Solved

"Failed to set Security on the Destination Profile" error

Posted on 2004-10-12
1
333 Views
Last Modified: 2010-04-13
I'm migrating my office from NDS to AD. All the machines are w2k pro.

This is how I migrated them:
Add machine to the domain. Create a user account in AD and set the profile to \\servername\user\profile. Logged on machine as domain administrator. Copied local user profile to \user\profile. Logged out, and back in as user. Everything worked great!

BUT, now I've got 1 machine left and I'm getting this "Failed to set Security" error message. Logged in as administrator it will not let me copy the profile to user's directory, a temp directory on the server, or even the local c: drive.

What am I missing? I've successfully moved all the others using this method. Anybody have an idea what I could be over-looking?

Thanks!
0
Comment
Question by:hullc65203
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 9

Accepted Solution

by:
BigC666 earned 500 total points
ID: 12291352
howdy,

have a look at this http://www.experts-exchange.com/Operating_Systems/WinXP/Q_20720453.html

hope that it helps
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Popular third-party chat platforms like Slack, Discord, and Telegram are just a few of the many new productivity applications that are being hijacked by cybercriminals to create command-and-control (C&C) communications infrastructures for their malw…
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question