Here is a script I used to change the Terminal Services Profile Path of
a user.
I ran this on Windows XP SP2 against a Windows 2000 domain controller.
I didn't find many examples of how to do this, and most of my searches
for perl or vbscript solutions turned up pages saying it can only be
done on Windows 2003. For those of you like me still stuck with 2000,
maybe this will save you some time...
use strict;
use Carp;
use Win32::OLE;
my $objRootDSE = Win32::OLE->GetObject("LDAP://RootDSE")
or die Win32::OLE->LastError();
my $strDefaultNC = $objRootDSE->Get("defaultnamingcontext")
or die Win32::OLE->LastError();
my $strUsersOUADsPath = "LDAP://OU=LHL Users";
my $objUsersOU = Win32::OLE->GetObject(
"$strUsersOUADsPath,$strDefaultNC"
) or die Win32::OLE->LastError();
my $objUser = Win32::OLE->GetObject(
"LDAP://CN=testuser,OU=Users,DC=company,DC=co,DC=nz"
);
print "path = " . $objUser->TerminalServicesProfilePath() . "\n";
$objUser->{TerminalServicesProfilePath} = "\\\\aaa\\sss";
confess "Error: " . Win32::OLE->LastError() if(Win32::OLE->LastError());
$objUser->SetInfo();
confess "Error: " . Win32::OLE->LastError() if(Win32::OLE->LastError());
Attention:
The information contained in this message and or attachments is intended only
for the
person or entity to which it is addressed and may contain confidential and/or
privileged
material. Any review, retransmission, dissemination or other user of this
information, or
taking of any action in reliance upon this information by persons or entities
other than the
intended recipient is prohibited. If you received this in error, please contact
the sender
and delete the material from any system and destroy any copies.
Lakes District Health and any of its subsidiaries reserve the right to monitor
all
e-mail communication through its networks.
#####################################################################################
This e-mail message has been scanned for Viruses and Content and cleared
by NetIQ MailMarshal
#####################################################################################