Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Move files and permissions between servers

Posted on 2004-08-16
7
Medium Priority
?
255 Views
Last Modified: 2010-08-05
I have about 60 gig of folders and files, all with complicated permissions set. I have just added another DC to my network and want to move all the data over to this, before I retire the old DC.

I just had a go at moving some files over then, and the permissions were reset. Is there a way to move the files over without it changing the permissions?

Moving from Windows 2000 -> Windows 2003.

Thanks,

Paul.
0
Comment
Question by:H4Inf
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 12

Expert Comment

by:Gary Dewrell
ID: 11817162
Hi H4Inf,
If Im not mistaken you can do this.
from the old server map a drive to the new server then use xcopy /o /e  to move your files.

God Bless
0
 
LVL 9

Accepted Solution

by:
SamuraiCrow earned 2000 total points
ID: 11817409
I've done this with the robocopy.exe utility.  It originally came with the NT4 resource kit but you can find it almost anywhere now a days.  It basically simplifies the copying of complex folder and permissions structures to new locations.  All of our share migrations have been done with this tool.  This is the link that explains the command line syntax:

http://support.microsoft.com/?kbid=323275

The tool is also in the 2003 Resource Kit which can be downloaded here:

http://www.microsoft.com/downloads/details.aspx?FamilyID=9d467a69-57ff-4ae7-96ee-b18c4790cffd&displaylang=en

Make a couple of practice runs and the move the whole share.  Works like a charm.

Good Luck
Crow
0
 
LVL 9

Expert Comment

by:SamuraiCrow
ID: 11817424
Here is an extended robocopy.exe command line reference in case you want to do some heavy duty tweaking.  For most migrations purposes the example in my first comment should suffice.
0
Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

 

Expert Comment

by:efs300
ID: 11825357
An excellent robocopy script that I have used several times with excellent results can be found at:

http://www.winnetmag.com/WindowsScripting/Article/ArticleID/19826/19826.html

robocopy has changed slightly since the article was written so you may have to tweak some of the robocopy switch settings.  
0
 

Author Comment

by:H4Inf
ID: 11857287
Working wonders!!  Thanks so much :D
0
 
LVL 9

Expert Comment

by:SamuraiCrow
ID: 11857462
Glad to assist
Peace be the Journey
Crow
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I guess it is not common knowledge to most Wintel engineers/administrators: If you have an SNMP-based monitoring system in your environment (and it's common to have SNMP or Syslog) it's reasonably easy to enable monitoring of the Windows Event logs,…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question