?
Solved

Can I safely use explorer to copy certain shortcuts from "Desktop" "Favorites" "Start menu" from one local profile to another AD domain profile?

Posted on 2004-08-14
7
Medium Priority
?
159 Views
Last Modified: 2010-04-14
I know one must not use explorer to copy one local profile to another local profile.  However is it OK to copy just the contents of "Desktop", "Favorites" and "start menu" without causing any problems with SIDS, permissions or whatever?

If it is OK from local to local, can I do the same from local profile to an Active dir domain roaming profile?
0
Comment
Question by:Alistair7
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 3

Expert Comment

by:pulupul
ID: 11799413
I would rather copy the CONTENTS of those directories, not the directories. Just in case.
0
 

Author Comment

by:Alistair7
ID: 11799503
Yes I was thinking of just contents and not folders.  But are you sure it will not lead to problems with permissions, sids or whatever?
0
 
LVL 3

Assisted Solution

by:pulupul
pulupul earned 200 total points
ID: 11799760
I guess changing the owner of all the files to the owner of the destination profile directory should be enough. I have never done it though.
0
10 Questions to Ask when Buying Backup Software

Choosing the right backup solution for your organization can be a daunting task. To make the selection process easier, ask solution providers these 10 key questions.

 
LVL 85

Assisted Solution

by:oBdA
oBdA earned 1200 total points
ID: 11799819
You don't need to worry about the permissions of the shortcuts; as soon as you copy them into another folder, they will inherit the permissions of the target folder.
But there's another important thing to be taken into consideration.
A shortcut doesn't simply store the absolute position of the target (like C:\Program Files\Acme\acme.exe); it stores the complete path including the machine name. So if you copy a shortcut from machine A to machine B, then try to run the program referenced, even though the program might be installed at the same location on B, it will be started from machine A, because that's where machine B looks for the exe file.
For that to work in a roaming profile, you need to activate three group policy settings for the users working with the copied shortcuts:
User Configuration\Administrative Templates\Windows Components\Windows Explorer
* Do not track Shell shortcuts during roaming (http://www.microsoft.com/windows2000/techinfo/reskit/en-us/regentry/93545.asp)
User Configuration\Administrative Templates\Start menu and task bar
* Do not use the search-based method when resolving shell shortcuts (http://www.microsoft.com/windows2000/techinfo/reskit/en-us/regentry/93175.asp)
* Do not use the tracking-based method when resolving shell shortcuts (http://www.microsoft.com/windows2000/techinfo/reskit/en-us/regentry/93176.asp)
0
 
LVL 2

Accepted Solution

by:
TASINetwork earned 600 total points
ID: 11806710
I do this sort of thing all the time when moving a user to a new PC.  Feel free to copy the folder for Desktop, My Documents, Start Menu, and Favorites (non of these contain anything in relations to a SID).  I'm not sure if you can easily copy the other directories though.

If you are copying from 1 drive to the same drive, you will have to reset the permissions if you are copying from one person to another.  Permissions are reset if you move from one drive to another, but NOT if it is just moved/copied from one location on a drive to a different location on the same drive.
0
 

Author Comment

by:Alistair7
ID: 11809329
How do you "reset" the permissions?
0
 
LVL 2

Expert Comment

by:TASINetwork
ID: 11809384
Go to the security tab, click on advanced, and check both boxes at the bottom.  This will set all files and that directory and below to inherit the permissions from the parent directory.  You only need to do this on the desktop usually (if at all), and I would select everything inside the desktop and do this step.
0

Featured Post

Does Your Cloud Backup Use Blockchain Technology?

Blockchain technology has already revolutionized finance thanks to Bitcoin. Now it's disrupting other areas, including the realm of data protection. Learn how blockchain is now being used to authenticate backup files and keep them safe from hackers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Active Directory can easily get cluttered with unused service, user and computer accounts. In this article, I will show you the way I like to implement ADCleanup..
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question