[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Problem with Windows 2000 security

Posted on 2004-11-08
2
Medium Priority
?
168 Views
Last Modified: 2013-12-04
have one Windows 2000 server in an NT network. The engineering dept has a directory with several subdirectories. The directories all have different secutiy levels. One directory is open to all for modification. They drop their files in there and then an enginiring supervisor reviews and moves the files to a read only directory. The problem is if you cut and paste the file it does not pick up the security of the new subdirectory. However, if you copy the file it does pick up the new security. Then you have to delete the file from the directory that is open for modification.  Is this normal or is there something I am overlooking?
0
Comment
Question by:jtennyson
  • 2
2 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 500 total points
ID: 12523214
This is completely normal 2000 activity

File/Folder Permissions

Copy within the same NTFS partition Inherit the permissions of the target folder
Copy between NTFS partitions or hard drives Inherit the permissions of the target folder
   
Move within the same NTFS partition Retain the permissions of the source folder
Move between NTFS partitions or hard drives Inherit the permissions of the target folder
Copying or Moving from NTFS partitions to FAT or non NTFS partitions removes all permissions.


http://www.svrops.com/svrops/documents/movecopy.htm
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 12524329
Thanq
0

Featured Post

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Loops Section Overview
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question