5, 'content': [{'end': 343.796, 'text': 'You can sit down at any computer and you get your profile.', 'start': 340.874, 'duration': 2.922}, {'end': 352.32, 'text': 'The important thing to remember about profiles though, as I said, is profiles make up the settings, the configurations, your files and folders.', 'start': 344.076, 'duration': 8.244}, {'end': 354.842, 'text': "They don't make up applications.", 'start': 352.701, 'duration': 2.141}, {'end': 364.507, 'text': 'So Word, Outlook, PowerPoint, Angry Birds, whatever you have installed on your computer does not migrate as part of the profile.', 'start': 355.162, 'duration': 9.345}, {'end': 372.333, 'text': 'So if you sit down in a computer that has Word installed on it and you make a lot of documents, if you have a roaming profile,', 'start': 365.007, 'duration': 7.326}], 'summary': 'Profiles store settings and files, not applications. applications like word do not migrate with profiles.', 'duration': 31.459, 'max_score': 340.874, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg340874.jpg'}, {'end': 442.709, 'src': 'embed', 'start': 402.834, 'weight': 6, 'content': [{'end': 408.577, 'text': 'The reason is, is then you have the set standard same applications on every single computer.', 'start': 402.834, 'duration': 5.743}, {'end': 413.56, 'text': 'So if a user logs into any computer, they will know that they have the applications that they need.', 'start': 408.897, 'duration': 4.663}, {'end': 418.561, 'text': "So basically what I'm going to be showing you how to do today is these roaming profiles.", 'start': 414.04, 'duration': 4.521}, {'end': 419.221, 'text': "They're really cool.", 'start': 418.601, 'duration': 0.62}, {'end': 428.243, 'text': "So the way that I'm going to be showing you how to do the roaming profiles today is the age old way that we have been doing this since way back in NT 4.0 days.", 'start': 419.481, 'duration': 8.762}, {'end': 433.384, 'text': 'So you can now do roaming profiles through GPOs or group policy objects.', 'start': 428.503, 'duration': 4.881}, {'end': 438.685, 'text': "But I'm going to show you today how to do it through the simple profile path.", 'start': 433.704, 'duration': 4.981}, {'end': 442.709, 'text': "So, essentially, when you're going to be creating these roaming profiles,", 'start': 439.125, 'duration': 3.584}], 'summary': 'Demonstrating how to implement roaming profiles for seamless application access across computers.', 'duration': 39.875, 'max_score': 402.834, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg402834.jpg'}], 'start': 4.022, 'title': 'Roaming profiles implementation', 'summary': 'Covers the implementation of roaming profiles in windows server 2012, call center environments, and the standard application configuration across computers, emphasizing benefits such as consistent user settings and configurations, preventing financial losses, and the traditional profile path method.', 'chapters': [{'end': 170.553, 'start': 4.022, 'title': 'Roaming profiles in windows server 2012', 'summary': 'Discusses setting up roaming profiles in windows server 2012, emphasizing the benefits of sharing user profiles across network computers, ensuring consistent user settings and configurations.', 'duration': 166.531, 'highlights': ['Roaming profiles enable users to access their customized profile settings, files, and folders from any computer on the network, ensuring consistency and convenience. Roaming profiles allow users to maintain the same profile across network computers, ensuring access to customized settings and configurations, enhancing user convenience and productivity.', 'Local profiles only store user settings and configurations on the specific computer they were initially logged into, causing default configurations when accessed from other network computers. Local profiles restrict user settings and configurations to the specific computer they were logged into, leading to default configurations when accessed from other network computers, impacting user experience and productivity.', 'Roaming profiles facilitate the sharing of user profiles across network computers, ensuring consistent user experience and eliminating the need to reconfigure settings on each computer. Roaming profiles enable the sharing of user profiles across network computers, eliminating the need to reconfigure settings on each computer, leading to a consistent user experience and streamlined user management.']}, {'end': 321.275, 'start': 170.933, 'title': 'Roaming profiles in call center environments', 'summary': 'Discusses the use of roaming profiles in call center environments with a large number of users who do not have assigned seats, as well as the importance of roaming profiles for high-power executives to ensure maximum uptime and prevent financial losses due to computer failures.', 'duration': 150.342, 'highlights': ['Roaming profiles are essential in call center environments with a large number of users who do not have assigned seats, enabling them to access their customized profiles on any of the 1000 different computers, ensuring maximum uptime and efficiency. In call center environments, roaming profiles allow 1000 users without set desks to access their customized profiles on different computers, ensuring continuity and efficiency.', 'Roaming profiles are crucial for high-power executives, as computer failures can result in significant financial losses, making it essential to provide them with immediate access to their files and folders on another computer to ensure maximum uptime and prevent financial losses. For high-power executives, roaming profiles are critical to ensure immediate access to files and folders on another computer in case of computer failures, preventing potential financial losses.']}, {'end': 442.709, 'start': 321.955, 'title': 'Implementing roaming profiles', 'summary': 'Explains the concept of roaming profiles, highlighting their benefits and limitations, emphasizing the need for a standard application configuration across computers, and detailing the process of implementing roaming profiles using the traditional profile path method.', 'duration': 120.754, 'highlights': ['Roaming profiles allow users to access their settings, configurations, files, and folders from any computer, but do not migrate applications, such as Word, Outlook, or PowerPoint.', "It's essential to establish a standard application configuration across all computers for seamless user experience with roaming profiles.", 'The chapter details the traditional method of implementing roaming profiles through the profile path, emphasizing its continued relevance despite the availability of GPOs for the same purpose.']}], 'duration': 438.687, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg4022.jpg', 'highlights': ['Roaming profiles enable users to access their customized profile settings, files, and folders from any computer on the network, ensuring consistency and convenience.', 'Roaming profiles are essential in call center environments with a large number of users who do not have assigned seats, enabling them to access their customized profiles on any of the 1000 different computers, ensuring maximum uptime and efficiency.', 'Roaming profiles facilitate the sharing of user profiles across network computers, ensuring consistent user experience and eliminating the need to reconfigure settings on each computer.', 'Roaming profiles are crucial for high-power executives, as computer failures can result in significant financial losses, making it essential to provide them with immediate access to their files and folders on another computer to ensure maximum uptime and prevent financial losses.', 'Local profiles only store user settings and configurations on the specific computer they were initially logged into, causing default configurations when accessed from other network computers.', 'Roaming profiles allow users to access their settings, configurations, files, and folders from any computer, but do not migrate applications, such as Word, Outlook, or PowerPoint.', "It's essential to establish a standard application configuration across all computers for seamless user experience with roaming profiles.", 'The chapter details the traditional method of implementing roaming profiles through the profile path, emphasizing its continued relevance despite the availability of GPOs for the same purpose.']}, {'end': 1060.259, 'segs': [{'end': 515.072, 'src': 'embed', 'start': 442.709, 'weight': 0, 'content': [{'end': 450.357, 'text': 'the first thing that you need to do is you need to create a folder on the network that the computers will be able to access,', 'start': 442.709, 'duration': 7.648}, {'end': 454.801, 'text': 'and you need to share it with everyone with the read-write permission.', 'start': 450.357, 'duration': 4.444}, {'end': 463.944, 'text': 'So basically you create the folder so that when users log in from these different computers, the computers will be able to access the folder.', 'start': 455.638, 'duration': 8.306}, {'end': 473.031, 'text': "Then what we're going to do is in the user settings, we are going to change the profile path to point to that folder.", 'start': 464.465, 'duration': 8.566}, {'end': 482.158, 'text': "And then, when we log in, our profile will be stored on that profile, on that folder, so that, no matter what computer you're sitting at,", 'start': 473.651, 'duration': 8.507}, {'end': 484.9, 'text': 'that profile will be accessible.', 'start': 482.158, 'duration': 2.742}, {'end': 491.727, 'text': "So, when you're going to be creating the profile folder generally, I will tell you simply put it on,", 'start': 485.28, 'duration': 6.447}, {'end': 495.251, 'text': 'whatever your Active Directory domain controller server is.', 'start': 491.727, 'duration': 3.524}, {'end': 501.978, 'text': 'So if you have one Active Directory domain controller, simply put the profile folder on that server.', 'start': 495.571, 'duration': 6.407}, {'end': 507.444, 'text': "If you're dealing with small environments or mid-sized environments, That is the easiest way to go.", 'start': 501.998, 'duration': 5.446}, {'end': 515.072, 'text': "Now, if you're dealing with large environments, then you can put that profile folder on any file server on the network.", 'start': 507.464, 'duration': 7.608}], 'summary': 'Create a shared folder on the network for user profiles to ensure accessibility from different computers.', 'duration': 72.363, 'max_score': 442.709, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg442709.jpg'}, {'end': 615.045, 'src': 'embed', 'start': 585.703, 'weight': 1, 'content': [{'end': 587.524, 'text': "So you can see I've shared this.", 'start': 585.703, 'duration': 1.821}, {'end': 591.226, 'text': 'Everyone has the read write permission.', 'start': 587.844, 'duration': 3.382}, {'end': 595.788, 'text': 'So basically anybody on the network will be able to access this profiles folder.', 'start': 591.246, 'duration': 4.542}, {'end': 607.136, 'text': 'Now, when the individual profiles are created within the profiles folder, they will have more advanced security set up on them by default,', 'start': 596.288, 'duration': 10.848}, {'end': 610.46, 'text': "so that people can't simply access them willy-nilly.", 'start': 607.136, 'duration': 3.324}, {'end': 615.045, 'text': "So don't worry about the security here with the everyone with the read-write permission.", 'start': 610.88, 'duration': 4.165}], 'summary': 'Profiles folder shared with read-write permission for network access, with advanced security for individual profiles.', 'duration': 29.342, 'max_score': 585.703, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg585703.jpg'}, {'end': 732.834, 'src': 'heatmap', 'start': 548.048, 'weight': 5, 'content': [{'end': 555.59, 'text': 'So the first thing that we need to do is we need to go and we need to share or make sure the profile folder is shared.', 'start': 548.048, 'duration': 7.542}, {'end': 558.611, 'text': 'So we go down to File Explorer.', 'start': 555.95, 'duration': 2.661}, {'end': 561.572, 'text': "So I'm on the Windows 2012 server now.", 'start': 558.851, 'duration': 2.721}, {'end': 563.052, 'text': 'We go down to File Explorer.', 'start': 561.612, 'duration': 1.44}, {'end': 564.793, 'text': 'We go to Computer.', 'start': 563.472, 'duration': 1.321}, {'end': 567.574, 'text': 'we go to c drive.', 'start': 565.453, 'duration': 2.121}, {'end': 570.956, 'text': 'so this is where i have created this profiles folder.', 'start': 567.574, 'duration': 3.382}, {'end': 572.317, 'text': 'so see profiles.', 'start': 570.956, 'duration': 1.361}, {'end': 575.219, 'text': 'i created this folder and then i shared it out.', 'start': 572.317, 'duration': 2.902}, {'end': 577.82, 'text': "now let's make sure that it is in fact shared.", 'start': 575.219, 'duration': 2.601}, {'end': 581.883, 'text': "so i'm going to right click the profiles folder i go to share with.", 'start': 577.82, 'duration': 4.063}, {'end': 585.203, 'text': "I go here to specific people to see how it's shared.", 'start': 582.742, 'duration': 2.461}, {'end': 587.524, 'text': "So you can see I've shared this.", 'start': 585.703, 'duration': 1.821}, {'end': 591.226, 'text': 'Everyone has the read write permission.', 'start': 587.844, 'duration': 3.382}, {'end': 595.788, 'text': 'So basically anybody on the network will be able to access this profiles folder.', 'start': 591.246, 'duration': 4.542}, {'end': 607.136, 'text': 'Now, when the individual profiles are created within the profiles folder, they will have more advanced security set up on them by default,', 'start': 596.288, 'duration': 10.848}, {'end': 610.46, 'text': "so that people can't simply access them willy-nilly.", 'start': 607.136, 'duration': 3.324}, {'end': 615.045, 'text': "So don't worry about the security here with the everyone with the read-write permission.", 'start': 610.88, 'duration': 4.165}, {'end': 618.71, 'text': 'And make sure you basically you do share here.', 'start': 616.008, 'duration': 2.702}, {'end': 620.431, 'text': "So we've got this profiles folder.", 'start': 618.75, 'duration': 1.681}, {'end': 629.217, 'text': "Now what we're going to do is we're going to go to server manager, then we're going to go to tools, then we're going to go to Active Directory,", 'start': 620.931, 'duration': 8.286}, {'end': 630.438, 'text': 'users and computers.', 'start': 629.217, 'duration': 1.221}, {'end': 637.763, 'text': "So if I click on Active Directory users and computers, this is the default place for when we're dealing with users.", 'start': 630.638, 'duration': 7.125}, {'end': 640.124, 'text': "So we're going to the users folder.", 'start': 638.223, 'duration': 1.901}, {'end': 649.294, 'text': "And then what we're going to do is we're going to go and we're going to find a user profile we want to change and make it a roaming profile.", 'start': 640.585, 'duration': 8.709}, {'end': 652.6, 'text': "So I've already done this with user three to show you how this works.", 'start': 649.555, 'duration': 3.045}, {'end': 660.172, 'text': 'So all we need to do is we just double click on user three, On user three when the properties opens up.', 'start': 653.001, 'duration': 7.171}, {'end': 663.173, 'text': 'what we want to do is we want to go to the profile tab.', 'start': 660.172, 'duration': 3.001}, {'end': 669.376, 'text': 'And in the profile tab, we want to put in the profile path.', 'start': 664.234, 'duration': 5.142}, {'end': 672.877, 'text': "So you'll see slash slash server name.", 'start': 669.876, 'duration': 3.001}, {'end': 680, 'text': 'So what is the name of the server where this information is stored? So this server is called server.', 'start': 673.277, 'duration': 6.723}, {'end': 683.481, 'text': 'The shared folder is called profiles.', 'start': 680.76, 'duration': 2.721}, {'end': 686.802, 'text': "And then here you'll see it now says user three.", 'start': 684.141, 'duration': 2.661}, {'end': 693.564, 'text': 'What you need to type in, though, is percent username percent.', 'start': 686.862, 'duration': 6.702}, {'end': 701.387, 'text': 'So this is a system variable that will plug in whatever the username of the user is.', 'start': 694.184, 'duration': 7.203}, {'end': 709.149, 'text': "If you don't want to run into any problems, the best thing to do here is type in percent username percent instead of the person's actual username.", 'start': 701.427, 'duration': 7.722}, {'end': 718.24, 'text': "So you just put the UNC of the server, the folder, and %username% and then what you're going to do is you'll hit OK.", 'start': 709.529, 'duration': 8.711}, {'end': 724.948, 'text': 'Now once you have done that, you have configured the roaming profile to always go back to that folder.', 'start': 718.661, 'duration': 6.287}, {'end': 727.451, 'text': 'Now what we can do is we can minimize here.', 'start': 725.429, 'duration': 2.022}, {'end': 732.834, 'text': 'and we can see that I have two different Windows 8 computers.', 'start': 728.112, 'duration': 4.722}], 'summary': 'Configure and share a profiles folder with read-write permission for network access, then set up a roaming profile for users in active directory by specifying the profile path as //servername/profiles/%username%.', 'duration': 23.305, 'max_score': 548.048, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg548048.jpg'}, {'end': 870.688, 'src': 'embed', 'start': 839.239, 'weight': 7, 'content': [{'end': 842.12, 'text': 'logging in and logging out is the best way to do it.', 'start': 839.239, 'duration': 2.881}, {'end': 847.483, 'text': 'Whenever you log out and log back in, you make sure that all the configurations kind of stick.', 'start': 842.2, 'duration': 5.283}, {'end': 849.924, 'text': "So we're at Windows 8.", 'start': 847.923, 'duration': 2.001}, {'end': 854.629, 'text': "Now what I'm going to do is go to Windows computer 8 number 2.", 'start': 849.924, 'duration': 4.705}, {'end': 856.852, 'text': 'So this is a different computer.', 'start': 854.629, 'duration': 2.223}, {'end': 858.233, 'text': 'This is a different computer.', 'start': 856.872, 'duration': 1.361}, {'end': 865.1, 'text': "Now what I'm going to do is I'm going to log in as user 3.", 'start': 858.674, 'duration': 6.426}, {'end': 870.688, 'text': 'this is going out and this is now pulling the information from that folder.', 'start': 865.1, 'duration': 5.588}], 'summary': 'Logging in and out ensures configurations stick. testing on windows 8 and 8.2 with 3 users.', 'duration': 31.449, 'max_score': 839.239, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg839239.jpg'}, {'end': 1009.598, 'src': 'embed', 'start': 983.866, 'weight': 8, 'content': [{'end': 991.368, 'text': 'So the one reason roaming profiles might be a bad idea is because since it caches that information, it can become a hacking vector.', 'start': 983.866, 'duration': 7.502}, {'end': 999.512, 'text': 'The other reason is that when you cache that data, you may run out of storage space on your computer.', 'start': 991.668, 'duration': 7.844}, {'end': 1009.598, 'text': 'So again, that local computer is caching the data locally, and so whenever it does that, the profiles start to take up space on the hard drive.', 'start': 999.552, 'duration': 10.046}], 'summary': 'Roaming profiles can pose security risk and consume local storage space.', 'duration': 25.732, 'max_score': 983.866, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg983866.jpg'}, {'end': 1048.511, 'src': 'embed', 'start': 1025.367, 'weight': 6, 'content': [{'end': 1032.648, 'text': 'So the roaming profiles allows you to sit down at any computer on the network and you will get your files, your folders, your configurations,', 'start': 1025.367, 'duration': 7.281}, {'end': 1033.189, 'text': 'all of that.', 'start': 1032.648, 'duration': 0.541}, {'end': 1037.59, 'text': "The thing it doesn't do is it doesn't migrate the applications.", 'start': 1033.97, 'duration': 3.62}, {'end': 1040.625, 'text': "There's a lot of good reasons to use this.", 'start': 1038.544, 'duration': 2.081}, {'end': 1048.511, 'text': "This is an incredibly valuable, easy-to-use tool that far too many people don't use in the real world, and I don't know why.", 'start': 1040.665, 'duration': 7.846}], 'summary': 'Roaming profiles provide easy access to files and configurations across network computers, but do not migrate applications. it is an undervalued tool with great potential.', 'duration': 23.144, 'max_score': 1025.367, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg1025367.jpg'}], 'start': 442.709, 'title': 'Roaming profiles in windows', 'summary': 'Covers setting up roaming profiles, configuring them on windows 8, and discusses the security aspects, emphasizing benefits, risks, and limitations, providing practical examples and considerations for real-world application.', 'chapters': [{'end': 709.149, 'start': 442.709, 'title': 'Setting up roaming profiles', 'summary': 'Explains how to set up a roaming profile for users on a network, including creating a shared folder, setting user profile paths, and configuring permissions, emphasizing the importance of placing the profile folder on the active directory server.', 'duration': 266.44, 'highlights': ['Creating a shared folder on the network with read-write permission The first step involves creating a folder on the network and sharing it with everyone with the read-write permission, ensuring accessibility for users from different computers.', 'Changing user profile path to point to the shared folder In user settings, the profile path is modified to point to the shared folder, enabling the storage of user profiles for easy accessibility from any computer.', 'Placing the profile folder on the Active Directory server for small to mid-sized environments For small to mid-sized environments, it is recommended to place the profile folder on the Active Directory domain controller server for simplicity and ease of access.', 'Configuring permissions and security for individual profiles within the shared folder While the shared folder is accessible to everyone with read-write permission, individual profiles within the folder have more advanced security settings to restrict unauthorized access.', 'Setting user profile paths using system variables for flexibility The profile path is set using system variables like percent username percent to ensure flexibility and avoid potential issues with specific usernames.']}, {'end': 865.1, 'start': 709.529, 'title': 'Configuring roaming profiles on windows 8', 'summary': 'Details the process of configuring roaming profiles on windows 8, demonstrating the setup on two different computers and showcasing the synchronization of desktop settings and folders when logging in as a user.', 'duration': 155.571, 'highlights': ['The process of configuring roaming profiles on Windows 8 is demonstrated on two different computers, showcasing the synchronization of desktop settings and folders when logging in as a user.', 'Logging in and logging out in the Windows world ensures that configurations stick, providing a reliable way to make sure all the configurations are applied.', 'The demonstration includes creating and personalizing folders, changing background settings, and showcasing the synchronization of these settings when logging in to a different computer.']}, {'end': 1060.259, 'start': 865.1, 'title': 'Roaming profiles security', 'summary': 'Highlights the benefits of roaming profiles, such as easy access to files and settings, but also emphasizes the security risks, including potential hacking vectors and storage space issues, with examples and considerations. it also mentions the limitations of roaming profiles in migrating applications and concludes with a call to utilize this valuable tool more in the real world.', 'duration': 195.159, 'highlights': ['Roaming profiles provide easy access to files, folders, and configurations at any computer on the network, but do not migrate applications. Roaming profiles allow users to access their files, folders, and configurations from any computer on the network, making it a valuable tool. However, it does not migrate applications, which is a limitation to consider.', "Roaming profiles can pose security risks as the cached information on local computers could be exploited by hackers, especially for executive-level staff's sensitive data. The cached information from roaming profiles on local computers can be a potential hacking vector, especially for sensitive data of executive-level staff. This poses a significant security risk that needs to be addressed.", 'Storage space issues may arise with roaming profiles as the local computer caches data, potentially leading to problems with storage space on the hard drive. The caching of data from roaming profiles on the local computer can lead to storage space issues, which might become problematic, especially with the potential of running out of space on the hard drive. This is a consideration to keep in mind.']}], 'duration': 617.55, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/usqq8wZn_Dg/pics/usqq8wZn_Dg442709.jpg', 'highlights': ['Placing the profile folder on the Active Directory server for small to mid-sized environments', 'Configuring permissions and security for individual profiles within the shared folder', 'Changing user profile path to point to the shared folder', 'Creating a shared folder on the network with read-write permission', 'Setting user profile paths using system variables for flexibility', 'The process of configuring roaming profiles on Windows 8 is demonstrated on two different computers, showcasing the synchronization of desktop settings and folders when logging in as a user', 'Roaming profiles provide easy access to files, folders, and configurations at any computer on the network, but do not migrate applications', 'Logging in and logging out in the Windows world ensures that configurations stick, providing a reliable way to make sure all the configurations are applied', "Roaming profiles can pose security risks as the cached information on local computers could be exploited by hackers, especially for executive-level staff's sensitive data", 'Storage space issues may arise with roaming profiles as the local computer caches data, potentially leading to problems with storage space on the hard drive']}], 'highlights': ['Roaming profiles are crucial for high-power executives, as computer failures can result in significant financial losses, making it essential to provide them with immediate access to their files and folders on another computer to ensure maximum uptime and prevent financial losses.', 'Roaming profiles are essential in call center environments with a large number of users who do not have assigned seats, enabling them to access their customized profiles on any of the 1000 different computers, ensuring maximum uptime and efficiency.', 'Roaming profiles enable users to access their customized profile settings, files, and folders from any computer on the network, ensuring consistency and convenience.', 'Roaming profiles facilitate the sharing of user profiles across network computers, ensuring consistent user experience and eliminating the need to reconfigure settings on each computer.', 'Local profiles only store user settings and configurations on the specific computer they were initially logged into, causing default configurations when accessed from other network computers.', 'Roaming profiles allow users to access their settings, configurations, files, and folders from any computer, but do not migrate applications, such as Word, Outlook, or PowerPoint.', "It's essential to establish a standard application configuration across all computers for seamless user experience with roaming profiles.", 'The chapter details the traditional method of implementing roaming profiles through the profile path, emphasizing its continued relevance despite the availability of GPOs for the same purpose.', 'Placing the profile folder on the Active Directory server for small to mid-sized environments', 'Configuring permissions and security for individual profiles within the shared folder', 'Changing user profile path to point to the shared folder', 'Creating a shared folder on the network with read-write permission', 'Setting user profile paths using system variables for flexibility', 'The process of configuring roaming profiles on Windows 8 is demonstrated on two different computers, showcasing the synchronization of desktop settings and folders when logging in as a user', 'Logging in and logging out in the Windows world ensures that configurations stick, providing a reliable way to make sure all the configurations are applied', "Roaming profiles can pose security risks as the cached information on local computers could be exploited by hackers, especially for executive-level staff's sensitive data", 'Storage space issues may arise with roaming profiles as the local computer caches data, potentially leading to problems with storage space on the hard drive']}