I know there are several ways to map a drive letter to a networked resource in a Windows environment. What I would like to know is how to quickly determine the means for which each mapped drive is being mapped.
Many of our users have up to 15 mapped drives. After a few hours of searching I've learned that some of those drives are mapped via Group Policies while others are mapped via scripts. But there are still others that I cannot figure out the source that is automatically mapping those drives for them.
How do I identify the method that is mapping one or more drives (e.g. Group Policy, Script, etc.)? If it's a Group Policy, which one? If it's a script, which one and from where? Thanks.
Best Answer
Ah, sounds like an ex-NetWare shop. They were always fond of drive letters.
Windows doesn't track where they come from, unfortunately, so you're left with the forensic task of looking at everything that can cause a script to be mapped. That's a long slog, and I feel for you. There are many:
For tracking GPOs, the way that works for me is to:
That'll give you a big start on the source of the drive-mappings that's coming from automation you manage. You can't do much about stuff users do themselves, some never clear the "remember this mapping" button.