Solved

Move files/folders in NTFS and KEEP PERMISSIONS/SHARING/SECURITY! settings

Posted on 2003-11-17
6
5,456 Views
Last Modified: 2011-03-18
Please help,

maybe a utility/method/program?
0
Comment
Question by:riler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 30 total points
ID: 9762679
Hi riler,
Knowledge Base  

How to Use Robocopy to Copy Security Information Without Copying Any File DataPSS ID Number: 323275

Article Last Modified on 10/11/2002


--------------------------------------------------------------------------------
The information in this article applies to:


Microsoft Windows 2000 Server
Microsoft Windows 2000 Advanced Server
Microsoft Windows NT Server 4.0

--------------------------------------------------------------------------------

This article was previously published under Q323275
SUMMARY
Documentation for the Robocopy utility is located in the Robocopy.doc file that is included in the Windows NT 4.0 Resource Kit and the Windows 2000 Resource Kit. The "Copying NTFS Security Information" section in the Robocopy.doc file describes how to use the /secfix command-line parameter to copy NTFS file system access control lists (ACLs) for existing files that have not been modified. However, this section does not fully describe how to copy security information without copying the file data (for files that have been modified) at the same time. (The steps to complete this procedure are available in other parts of the Robocopy.doc file.) This article describes how to use Robocopy to copy security information for a file without copying the data from this file.
MORE INFORMATION
By default, Robocopy copies file data for any file that appears to be older, newer, or changed. You can use the /secfix parameter when you run the Robocopy command line to copy only security information for existing files. Additionally, you must use the /xo parameter, the /xn parameter, and the /xc parameter when you run the Robocopy command with the /secfix parameter, for example:
robocopy source destination /secfix /xo /xn /xc

If you run this command line, Robocopy refreshes only the security information for existing files; it does not copy any file data.

If you want to maintain the destination folder as an exact mirror of the source folder, you must run Robocopy with the appropriate parameters to refresh only the file security information, and then run the Robocopy command without using the /xo, the /xn, or the /xc parameters. After you do so, the file data content is consistent between the source file and the destination file.

For definitions of Robocopy terms that are used in this article and for information about other Robocopy functions and features, see Robocopy.doc.
Keywords: kbinfo KB323275
Technology: kbwin2000AdvServ kbwin2000AdvServSearch kbwin2000Search kbwin2000Serv kbwin2000ServSearch kbWinAdvServSearch kbWinNT400search kbWinNTS400 kbWinNTS400search kbWinNTsearch kbWinNTSsearch



--------------------------------------------------------------------------------

Send feedback to Microsoft

© 2003 Microsoft Corporation. All rights reserved.


Cheers!
0
 
LVL 8

Expert Comment

by:Huseyin1
ID: 9762877
the setting may remain, do a test
0
 

Expert Comment

by:sartandragonbane
ID: 10245965
xcopy /xo, delete...
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 11145138
Hello this question has been open a while please take the time to come back and clean it up.

Closing Questions
http://www.experts-exchange.com/help.jsp#hs5


Best Wishes

Pete
www.petenetlive.com
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question