Solved

security settings and printers

Posted on 2002-05-23
2
205 Views
Last Modified: 2010-04-11
Recently I had a server crash due to a very high voltage spike that fried our UPS, two hard drives and the DLT drive. While awaiting the replacement drive’s I setup/rigged the server and restored the data from a local computer, which has an 80 GB hard that I copy the data to (I don’t trust tapes)using xxcopy. I have since replace the drives and restored some miscellaneous data that I didn’t have copied. I had to setup security on everything from memory/e-mail archives and users complaints as well as the printers (16) from scratch.  This got me thinking about which files NT use’s to store security settings on folders and printer setups? If I would have had a copy it would have saved me many hours of work. Can anyone identify these files?


Thanks!
0
Comment
Question by:mmarris
2 Comments
 
LVL 8

Accepted Solution

by:
scraig84 earned 100 total points
Comment Utility
I could be wrong, but I don't think it's possible to copy from machine to machine and retain security.  I believe that info is stored locally with each file.
0
 
LVL 63

Expert Comment

by:SysExpert
Comment Utility
scraig84 is essentialy correct.

That is why a good tape backup that recognizes the NTFS file system is essential.

The SAM and system files store the accounts, but the file system info is stored as part of the files/directories.

I hope this helps !
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now