TechTonic is a Boston based team of IT experts with a focus on Apple and Mac integration
(617) 301-6280

Redirector: A tried and true way to use network home folders

What’s wrong with Network Home Folders?
“True” network home folders means that when a user logs into a Mac, ALL the data associated with that user resides on the server. From documents to photos, to temporary internet caches, everything is being read and written across a network connection. For dynamic environments with many portable Macs connecting over WiFi, it has become all but impossible to use true network home folders in a reliable way.

TechTonic’s Solution
Enter Redirector. Redirector allows system administrators the ability to mass-manage hundreds, or even thousands of Macs, to designate folders on the local Mac that will be redirected to corresponding folders on the server. Create new management groups or use your existing workgroups or computer groups, settings for Redirector are easily pushed to all your Macs with methods familiar to Mac sysadmins, employing the ubiquitous Managed Preferences (MCX) and Managed Profiles introduced in OS X Lion.

Customizing Redirector
Every environment has their unique needs. Some want to do a true redirect, from the local Documents folder to the network Documents folder. Some admins don’t want to actually redirect existing folders, but create a unique folder where users know to put their documents. Redirector can put a folder on your Desktop (or anywhere!) and call it whatever you want (SaveHere, MyNetworkSave, etc). Redirector also respects your files. It checks for contents of a folder before redirecting to make sure it doesn’t contain any important files.

Who is using Redirector?
Redirector has been deployed in dozens of school districts. Every deployment has been a huge success, leaving system admins with a tried and true method for accomplishing something that was previously done with klunky scripts and static values. Redirector is built using low level OS X API’s, hooking into the system at a deeper level than shell scripts that don’t have access to some important system API’s.


How much is Redirector?
Redirector is free for all our customers.

Leave a Reply

Latest Article: Hurricane and Tornado Hacking Protection 9/12/17

by Scott Morabito: Three of the biggest news stories in the last few weeks have been Hurricane Harvey, Hurricane Irma, and the Equifax data breach. The data breach at Equifax is somewhat unfathomable because of its scope and magnitude. Sure, there have been large hacks of data in the past such as Yahoo in 2016 and LinkedIn in 2012 - but who cares about email addresses? The Equifax breach contained identity information for 200 million Americans and this could systematically cause massive amounts of identity theft. From the outside, it would seem not that this is expected: surely Equifax had major security software, systems, and tools in place to prevent this from happening. This is certainly true. The problem with cyber attacks is the asymmetric nature of offense and defense. Protecting yourself from a data breach like the Equifax one is like building a house that can withstand an F5 Tornado. house2 As hurricane Harvey and hurricane Irma worked their way up the Gulf of Mexico, one thought that would go through people's mind was "Hurricane's have hit here before - we'll probably be OK". To some degree, there is some logic to this. Modern buildings can withstand hurricanes ok and can even be safe to be in during the store. Millions of people stayed in their houses during these storms and there was only a tiny percentage of life lost. There are some anomalies and bad luck associated with hurricanes, but for the most part they are survivable
Read the rest...

Other Posts

  • Hurricane and Tornado Hacking Protection
    Hurricane and Tornado Hacking Protection Equifax was hit with a Tornado, everyone else was in hurricane by Scott Morabito Three of the biggest news stories in the last few weeks have been Hurricane Harvey, Hurricane Irma, and the Equifax data breach. The data breach at Equifax is somewhat unfathomable […]...
    Read more
  • Adobe Flash and the musket
    The future of Flash and the security concerns on your Mac by Scott Morabito A number of conversations with customers has recently involved the topic of Adobe Flash.  Let’s address a couple of things quickly: Should we still be using Flash in web browsers?: Yes Should we be […]...
    Read more
  • Mac malware is real
    Mac malware risk Its time for our customers and macOS users to take the threat seriously. The risk is real and we have an answer. by Scott Morabito For as long as I’ve been working in IT and Apple, customers have always asked me whether they need to worry […]...
    Read more