Systems Admin

Step-by-Step Documentation for Folder Redirection Policy in Windows Server 2022

A user’s laptop dies on a Wednesday morning. With normal local-profile Documents, every file they had is gone — whatever wasn’t in OneDrive, in email, or copied to a share by hand. With Folder Redirection, the same incident is a one-hour event: hand the user any other domain-joined PC, they sign in, and their Documents folder appears exactly as it was on the dead laptop. The data wasn’t local in the first place; it lived on a file share, and the user just thought they were saving locally.

This walkthrough builds the full configuration end to end: the OU, the test user, the security group that filters the policy, the hidden share with the right NTFS permissions, the GPO, and the validation steps to prove redirection actually worked on a Windows 10 client. The Security Filtering quirk that catches everyone the first time (you must keep Authenticated Users with Read permission, even though they don’t apply the GPO) is explained at the end with the reasoning, not just the rule.

What you need before starting

  • A Windows Server 2022 (or 2019/2016) domain controller
  • A domain-joined Windows 10 (or 11) client for testing
  • Domain Admin rights on the DC
  • Administrative access to the file server hosting the redirected share — in lab environments this is often the DC itself, but do not do this in production; use a dedicated file server

What Folder Redirection does (and why)

Folder Redirection is a Group Policy feature that points a user’s special folders (Documents, Desktop, Downloads, AppData\Roaming, etc.) at a server share instead of the local profile. Applications still see “Documents” in the user shell folder; the underlying location is a UNC path. The user notices nothing until they sign in on a different domain-joined PC and find all their files there waiting.

What you get:

  • Centralized backup — user files live in one place on the file server. Back up the share, you’ve backed up everyone’s Documents.
  • Roaming — users can sign in on any domain-joined PC and see the same data. Especially useful for shared workstations and hot-desking.
  • Hardware-failure resilience — lost laptop = lost hardware, not lost data. Hand them a replacement PC and they’re working again in under an hour.
  • Offline access — combined with Offline Files (which we enable in Step 10), the redirected folder is cached locally and works when the network is unavailable.

Step 1 — Create an OU for the redirected users

OU isolation makes the GPO scope explicit. Sign into the DC as Domain Admin, open Server Manager > Tools > Active Directory Users and Computers. Right-click the domain > New > Organizational Unit > name it Design > OK.

Step 2 — Create a test user inside the OU

Right-click the Design OU > New > User. First name Deepak, last name Patel, logon Deepak. Next. Set a password, untick User must change password at next logon (this is a test user; in production you’d leave it ticked). Next > Finish.

Step 3 — Create the security group that gates the GPO

Right-click Design OU > New > Group. Name Folder Redirection Users, scope Global, type Security > OK. Right-click the new group > Properties > Members > Add, add Deepak Patel, Check Names > OK > Apply > OK.

ADUC showing the Folder Redirection Users group with a domain user as a member.
Folder Redirection Users group with the test user added — this group becomes the GPO Security Filter in Step 7.

Step 4 — Create the hidden share that holds the redirected data

The share name ends with $ — that’s the convention for hidden shares (won’t appear in browse lists, but is fully accessible by UNC path). In Server Manager > File and Storage Services > Shares, click Tasks > New Share > SMB Share – Quick > Next. On Share Location, pick Custom Path, Browse to C:, click New Folder, name it DesignData, select it, click Select Folder > Next. On Share Name, enter DesignData$ > Next.

Server Manager Shares pane with Tasks > New Share menu open.” /><figcaption>Tasks > New Share to launch the New Share Wizard from File and Storage Services.</figcaption></figure>
<figure class=New Share Wizard SMB Share Profile selection.
SMB Share – Quick is the right profile for a redirected-folders share.
New Share Wizard Share Location screen with custom path.
Custom Path lets you create the folder from inside the wizard rather than pre-creating it in Explorer.
New Share Wizard Share Name screen.
The trailing $ makes this a hidden share — users won’t stumble across it browsing, but Folder Redirection still uses it normally.
Browse For Folder dialog creating C:\DesignData.
Create the underlying C:\DesignData folder directly from the browse dialog.

Step 5 — NTFS permissions on the share

The default share permissions are too open and too narrow at the same time — too open in that everyone can read everyone else’s subfolders, too narrow in that nobody can create new ones. The lockdown:

  1. On Configure Share Settings, click Customize Permissions
  2. Disable Inheritance > Convert inherited permissions into explicit permissions
  3. Remove the Users entry
  4. Add > Select a Principal, enter Folder Redirection Users, Check Names > OK
  5. Keep the default permissions, then add Create folders / append datathis is the critical permission. Without it, the per-user subfolder can’t be created on first redirection and the whole flow silently fails for new users.
  6. Set Applies to: This folder only (so Folder Redirection Users can’t traverse into other users’ subfolders — once a user’s subfolder is created, only that user has access to it via the inherited permissions Folder Redirection sets at creation time)
  7. OK > Apply > OK > Next > Create > Close
Configure Share Settings screen with Customize Permissions button.
Customize Permissions opens the standard ACL editor — default permissions are too permissive for a Folder Redirection share.
Advanced Security Settings dialog with Disable Inheritance.
Disable inheritance and convert to explicit so subsequent edits don’t fight the inherited entries.
Permission Entry dialog selecting Folder Redirection Users principal.
Add Folder Redirection Users as the principal — only group members will be able to create subfolders here.
Permission Entry dialog with advanced permissions visible.
Show advanced permissions to access the granular ACE flags — including the one Folder Redirection actually needs.
Permission Entry showing Create folders / append data ticked.
The non-obvious permission: Create folders / append data. Without it, the first sign-in fails to create the per-user subfolder.
Permission Entry Applies to dropdown set to This folder only.
Applies to: This folder only — so group members can create their own subfolders but can’t walk into other people’s.
Confirm Permissions screen.
Final wizard confirmation page before share creation.
View Results screen showing share creation completed.
DesignData$ created successfully — ready to receive per-user subfolders on first sign-in.

Step 6 — Create the GPO

From Server Manager > Tools > Group Policy Management, expand the domain, right-click Group Policy Objects > New. Name it Folder Redirection GPO. OK. The GPO is created but not yet linked or scoped — that’s the next two steps.

Step 7 — Security filter the GPO to the redirection group

Select the new GPO. On the Scope tab:

  1. In Security Filtering, remove Authenticated Users
  2. Add > the Folder Redirection Users group > OK

Adding the group automatically grants it both Read and Apply Group Policy permissions. But you’re not done — Folder Redirection has a quirk compared to other GPO types. The CSE (Client-Side Extension) needs to read the GPO before it can decide whether to apply it, and that read happens against Authenticated Users by default. If you’ve removed Authenticated Users entirely, the CSE can’t see the GPO and processing fails silently.

Fix: go to the Delegation tab > Add > add Authenticated Users > give them Read permission only (NOT Apply Group Policy — that would cause the GPO to apply to everyone again). The deep-dive at the end of this article walks through the why; for now, just add it.

Group Policy Management showing the Folder Redirection GPO with custom security filtering.
Replace Authenticated Users with the Folder Redirection Users group on the Scope tab.
GPO Delegation tab showing Authenticated Users with Read permission.
Then re-add Authenticated Users on the Delegation tab with Read-only — the Folder Redirection CSE needs this to process the GPO.
Add Group or User dialog setting Read permission.
Read only — never grant Authenticated Users Apply, or the security filter you just set up is meaningless.

Step 8 — Configure the actual redirection in the GPO

Right-click Folder Redirection GPO > Edit. Navigate to User Configuration > Policies > Windows Settings > Folder Redirection. Right-click Documents > Properties:

  1. Setting: Basic – Redirect everyone’s folder to the same location (Basic = one share root, per-user subfolders auto-created; Advanced = different shares per group)
  2. Target folder location: Create a folder for each user under the root path
  3. Root Path: the UNC of your share, e.g. \\WS2022-HAV-DC01\DesignData$

Switch to the Settings tab and pick Redirect the folder back to the local user profile location when policy is removed. This matters — if you ever decommission Folder Redirection, you want the user’s shell folders to revert to C:\Users\Username\Documents instead of staying pointed at a server share that may no longer exist.

Apply > Yes on the warning > OK. Close the GPME.

Group Policy Management Editor at User Configuration > Policies > Windows Settings > Folder Redirection > Documents.” /><figcaption>The Folder Redirection node lives under User Configuration > Policies > Windows Settings — not Computer Config.</figcaption></figure>
<figure class=Documents Properties Target tab with Basic redirection and root path.
Basic redirection + Create a folder for each user + root UNC = each user gets their own subfolder under the share automatically.
Documents Properties Settings tab with Policy Removal option.
Policy Removal → Redirect back to local profile. Without this, removing the GPO leaves users stranded.

Step 9 — Link the GPO to the OU

Right-click the Design OU > Link an Existing GPO > pick Folder Redirection GPO > OK. The GPO is now linked and will apply to users in the OU on next policy refresh.

Group Policy Management showing Folder Redirection GPO linked to the Design OU.
GPO linked to the Design OU — combined with the security filter, it applies only to Folder Redirection Users members within this OU.

Step 10 — Test on a Windows 10 client

The verification:

  1. Sign in to a domain-joined Windows 10 client as Deepak
  2. First sign-in creates a fresh local profile
  3. Open Command Prompt: gpupdate /force
  4. When prompted, type Y to log off (Folder Redirection processing only happens at sign-in — gpupdate alone is not enough)
  5. Sign back in as the same user
  6. Open File Explorer > Documents
  7. Right-click inside Documents > Properties > Location tab
  8. Confirm the path is \\WS2022-HAV-DC01\DesignData$\Deepak (or whatever your share + username is) — not a local C:\Users path
  9. Switch to the Offline Files tab, ensure Always available offline is enabled, click Sync Now if prompted

Save a file in Documents. Switch to the file server, browse to C:\DesignData\Deepak — the file is there. Save another file from a different domain-joined PC signed in as the same user; it appears in the same place. Folder Redirection is working.

Windows 10 Command Prompt running gpupdate /force.
gpupdate /force pushes the new GPO to the client immediately, but you still need to log off so redirection processes at sign-in.
gpupdate logoff confirmation prompt.
Y to log off — the only way to trigger Folder Redirection processing is a fresh sign-in.
File Explorer Documents Properties Location tab pointing to the share.
Documents Properties > Location now shows the UNC share path, not a local C: drive path. Confirms redirection is active.
Documents Properties Offline Files tab with Always available offline.
Always available offline pins the redirected folder for offline access — necessary for laptops that leave the network.
Sync Center showing the redirected folder syncing.
Sync Now triggers an on-demand sync between the local cache and the server copy.
DesignData$ share on the server showing the user per-user subfolder.
The per-user subfolder appears under the share root automatically — created at first sign-in by the Folder Redirection CSE.
Files visible inside the user redirected Documents folder on the server.
Files saved on any client appear inside the user’s server-side subfolder — nothing on the local C: drive.

The Setting options on the Documents Properties dialog

Option What it does
Not Configured Redirection is off. Documents stays in the local profile.
Basic – Redirect everyone’s folder to the same location One share root for all targeted users; per-user subfolder created automatically (\\server\share\username). What we used.
Advanced – Specify locations for various user groups Different share for different security groups. Sales → \\server\sales, Marketing → \\server\marketing. Use when departments need separate physical storage.

The Security Filtering quirk explained — Read vs. Apply

This is the bit that breaks Folder Redirection in 90% of bad lab setups. Two GPO permissions matter:

  • Read — lets a user/computer see that the GPO exists and read its contents
  • Apply Group Policy — controls whether the GPO actually applies to that user/computer

For most GPOs (password policy, software installation, registry settings), you can remove Authenticated Users entirely and add only your target group. The target group has both Read and Apply, the GPO works, everyone else doesn’t see it.

Folder Redirection is different. The Folder Redirection Client-Side Extension has to read the GPO at every user logon to decide “does this apply to me?” If you’ve removed Authenticated Users completely, only members of your target group can read the GPO — but the CSE runs in the user’s context, and on systems where the user isn’t in the target group, the CSE can’t even see the GPO to decide. The processing silently fails. Even worse, in some configurations the failure is intermittent — works for some users some of the time, depending on whether GP cached the GPO from a previous read.

The fix is the pattern used in Step 7: keep Authenticated Users with Read only on the Delegation tab. Anyone in the domain can read the GPO (so the CSE can always evaluate it), but only Folder Redirection Users members have Apply Group Policy (so the GPO only takes effect for them).

GPO type Authenticated Users config Reason
Normal GPO Can remove entirely CSEs evaluate from cached policy info; remove-and-replace works
Folder Redirection GPO Keep with Read only on Delegation tab CSE must read the GPO live to evaluate applicability

The notice-board analogy

If GPO permissions still feel weird, here’s the analogy that makes it click:

Imagine a notice board in an office. The notice says: “Only Marketing employees follow this instruction.”

Read permission = everyone can walk past and read the notice (so they can decide if it applies to them).

Apply Group Policy permission = only Marketing employees actually follow the instruction.

If you put the notice in a locked room only Marketing can enter (no Read for others), then Sales and Engineering can never see the notice — they don’t know it exists, can’t evaluate whether it applies, and any logic that assumed “everyone reads the notice first” breaks.

Folder Redirection works the same way: every user’s logon process needs to read the GPO to evaluate applicability, even if only a few users actually apply it. Hence the Read-only delegation to Authenticated Users.

Things that bite people in production

Don’t host the share on a domain controller

Lab walkthroughs often use the DC as the file server — convenient for screenshots, terrible for production. DCs should be dedicated to AD; layering a busy file share onto a DC creates load patterns that interfere with authentication. Use a dedicated file server (or a clustered file server for HA) for the redirected-folders share in production.

Test before mass-applying

The first user to sign in after redirection is enabled gets their entire profile rebuilt — if anything is misconfigured (missing permissions, wrong UNC, share unreachable), they end up with a broken profile and a long support ticket. Always test with a single user in a single OU first. Verify the per-user subfolder is created, files redirect correctly, and Offline Files works. Then expand.

Permissions wrong = silent failure

Forgetting to grant Create folders / append data in Step 5 means the per-user subfolder can’t be created on first sign-in. The redirection silently fails and the user’s Documents stays local. Symptom: GPO shows applied in gpresult /r, but Documents Properties > Location still shows the local C:\Users path. The fix is the permission, not anything in the GPO.

Watch share size growth

Centralizing user data also centralizes its growth. A 200-user site with average 5 GB per user is a 1 TB share before any growth. Layer in FSRM quotas per user folder so a single hoarder can’t fill the entire share, and consider Data Deduplication on the volume for storage efficiency.

Backup is now critical

Before redirection, losing a laptop loses one user’s data. After redirection, losing the file server loses everyone’s data. The share absolutely must be on backed-up storage with tested restore procedures. Test restores quarterly — an untested backup is a hope, not a backup.

Plan the offline-files cache size

Offline Files caches the redirected folder on each client. By default the cache is sized as a percentage of the local disk — on small SSDs this can be too small to hold the user’s full Documents. Tune the cache size via Group Policy if users have large local file collections (designers with image libraries, developers with large repos).

Where this fits

Folder Redirection is one piece of the broader user-data-resilience story. The companion pieces are configuring roaming profiles in Active Directory for full profile portability beyond just shell folders, FSRM quotas to keep share growth bounded per user, Data Deduplication for storage efficiency on the share volume, and DFS file management for multi-server share presentation in larger environments. The broader Group Policy pathway covers the GPO mechanics, and the Windows Server Administration pathway covers the rest of file-server hygiene.

Leave a Reply