Sluggish users profile. How to fix “The User Profile Service failed the logon. User profile cannot be loaded. Allow only local profiles

So now you have a problem if you are writing a library that will be used both by old school code written with wchar_t defined as an alias for unsigned short and new school code written with wchar_t as a separate internal type. What data type do you need to use for string parameters?

This is a translation of The sad history of Unicode printf-style format specifiers in Visual C ++.

Windows implemented Unicode earlier than most other operating systems. As a result, Windows' solutions to many problems differ from those made by those who waited for the dust to settle. The most prominent example of this is the use of Windows UCS-2 as the Unicode encoding. It was then the encoding recommended by the Unicode consortium because Unicode 1.0 only supported 65 "536 characters². The Unicode consortium changed its mind five years later, but by then it was too late for Windows, which had already released Win32s, Windows NT 3.1, Windows NT 3.5. , Windows NT 3.51 and Windows 95 - all of which used UCS-2³.

But today we'll talk about printf-style format strings.

This is a translation of If FlushInstructionCache doesn’t do anything, why do you have to call it, revisited.

It is assumed that you will call the FlushInstructionCache function when you generate or modify the executable code at run-time so that the processor, when executing your generated / modified code, would read the instructions you wrote, and not old instructions that may remain in the processor's instruction cache.

We learned earlier that. This is because a simple function call was enough to clear the instruction cache.

But on Windows NT, the FlushInstructionCache function does the real work because it needs to notify all other processors to flush their caches.

However, if you look at Windows 10, you will find that the FlushInstructionCache function looks like the Windows 95 version: she does nothing.

What's the matter here?

User account corruption is a common Windows problem. The problem occurs when you enter a password or pin code on the lock screen and pressing enter will display the error "User Profile service failed to log in. Unable to load user profile" in windows 10 or User Profile service is preventing login in Windows 7. ...

Solving the problem "User Profile Service could not log in" using the registry editor

Option 1. Fix user account profile

Sometimes your account can be corrupted and this prevents you from accessing files in windows 10. Let's go to the registry editor in several ways, through safe mode:

Step 1... Press the keyboard shortcut " windows + R"to invoke the command" execute "and enter the command regedit to enter the registry.

Step 2... In the window that opens, follow the path:

Step 3... You will have several keys in the parameter s-1-5... You will need to select the longest key with a long array of numbers and your account that has the "User Profile Service failed to log on" error. Make sure that the path is correct, click on the long key and there should be a name on the right in the column, if you haven't found it, then scroll through all the long keys until you come across in the right column with your broken profile, in my case an account .

Step 4... If you renamed the user profile folder C: \\ User \\ site of the affected account incorrectly, then open the explorer along the path C: \\ User \\ site and right-click on the broken profile, select rename and manually enter the correct profile name (site). After renaming, go back to the folder in the registry and see that the name is written as in the picture (step 3) C: \\ User \\ site.

See two options step 6 and step 7, depending on how

Step 5... Now let's make two options if we have one long key S-1-5-21-19949 ....- 1001. bak bak extension at the end) and with the second without .bak those. just S-1-5-21-19949 ....- 1001. Depending on who has two or one profiles lined up.

Step 6. There is only one key at the end of bak (S-1-5-21-19949 ....- 1001.bak).

  • A) If you only have one key at the end with .bak (S-1-5-21-19949 ....- 1001.bak), right-click on it and click rename. (see the picture below).

  • B) Delete the word itself with a dot .bakto get just numbers. Continue with step 8. (see picture below)

Step 7. If you have two identical keys, one without .bak, the second with .bak. (S-1-5-21-19949 ....- 1001 and S-1-5-21-19949 ....- 1001.bak) .

  • A) In the left pane of the registry, right-click on the key without .bak and add a point, two letters .bk (see figure below).

  • B) Now right-click on the key with .bak, select rename and remove .bak with a dot. (see figure below).

  • C) Now go back and rename the first key from .bk in .bak... Press enter and continue to step 8.

Step 8... Highlight the key you renamed without .bak and from the right in the column, double-click to open the parameter settings, and assign the value 0. If you do not have such a parameter, then right-click on an empty field and create a DWORD (32-bit) parameter, rename it RefCount and set the value to 0.

Step 9... In the right field, select the key without .bak and in parameter State set the value to 0. If there is no such parameter, then click on the empty field on the right and click create DWORD (32-bit), rename it to State and set the value to 0.

Step 10... Restart your computer and the error "user profile service failed to log in" and "user profile cannot be loaded" in windows 10 should disappear.

Option 2. Delete and create a new user profile for the account

This option will delete the user profile, thereby you will lose all your account settings and personalization.

Step 1... If there is another admin account that has no error, log out of the current account (ex: site) and log in to the admin account.

If you do not have another administrator account to log in, you can do one of the following options below to enable the built-in administrator account to log in and proceed to step 2 below.

  • A). Boot into Safe Mode, enable the built-in Administrator, log out and log in to Administrator.
  • B). Open a command prompt window at startup, enable the built-in administrator, restart the computer, and log into Administrator.

Step 2... Back up anything you don't want to get lost in the profile folder C: \\ Users \\ (username) (ex: site) of the corresponding user account to another location. When done, delete the C: \\ Users \\ (username) folder.

Step 3... Press windows + R to open the Run dialog box, type regedit and click OK.

Step 4... In Registry Editor, navigate to the location below.

  • HKEY_LOCAL_MACHINE \\ SOFTWARE \\ Microsoft \\ Windows NT \\ CurrentVersion \\ ProfileList

Step 5... In the left pane, in the ProfileList, click on the long key that has the account error. The profile is visible on the right.

Step 6... Delete profiles with error with .bak and without .bak. For example ( S-1-5-21-19949 ....- 1001 and S-1-5-21-19949 ....- 1001.bak) - delete.

Step 7... Close the registry editor and restart your computer, after which it will automatically recreate the new user.

Let's solve the problem "Unable to load user profile" in a simple way

Method 1... This method does not work for everyone, but it helped many. Try to copy your documents in the (C: \\ Users \\) folder somewhere else to create a backup just in case. Typically, the problem occurs because the "NTUSER.DAT" file located in the "C: \\ Users \\ Default" folder is corrupted. To solve this problem you need to replace the "NTUSER.DAT" file with a different profile. ...

  1. Log into the system in safe mode with a profile account that is running.
  2. Find the file (C: \\ Users \\ Default) "NTUSER.DAT" and rename the extension.DAT to .OLD. It should be (NTUSER.OLD).
  3. Find the file "NTUSER.DAT" in the work profile such as "Guest", "General". Example (C: \\ Users \\ Guest \\ NTUSER.DAT).
  4. Copy it and paste it into the default folder C: \\ Users \\ Default.
  5. To restart a computer.

You can copy this file from another computer with the same version of windows and paste it to yourself along the path C: \\ Users \\ Default.

Method 2... You can try replacing the entire "C: \\ Users \\" folder from another computer.

  • Take a USB flash drive in FAT32 format and write the C: \\ Users \\ folder to it from another computer and drop it on your computer.

If anyone knows how else to fix the error, "User Profile Service prevents logging in" by another method, then write in the form "report a bug".

In this manual, I will describe the steps that will help you fix the "Unable to load user profile" error in Windows 7. Please note that the message "Logged in with a temporary profile" can be corrected in exactly the same ways (but there are nuances that will be described at the end articles).

One of the quickest ways to fix the error that has occurred, which, however, does not always work, is to use Windows 7 System Restore. The procedure is as follows:


After the recovery is complete, restart your computer and check if the message appears again stating that there are problems with logging in and the profile cannot be loaded.

Other possible solutions to the problem with the Windows 7 Profile Service

A faster way to fix the "Profile service prevents login" error, which does not require editing the registry, is to log into Safe Mode using the built-in Administrator account and create a new Windows 7 user.

After that, restart your computer, log in under the newly created user and, if necessary, transfer files and folders from the "old" one (from C: \\ Users \\ Username).

Also on the Microsoft website there is a separate instruction with additional information about the error, as well as the Microsoft Fix It utility (which just removes the user) for automatic fixing: https://support.microsoft.com/ru-ru/kb/947215

Logged in with a temporary profile

A message stating that you logged into Windows 7 with a temporary user profile may mean that some changes that you (or a third-party program) made to the current profile settings have corrupted it.

In general, to fix the problem, it is enough to use the first or second method from this guide, however, in the ProfileList registry key, in this case, there may not be two identical subkeys with and without such an end for the current user (there will only be c. Bak).

In this case, it is enough to simply delete the section consisting of S-1-5, numbers and. Bak (right-click on the section name - delete). After uninstalling, restart your computer and log in again: this time no messages about the temporary profile should appear.

The profile has two purposes: managing the use of a password and limiting the number of session resources used. Password verification is always enabled, resource usage verification is available only when the RESOURCE_LIMIT \u003d TRUE parameter is enabled (disabled by default). Profiles are used by default, but the default profiles (applied to all users, including SYS and SYSTEM) are checked very little.

Profile password limits are always enforced; profile resource limits

are enforced only if the instance parameter RESOURCE_LIMIT is TRUE.

The following restrictions can be applied to the password

  • FAILED_LOGIN_ATTEMPTS - sets the number of consecutive incorrect password entries before blocking the account. If the correct password is entered before blocking, the counter is reset to zero.
  • PASSWORD_LOCK_TIME - sets the amount (in days) before the account is locked after FAILED_LOGIN_ATTEMPTS
  • PASSWORD_LIFE_TIME - amount (in days) until the password expires. After that, the password may still be active for some time, depending on the PASSWORD_GRACE_TIME
  • PASSWORD_GRACE_TIME - the number (in days) after the first successful connection attempt after the expiration of the password lifetime while the offer to change the password will be displayed. The old password is valid at this time
  • PASSWORD_REUSE_TIME - Number of days before the password can be reused (password value)
  • PASSWORD_REUSE_MAX - sets how many times the same password can be used
  • PASSWORD_VERIFY_FUNCTION - the name of the function to be executed when the password is changed. The goal is supposed to check the new password for the required security level, but you can use it for any purpose.

Resource limitation

Limitations on the use of server resources (kernel limits) are

SESSION_PER_USER the number of concurrent connections that the same account can create. Sessions upon reaching this value will be blocked

CPU_PER_SESSION - CPU time (in centiseconds) that the server session process can use before it is forced to terminate

CPU_PER_CALL - CPU time (in centiseconds) that the server process can use to execute one SQL command before the request is forced to stop

LOGICAL_READS_PER_SESSION - the number of blocks that the session can read (regardless of the buffer or from the disk) before the forced disconnection of the session

LOGICAL_READS_PER_CALL - the number of blocks that the request can read (independently from the buffer or from the disk) before the forced stop of the request

PRIVATE_SGA - for sessions connected using a shared server architecture, the number of kilobytes that a session can use in SGA

CONNECT_TIME - in minutes, maximum session duration

IDLE_TIME - in minutes, the duration of inactivity after which the session is forced to disconnect

COMPOSITE_LIMIT is the weighted sum of other attributes. Not covered in this course

All resource limits will not be met until the instance parameter RESOURCE_LIMIT is set. The default is FALSE. You can enable by running the request

ALTER SYSTEM SET RESOURCE_LIMIT \u003d TRUE;

When the session is disconnected due to reaching the limit, if there was an unconfirmed transaction, it is canceled. If the execution of the request stops, then the changes made by this request are canceled, but all the commands executed before that remain valid and unconfirmed.

Profiles can be used to limit resource usage, but a much more

sophisticated tool is the Resource Manager

Creating and assigning profiles

Profiles can be managed through Database Control or SQL * Plus. To view the current user profiles, run the query

select username, profile from dba_users;

By default, all accounts (except for the two internal accounts DBSNMP and WKSYS) will use the DEFAULT profile. Request to view profile

select * from dba_profiles where profile \u003d 'DEFAULT';

The DEFAULT profile has no resource restrictions, but there are several restrictions on passwords

These restrictions are not very strong: the password can be entered incorrectly 10 times before the account is blocked for one day, and the password expires in six months with a grace period of a week. The easiest way to apply more stringent password restrictions is to run the script supplied with Oracle $ ORACLE_HOME / rdbms / admin / utlpwdmg.sql. This script will create the VERIFY_FUNCTION and VERIFY_FUNCTION_11G functions and then execute the request

ALTER PROFILE DEFAULT LIMIT

PASSWORD_LIFE_TIME 180

PASSWORD_GRACE_TIME 7

PASSWORD_REUSE_TIME UNLIMITED

PASSWORD_REUSE_MAX UNLIMITED

FAILED_LOGIN_ATTEMPTS 10

PASSWORD_LOCK_TIME 1

PASSWORD_VERIFY_FUNCTION verify_function_11G;

This command will change the DEFAULT profile. All users with the DEFAULT profile (all default users) will immediately pick up the new values. The only change will be the use of the verify_function_11G function. This function will check the password against certain criteria, namely

  • The new password must be at least 8 characters long
  • Password must not be the same as username
  • Commonly used simple passwords (e.g. oracle) will be rejected
  • The new password must contain at least one uppercase letter and one number
  • Password must differ at least three characters from the previous one

You can consider this function as an example and modify it according to your requirements. In general, it is desirable to create separate profiles for different user groups.

The CREATE PROFILE command is used to create a profile, setting the necessary restrictions. Unset values \u200b\u200bwill be exposed depending on the values \u200b\u200bin the DEFAULT profile. For example, consider a scenario where users can open only one session, administrators can create as many sessions as they want and must change the password once a week with a grace period per day, and programmers can open two sessions. To do this, you can run the commands

alter profile default limit sessions_per_user 1;

Then create dba_profile profile and assign it to system user

create profile dba_profile limit sessions_per_user unlimited password_life_time 7 password_grace_time 1;

alter user system profile dba_profile;

And create a profile for programmers

create profile programmers_profile limit sessions_per_user 2;

alter user jon profile programmers_profile;

alter user sue profile programmers_profile;

For resource restrictions to take effect, you must set the instance parameter

alter system set resource_limit \u003d true;

If the instance uses SPFILE this change will be applied to the options file and will be used even after restart.

A profile cannot be deleted if it is assigned to any user. You can either transfer users to another profile first, or use the CASCADE directive, the use of which will automatically reassign users using the deleted profile back to the DEFAULT profile.

Roaming user profiles are easy to create. To create them, you don't even need to understand Active Directory or Group Policy, but knowing these technologies will greatly simplify your life when managing such profiles. In a nutshell, creating roaming profiles requires you to set up the network location where these profiles will reside, and then configure each user account to map to the network location you created earlier. All of these actions are described below:

A mandatory user profile is created by analogy, only after setting up the desktop (it is enough for the user, say, the head of a department or you to complete all the settings for the current profile), the file of this profile should be renamed from NTUSER.DAT to NTUSER.MAN. Also, each required user profile should be stored in a dedicated top-level folder. That is, you need to create the following folder hierarchy: top level root folder, say Profileswhere the folder will be located mandatory_user_profiles, inside which folders with mandatory user profiles will already be located. For this folder, you only need to grant permissions at the level "Readings"to prevent users from making changes to their required user profile, which is located on the server. After that, on the tab "Profile" user, in the appropriate text box, give a name with the .man suffix (.man.v2 for users who log on under Windows Vista and higher operating systems) at the end of the user folder, which will become the required user profile.

Managing roaming user profiles with Group Policy

As you know, it is common practice to use Group Policy in Active Directory domains to reduce the cost of managing computer systems. Roaming User Profiles is no exception. Group Policy allows you to manage most of the tasks you might face when deploying roaming user profiles. To do this, Microsoft provides 23 Group Policy settings located in the nodes Policies \\ Administrative Templates \\ System \\ User Profiles computer configuration and user configuration sections. Let's consider these parameters:

Figure: 4. Policy settings for user profile management

Adds the Administrators security group to roaming user profiles.

This Group Policy setting is used to add the Administrators security group to the Roaming User Profile Share, and to assign Full Control. After you configure a roaming user profile, it will be created the next time the user logs on to the location you specified. If the option is disabled or not specified, then only the user will have full access to his profile, and the Administrators group will not have access to files, and if this option is enabled, the Administrators group will also have full access rights to the user's profile folder. If you enable this option after creating a profile, it will not affect the previously created profile. It should be noted that you should configure this parameter not on the profile server, but on the user's computer, since file sharing permissions are assigned to the roaming profile during its creation.

Delete user profiles on system reboot after the specified number of days.

The current setting allows the administrator to automatically delete user profiles that have not been used during the days specified in this policy when the system is rebooted, while 24 hours from the moment of accessing this profile is considered a day. If the parameter is activated, then upon reboot of the system, the profiles unused for the specified number of days are automatically deleted by the user profile service. If the parameter is not configured or is disabled, then automatic deletion will not occur. For users on frequent and long business trips, plan to use this profile privately.

Do not check user ownership of roaming profile folders.

This setting disables the secure default setting for the user's roaming user profiles folder, controls the behavior of the existing folder when computers are updated, and maintains and enhances the security of the user profile. Starting with Windows XP SP1, the roaming profile folder is not available for copying if it already exists and the permissions are incorrect. When this parameter is enabled, the Windows operating system does not check for an existing folder. If the option is disabled or not specified in the existing folder of the roaming user profile, files are not copied, and an error message is displayed in the event log. If there is no cached profile, a temporary user profile is used.

Delete cached copies of roaming profiles.

Using this option, you can define whether copies of the user roaming profile will be saved to the hard disk when you log off. Together with the associated settings for this folder, this setting determines the strategy for managing user profiles that are located on remote servers and determine the system's actions when the profile is loaded for a long time. As mentioned earlier, when a user logs off the system, the roaming user profile is saved to the local hard disk to exclude the situation of an unavailable profile server. When this option is enabled, all local copies are deleted, leaving the roaming profile only on the profile or file server. If the connection is slow, this option should be disabled because it requires a local copy of the roaming profile.

Do not force the user registry to be unloaded when the user logs off.

This Group Policy setting is used for application compatibility issues. The operating system unloads the user's system registry when logging out, regardless of open handles to user registry keys. Because this option may prevent you from receiving roaming profile updates, we recommend using this option only as a last resort. In the event that this parameter is enabled, the forced unloading of the registry at logoff is not performed, but the system registry will be reloaded after closing the descriptors to the user registry keys. A disabled or not configured parameter will always dump the registry, even with open handles.

Don't detect slow network connections.

As you already know, a slow connection is a measure of the speed at which a user's computer connects to a remote server that contains a roaming user profile. When the system detects a slow connection, the parameters of the roaming profile folder determine how the system reacts to a slow connection. When this parameter is enabled, the system does not detect a slow connection and none of the network connections will be considered as such, respectively, roaming profiles are always blocked. The system ignores the parameters that define the reaction to slow connections. If the parameter is disabled or not configured, the system measures the connection speed to the remote server storing the user profile. In case of a slow connection, the system uses other parameters set in the roaming profile folder for further actions, loading a local copy of the default user profile.

Prompt the user when a slow network connection is detected.

The current Group Policy setting will help you if your users require a roaming profile to be loaded even if they have a slow network connection to the profile server. In Windows XP and earlier operating systems, when a slow connection is detected, a dialog box is displayed to select the option to load a remote copy of the roaming profile. On Windows Vista and later operating systems, at logon, only a check box is displayed indicating whether to load a user profile. When the setting of this policy is activated, users themselves determine whether to download a roaming profile if the connection to the server is slow. If disabled or not specified, the local copy of the user profile is used. With the option enabled Wait for the roaming user profile to load, the deleted copy of the profile will be loaded automatically, or the system will completely ignore the user's preselection. To configure the time allotted to respond on operating systems below Windows Vista, use the Dialog Boxes Timeout... With the option enabled "Don't detect slow connection", this parameter is ignored. With the option enabled "Delete cached copies of roaming profiles", there is no local copy of the profile, so the local copy of the profile is not loaded on a slow connection.

Leave the Windows Installer and Group Policy installation information.

Using this option allows you to determine whether the operating system retains the Windows Installer and Group Policy installation information when you delete a roaming user profile. By default, all information related to it, including those associated with the installer, is deleted, so the next time you log on to the system, it becomes necessary to install all applications published using the policy, which, accordingly, increases the logon time. When this option is enabled, the Windows Installer and Group Policy installation information is not removed from the computer, which improves performance the next time users with the deleted profile log on to the computer. If the policy is disabled or not configured, the entire roaming user profile is deleted, including Windows Installer and Group Policy data. With the policy enabled, the local administrator must delete the Windows Installer and Group Policy data from the user's registry and file system.

Allow only local profiles.

With this Group Policy setting, you can prevent users with a roaming profile from getting it on a single computer. By default, when a user logs on for the first time, their roaming profile is downloaded to the local computer. On subsequent login, the roaming profile is merged with the local user profile. On shutdown and logout, the local copy of the profile with the changes made during the session is merged with the server copy of the profile. Using this option, you can prevent users from getting their roaming profile on a single computer. When this option is enabled, at the first login to the system, the user receives a new local profile, in which all system changes will be saved. The same local profile will be used for all subsequent logins without synchronizing with the server. If this option is disabled or not specified, the roaming user profile is used by default.

Set the path to roaming profiles for all users logged on to this computer.

This parameter determines the need to use the specified network path for all users of a single computer. To use this parameter, enter the path to the network share in the following format: \\\\ computername \\ share_name. To provide an individual profile folder for each user on a separate computer, add the% Username% paths, otherwise all users will use the same profile folder, and you must ensure that the appropriate security settings are in place. When enabled, all users use the specified path to roaming profiles. When disabled or not configured, users use a local or standard roaming user profile.

Dialog boxes timeout.

Using the current Group Policy setting, you can determine how long the operating system should wait for a user response before performing the default action. The latter is used if the user has not responded to a message about slow connection detection events, unavailable profile server, or telling that the local user profile is newer than the server profile. It is advisable to use this parameter to predefine the system value, which is equal to 30 seconds. You can specify a value between 0 and 600 seconds.

Do not register users with temporary profiles in the system.

The current Group Policy setting allows you to automatically disconnect users from the system if their profiles cannot be loaded. This policy also applies when a profile contains errors that prevent loading, while preventing the operating system from registering a user with a temporary profile. When this option is enabled, the operating system will not register a user with a temporary user profile. If the parameter is disabled or not specified, if user profiles cannot be loaded, the operating system will register temporary profiles in the system.

The maximum number of times a user profile is unloaded and updated.

By using this Group Policy setting, you can control how many times the NTUSER.DAT file will be retried when the user logs out or if the update fails. When the user logs off, the operating system unloads the user portion of the registry and updates it. The system stops these attempts when the specified number of attempts is exhaustive. By default, the system retries 60 times. If you enable this parameter, then you can change the number of retries to download and update custom registry settings. In the event that you set the value to zero, then the operating system will unload and update the registry settings only once. If there are many profiles on the computer, then it is advisable to increase the number of retries.

Prevent the transfer of changes in the roaming profile to the server.

By using this option, you can prevent changes made to the roaming profile on a specific computer from being made to the copy of the computer on the server. As mentioned earlier, when a user logs on to the system, their roaming profile is copied to the local computer, and the roaming profile is merged with the local one if they have already logged in before. If you enable this option, the user will receive their roaming profile when they log in, but any changes made by the user to their profile will not be added to their roaming profile when they log out.

Wait for the roaming profile to load.

This Group Policy setting instructs the operating system to wait for the remote copy of the roaming user profile to load, even if you are connected over a slow connection. By enabling this option, you always allow the roaming user profile to be loaded from the server. It is worth noting that if you enable a setting, then this Group Policy setting is ignored. Also, when the parameter is enabled "Delete cached copies of roaming profiles", in the case of a slow connection, you do not have a local copy of the roaming profile to download. If this Group Policy setting is disabled or not configured, then when a slow connection is detected, the system loads a local copy of the roaming user profile

Timeout for slow network connections for user profiles.

The current setting allows you to specify which connection is considered slow for downloading roaming user profiles. The operating system considers the connection slow if the server hosting the roaming user profile responds slower than specified in this parameter. For computers connected to IP networks, the operating system calculates the rate at which the remote server should return data in response to a ping message. To set the threshold for this check in a text box "Connection speed" enter a decimal number from 0 to 4294967200 representing the minimum acceptable transfer rate in kilobits per second. The default is 500 kbps. In addition, if, for computers not on IP networks, the server file system does not respond within the maximum acceptable delay in milliseconds, which is specified in the text box "Time", the server is also considered slow. In this text box, you can enter a value between 0 and 20000. If the Group Policy setting is enabled "Don't detect slow connections", then this parameter is ignored.

Background transfer of the roaming user profile registry file when the user logs on.

This option is only available on Windows 7 and Windows Server 2008 R2. You can use this parameter to schedule the background transfer of the roaming user profile registry file. The transfer takes place only if the user is logged in. Note that this setting does not prevent the roaming user profile from being transferred when the user logs off. The main difference between this parameter and all others is that to use this parameter, you must first select the method of scheduling the schedule to use. There are two scheduling methods:

  • Start at a given interval... With this schedule selected, the user profile registry file will be sent at the specified interval after the user logs on to the system. In a text box "Interval" you can specify an interval from 1 to 720 hours. For example, if you specify an interval of 4 hours, then the registry file will be transferred in the background every four hours even if the user is not logged out. At the next user login, the timer will start over;
  • Run at a specified time... When this plan is selected, the registry hive will be uploaded only once every day at the same time.

Figure: 5. Roaming profile background transfer settings dialog box

Set the maximum network timeout if the user has a roaming profile or a remote home directory.

By default, when you move a profile or delete the main folder with a profile while the network connection is unavailable, after the user logs on to the system, the Windows operating system waits for the network to resume for 30 seconds. Using this parameter, you can set the waiting time for the network to resume. If the network remains unavailable after the maximum waiting time, the user will continue to log on without the network. As soon as the network becomes available before the maximum timeout expires, the user's login will certainly continue.

Mount the home folder to the root of the share.

The current setting defines the settings for the% HOMESHARE% and% HOMEPATH% environment variables, which define the user's profile home folder, and also contains the full path to the home folder. In this case, users can access the home folder and any of its subfolders through the drive letter of the home folder, but at the same time they cannot view or access its parent folders. When this option is disabled, home folders are mapped to the user's folder and not to a higher share. You cannot use this parameter on operating systems that were created after the Windows XP operating system.

Synchronize main folders only at the moment of system logon or logoff.

With this Group Policy setting, you can specify the network folders that will be synchronized using the Offline Files policy at logon and logoff. This option is useful for troubleshooting applications that do not work correctly with offline files when the user is online. If this parameter is enabled, the network paths specified in the parameter will be synchronized using the Offline Files Policy. If disabled or not specified, the paths specified in the current parameter will behave similarly to other cached data processed by the Offline Files Policy and will remain interactive when the user is logged in if network paths are available.

Exclude folders from the roaming profile.

This Group Policy setting allows you to exclude folders that should be included in a roaming user profile so that certain folders are not stored on the profile server. As you know, in roaming profiles, folders "Appdata \\ Local", "Appdata \\ LocalLow", as well as folders containing temporary files and Internet Explorer browser history are excluded. If you enable this option, then you can exclude any folders that are located in the user profile. If this option is disabled, only the default folders will be moved accordingly.

Limit profile size.

This parameter allows you to set the maximum size for a user profile and determines the action of the operating system when the profile reaches its maximum value. With this parameter, you can set the maximum profile size, determine whether the profile size includes registry files, specify whether end users will receive notifications when the maximum profile size is exceeded, specify a custom message notifying the user that the profile has been exceeded, and define how often this message should be displayed. If you disable or do not specify parameters for this parameter, then the operating system will not limit the size of the user profile.

Conclusion

In this article, you learned about the purpose and types of user profiles, which have a number of benefits, both for system administrators and for end users. We learned that user profiles allow personal settings to be applied each time a user logs on to the operating system, rather than being used to log on to the system, as is the case with user accounts. The article provides a table from which you can find out about all the folders that are part of the profiles. You learned about how roaming user profiles are created, and also looked at Group Policies for managing roaming and local user profiles.

Did you like the article? To share with friends: