Department-Based Network Drive Mapping with Group Policy

Part 2: Department-Based Network Drive Mapping with Group Policy

1. Introduction

In this part of the Active Directory and Group Policy lab series, I will configure department-based network drive mapping by using Group Policy Preferences.

In Part 1, I configured user-based Group Policy settings for wallpaper enforcement and Run menu restriction. In this part, I will continue with a user-based Group Policy configuration, but this time the goal is to automatically map a network drive for a department user.

The scenario is simple: when a Buchhaltung department user signs in to the Windows 11 client, the user should automatically receive a mapped network drive.

For this lab, the Buchhaltung department will receive the following drive mapping:

B: → \\DC\Shares\Buchhaltung

This part focuses only on network drive mapping. Folder Redirection is not covered in this section.

2. Lab Environment

The lab environment is running on Hyper-V and consists of an Active Directory domain.

Domain name:

GFNLAB.Test

Domain Controller name:

DC

The Domain Controller has the following roles and tools installed:

Active Directory Domain Services
DNS
Group Policy Management Console
Active Directory Users and Computers

The test will be performed on a Windows 11 client that is already joined to the domain.

Test user:

Frieda Fleissig

User location in Active Directory:

GFNLAB.Test → Buchhaltung → Benutzer

In this part, the first drive mapping configuration will be applied only to the Buchhaltung department

3. Goal

The goal of this lab is to make sure that Buchhaltung users automatically receive a department network drive after signing in to the Windows 11 client.

Target drive mapping:

B: → \\DC\Shares\Buchhaltung

A general department-based drive mapping structure could look like this:

Buchhaltung users → B: → \\DC\Shares\Buchhaltung
Verkauf users → V: → \\DC\Shares\Verkauf
Lager users → L: → \\DC\Shares\Lager
GF users → G: → \\DC\Shares\GF

In this lab, I will configure only the Buchhaltung mapping.

4. Creating the Shared Folder Structure

First, I created the folder structure on the Domain Controller.

On the C: drive, I created a folder named Shares. Inside this folder, I created another folder for the Buchhaltung department.

The folder structure is:

C:\
└── Shares
└── Buchhaltung

This structure allows me to share the main Shares folder and manage department folders below it.

5. Creating the Buchhaltung Security Group

To apply the drive mapping only to the correct department users, I created a security group for the Buchhaltung department.

In Active Directory Users and Computers, I went to:

GFNLAB.Test → Buchhaltung → Gruppen

Then I created a new group.

Group name:

GG_Buchhaltung

Group settings:

Group scope: Global
Group type: Security

This group represents Buchhaltung department users. Later, I will use this group for Item-Level Targeting in Group Policy Preferences.

6. Adding the User to the Security Group

The test user for this lab is Frieda Fleissig. Since this user should receive the Buchhaltung network drive, I added the user to the GG_Buchhaltung security group.

User location:

GFNLAB.Test → Buchhaltung → Benutzer

I opened the properties of the Frieda Fleissig user and added the user to the following group from the Member Of tab:

GG_Buchhaltung

After this step, Frieda Fleissig became a member of the Buchhaltung security group.

7. Sharing the Shares Folder

Next, I shared the C:\Shares folder so that it could be accessed over the network.

I opened the properties of the C:\Shares folder, went to the Sharing tab, and used Advanced Sharing.

The share name was configured as:

Shares

This created the following UNC path:

\\DC\Shares

With the Buchhaltung subfolder, the final target path became:

\\DC\Shares\Buchhaltung

For the share permissions, I allowed basic read access at the share level:

Everyone: Read

The detailed access control will be handled by NTFS permissions on the department folder.

8. Configuring NTFS Permissions

After configuring the share, I configured the NTFS permissions on the Buchhaltung folder.

I opened the Security tab of:

C:\Shares\Buchhaltung

Then I added the following security group:

GG_Buchhaltung

For this group, I assigned the following permissions:

Modify
Read & execute
List folder contents
Read
Write

With these permissions, members of GG_Buchhaltung can read, write, and modify files inside the Buchhaltung folder.

Administrative permissions such as SYSTEM and Domain Admins should remain in place so that the system and administrators can still manage the folder.

9. Creating a New GPO for Drive Mapping

For this part, I created a separate GPO instead of using the GPO from Part 1.

New GPO name:

Buchhaltung_Drive_Mapping

Because this is a user-based setting, I linked the GPO to the OU where the user account is located.

Target OU:

GFNLAB.Test → Buchhaltung → Benutzer

This allows users inside the Buchhaltung Benutzer OU to receive the drive mapping policy.

10. Creating the Drive Map with Group Policy Preferences

After creating the GPO, I edited it in Group Policy Management Editor.

I navigated to:

User Configuration
→ Preferences
→ Windows Settings
→ Drive Maps

Then I created a new mapped drive.

The drive mapping was configured with the following settings:

Action: Update
Location: \\DC\Shares\Buchhaltung
Reconnect: Enabled
Label as: Buchhaltung
Drive Letter: B:

I used the Update action because it creates the drive mapping if it does not exist and updates it if it already exists.

With this configuration, the B: drive should automatically point to:

\\DC\Shares\Buchhaltung

11. Configuring Item-Level Targeting

To make sure that the drive mapping applies only to Buchhaltung users, I configured Item-Level Targeting.

In the mapped drive properties, I opened the Common tab and enabled:

Item-level targeting

Then I opened the Targeting Editor and added a Security Group condition.

Target security group:

GG_Buchhaltung

The logic is:

User is a member of GG_Buchhaltung → B: drive mapping is applied
User is not a member of GG_Buchhaltung → B: drive mapping is not applied

This allows the drive mapping to be controlled by Active Directory group membership.

12. Testing on the Windows 11 Client

After completing the GPO configuration, I tested the result on the Windows 11 client with the Frieda Fleissig user.

First, I refreshed Group Policy manually:

gpupdate /force

Then I signed out and signed back in with the same user.

After logging in again, I opened File Explorer and checked This PC.

The expected result was:

B: → \\DC\Shares\Buchhaltung

The Buchhaltung network drive was successfully mapped as the B: drive.

13. Verifying the Applied GPO with gpresult

Finally, I verified that the GPO was applied to the user by using gpresult.

On the Windows 11 client, I ran:

gpresult /r

In the User Settings section, the following GPO should appear under the applied Group Policy Objects:

Buchhaltung_Drive_Mapping

This confirms that the drive mapping GPO was successfully applied to the Frieda Fleissig user.

14. Conclusion

In this part, I configured department-based network drive mapping by using Group Policy Preferences.

For the Buchhaltung department, the final configuration was:

Security Group: GG_Buchhaltung
Shared Folder: \\DC\Shares\Buchhaltung
Drive Letter: B:
GPO: Buchhaltung_Drive_Mapping
Target OU: GFNLAB.Test → Buchhaltung → Benutzer

With this setup, the Frieda Fleissig user automatically received the Buchhaltung network drive after signing in to the Windows 11 client.

The main components used in this lab were:

Shared Folder
Share Permissions
NTFS Permissions
Security Group
Group Policy Preferences
Drive Maps
Item-Level Targeting
gpupdate
gpresult

This method can be expanded for other departments such as Verkauf, Lager, or GF by creating separate department folders, security groups, and drive mapping settings.

In this part, I focused only on network drive mapping. Folder Redirection and more advanced user data management topics can be covered in a later part.