Logo
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
EPL Standings
 
 
Windows Vista

Programming the WshNetwork Object

3/20/2011 10:42:52 PM

WshNetwork is a generic name for an object that enables you to work with various aspects of the Windows network environment. You can determine the computer name and username, you can enumerate the mapped network drives, you can map new network drives, and more. The next couple of sections show you how to work with this object.

Referencing the WshNetwork Object

WshNetwork refers to the Network object exposed via the Automation interface of WScript. This means you use CreateObject to return this object, as shown here:

Set objWshNetwork = WScript.CreateObject("WScript.Network")

From here, you use the WshNetwork variable to access the object’s properties and methods.

WshNetwork Object Properties

The WshNetwork object supports three properties:

ComputerNameReturns the network name of the computer
UserDomainReturns the network domain name of the current user
UserNameReturns the username of the current user

Mapping Network Printers

The WshNetwork object supports several methods for working with remote printers. For example, to map a network printer to a local printer resource, use the WshNetwork object’s AddWindowsPrinterConnection method:

WshNetwork.AddPrinterConnection strPrinterPath

WshNetworkThe WshNetwork object
strPrinterPathThe UNC path to the network printer

Here’s an example:

Set objWshNetwork = WScript.CreateObject("WScript.Network")
objWshNetwork.AddWindowsPrinterConnection "\\ZEUS\printer"

To remove a remote printer mapping, use the WshNetwork object’s RemovePrinterConnection method:

WshNetwork.RemovePrinterConnection strPrinterPath [, bForce] [, bUpdateProfile]


WshNetworkThe WshNetwork object
strPrinterPathThe UNC path to the network printer
bForceIf True, the resource is removed even if it is currently being used
bUpdateProfileIf True, the printer mapping is removed from the user’s profile

Here’s an example:

Set objWshNetwork = WScript.CreateObject("WScript.Network")

Mapping Network Drives

The WshNetwork object supports several methods for mapping network drives. To map a shared network folder to a local drive letter, use the WshNetwork object’s MapNetworkDrive method:

WshNetwork.MapNetworkDrive strLocalName, strRemoteName, [bUpdateProfile], [strUser], [strPassword]


WshNetworkThe WshNetwork object
strLocalNameThe local drive letter to which the remote share will be mapped (for example, F:)
strRemoteNameThe UNC path for the remote share
bUpdateProfileIf True, the drive mapping is stored in the user’s profile
strUserUse this value to enter a username that might be required to map the remote share (if you’re logged on as a user who doesn’t have the proper permissions, for example)
strPasswordUse this value to enter a password that might be required to map the remote drive

Here’s an example:

Set objWshNetwork = WScript.CreateObject("WScript.Network")
objWshNetwork.MapNetworkDrive "Z:", "\\ZEUS\SharedDocs"

To remove a mapped network drive, use the WshNetwork object’s RemoveNetworkDrive:

WshNetwork.RemoveNetworkDrive strName, [bForce], [bUpdateProfile]

WshNetworkThe WshNetwork object.
strNameThe name of the mapped network drive you want removed. If you use a network path, all mappings to that path are removed; if you use a local drive letter, only that mapping is removed.
bForceIf True, the resource is removed even if it is currently being used.
bUpdateProfileIf True, the network drive mapping is removed from the user’s profile.

Here’s an example:

Set objWshNetwork = WScript.CreateObject("WScript.Network")
objWshNetwork.RemoveNetworkDrive "Z:"

objWshNetwork.RemovePrinterConnection "\\ZEUS\inkjet"

Other -----------------
- Supporting Desktop Applications : Repair a Corrupted Operating System (part 4)
- Supporting Desktop Applications : Repair a Corrupted Operating System (part 3) - Complete PC Backup and Restore
- Supporting Desktop Applications : Repair a Corrupted Operating System (part 2) - System Restore
- Supporting Desktop Applications : Repair a Corrupted Operating System (part 1)
- Maintain Desktop Applications (part 2) - Using Group Policy to Manage Application Compatibility
- Maintain Desktop Applications (part 1) - New Program Compatibility Wizard
- Supporting Desktop Applications : Troubleshoot Software Restrictions
- Support Deployed Applications
- Configure Network Security (part 2 ) - Windows Firewall
- Configure Network Security (part1 ) - Secure Files and Printer Shares with Access Control Lists (ACLs)
- Configure and Troubleshoot Remote Access (part 2) - Troubleshooting Windows Vista Remote Access Connections
- Configure and Troubleshoot Remote Access (part 1) - Remote Client Access Connections
- Configure and Troubleshoot Wireless Networking (part 3) - Troubleshooting Wireless Connections
- Configure and Troubleshoot Wireless Networking (part 2) - Wireless Security
- Configure and Troubleshoot Wireless Networking (part 1) - Managing Wireless Connectivity in the Enterprise
- Troubleshoot Resource Access and Connectivity Issues (part 2)
- Troubleshoot Resource Access and Connectivity Issues (part 1) - Troubleshooting TCP/IP Configuration
- Configure and Troubleshoot Network Services at the Client Level
- Configure and Troubleshoot Network Protocols (part 3) - Configuring TCP/IP Version 6
- Configure and Troubleshoot Network Protocols (part 2) - WINS & NAT
 
 
Most view of day
- Microsoft Lync Server 2013 : Deploying Lync Online - Adding Domains to Lync Online
- Windows Home Server 2011 : Maintaining Windows Home Server - Checking Your Hard Disk for Errors
- Microsoft Exchange Server 2007 : Understanding the Client Access Server (part 2) - ActiveSync
- Preparing and Configuring Boot Images (part 1) - Creating Boot Images
- Microsoft PowerPoint 2010 : Animating Slide Content (part 3) - Setting Animation Event Triggers, Associating Sounds with Animations, Making an Object Appear Differently after Animation
- Windows Server 2012 Group Policies and Policy Management : Understanding Group Policy (part 2) - Group Policy Link Enforcement, Group Policy Inheritance, Group Policy Block Inheritance
- Microsoft Lync Server 2013 : Deploying Lync Online - Enabling Users for Exchange UM, Configuring a Subscriber Access Number
- SQL Server 2012 : Running SQL Server in A Virtual Environment - MANAGING CONTENTION
- Windows Phone 8 : Using Sound (part 1) - Playing Sounds with MediaElement, Using XNA Libraries, Playing Sounds with XNA, Adjusting Playback
- Microsoft OneNote 2010 : Using the Research and Translate Tools (part 3) - Translating Text with the Mini Translator
Top 10
- Microsoft Exchange Server 2007 : Implementing Client Access and Hub Transport Servers - Installing the Hub Transport Server
- Microsoft Exchange Server 2007 : Implementing Client Access and Hub Transport Servers - Transport Pipeline
- Microsoft Exchange Server 2007 : Hub Transport Server Policy Compliance Features (part 4) - Message Classification , Rights Management and the Hub Transport Server
- Microsoft Exchange Server 2007 : Hub Transport Server Policy Compliance Features (part 3) - Journaling
- Microsoft Exchange Server 2007 : Hub Transport Server Policy Compliance Features (part 2) - Disclaimers
- Microsoft Exchange Server 2007 : Hub Transport Server Policy Compliance Features (part 1) - Transport Rules
- Microsoft Exchange Server 2007 : Implementing Client Access and Hub Transport Servers - Understanding the Hub Transport Server
- Conducting Research in OneNote 2010 : Translating Text
- Conducting Research in OneNote 2010 : Researching a Topic, Customizing the Research Task Pane
- Conducting Research in OneNote 2010 : Handling the Research Task Pane
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro