Problem with Windows 2000 security

Posted on 2004-11-08
Last Modified: 2013-12-04
have one Windows 2000 server in an NT network. The engineering dept has a directory with several subdirectories. The directories all have different secutiy levels. One directory is open to all for modification. They drop their files in there and then an enginiring supervisor reviews and moves the files to a read only directory. The problem is if you cut and paste the file it does not pick up the security of the new subdirectory. However, if you copy the file it does pick up the new security. Then you have to delete the file from the directory that is open for modification.  Is this normal or is there something I am overlooking?
Question by:jtennyson
    LVL 57

    Accepted Solution

    This is completely normal 2000 activity

    File/Folder Permissions

    Copy within the same NTFS partition Inherit the permissions of the target folder
    Copy between NTFS partitions or hard drives Inherit the permissions of the target folder
    Move within the same NTFS partition Retain the permissions of the source folder
    Move between NTFS partitions or hard drives Inherit the permissions of the target folder
    Copying or Moving from NTFS partitions to FAT or non NTFS partitions removes all permissions.
    LVL 57

    Expert Comment

    by:Pete Long

    Featured Post

    Highfive Gives IT Their Time Back

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Join & Write a Comment

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Article by: btan
    The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
    how to add IIS SMTP to handle application/Scanner relays into office 365.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now