Solved

Move files/folders in NTFS and KEEP PERMISSIONS/SHARING/SECURITY! settings

Posted on 2003-11-17
6
5,444 Views
Last Modified: 2011-03-18
Please help,

maybe a utility/method/program?
0
Comment
Question by:riler
  • 2
6 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 30 total points
ID: 9762679
Hi riler,
Knowledge Base  

How to Use Robocopy to Copy Security Information Without Copying Any File DataPSS ID Number: 323275

Article Last Modified on 10/11/2002


--------------------------------------------------------------------------------
The information in this article applies to:


Microsoft Windows 2000 Server
Microsoft Windows 2000 Advanced Server
Microsoft Windows NT Server 4.0

--------------------------------------------------------------------------------

This article was previously published under Q323275
SUMMARY
Documentation for the Robocopy utility is located in the Robocopy.doc file that is included in the Windows NT 4.0 Resource Kit and the Windows 2000 Resource Kit. The "Copying NTFS Security Information" section in the Robocopy.doc file describes how to use the /secfix command-line parameter to copy NTFS file system access control lists (ACLs) for existing files that have not been modified. However, this section does not fully describe how to copy security information without copying the file data (for files that have been modified) at the same time. (The steps to complete this procedure are available in other parts of the Robocopy.doc file.) This article describes how to use Robocopy to copy security information for a file without copying the data from this file.
MORE INFORMATION
By default, Robocopy copies file data for any file that appears to be older, newer, or changed. You can use the /secfix parameter when you run the Robocopy command line to copy only security information for existing files. Additionally, you must use the /xo parameter, the /xn parameter, and the /xc parameter when you run the Robocopy command with the /secfix parameter, for example:
robocopy source destination /secfix /xo /xn /xc

If you run this command line, Robocopy refreshes only the security information for existing files; it does not copy any file data.

If you want to maintain the destination folder as an exact mirror of the source folder, you must run Robocopy with the appropriate parameters to refresh only the file security information, and then run the Robocopy command without using the /xo, the /xn, or the /xc parameters. After you do so, the file data content is consistent between the source file and the destination file.

For definitions of Robocopy terms that are used in this article and for information about other Robocopy functions and features, see Robocopy.doc.
Keywords: kbinfo KB323275
Technology: kbwin2000AdvServ kbwin2000AdvServSearch kbwin2000Search kbwin2000Serv kbwin2000ServSearch kbWinAdvServSearch kbWinNT400search kbWinNTS400 kbWinNTS400search kbWinNTsearch kbWinNTSsearch



--------------------------------------------------------------------------------

Send feedback to Microsoft

© 2003 Microsoft Corporation. All rights reserved.


Cheers!
0
 
LVL 8

Expert Comment

by:Huseyin1
ID: 9762877
the setting may remain, do a test
0
 

Expert Comment

by:sartandragonbane
ID: 10245965
xcopy /xo, delete...
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 11145138
Hello this question has been open a while please take the time to come back and clean it up.

Closing Questions
http://www.experts-exchange.com/help.jsp#hs5


Best Wishes

Pete
www.petenetlive.com
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now