Solved

When cutting and pasting files, they maintain their original folder permissions instead of acquiring those of their destination folder

Posted on 2006-06-10
3
278 Views
Last Modified: 2010-04-18
I know that this issue is normal for XP, but somewhere I read Winserver2003 correctly switches permissions when cutting files from
a directory to another
0
Comment
Question by:orsobubu
3 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 250 total points
ID: 16878696
That's normal behavior for every NT based Windows, at least if it takes place on the same partition. Cutting and pasting is a move, so if source and target folder are on the same partition, the NTFS permissions are retained.
0
 
LVL 5

Expert Comment

by:llefebure
ID: 16879183
When I need to transfer a folder to a different drive and keep the NTFS permissions, I'll use xcopy with a few switches. An example command is:

xcopy C:\source\*.* D:\destination\ /E /H /O

/E           Copies directories and subdirectories, including empty ones.
/H           Copies hidden and system files also.
/O           Copies file ownership and ACL information.

You can also use some other utilities like robocopy (command line) or the Microsoft File Server Migration Toolkit (FSMT) (a nice GUI)
http://www.microsoft.com/technet/abouttn/subscriptions/flash/tips/tips_040506.mspx
0
 

Author Comment

by:orsobubu
ID: 16916071
ok, but I really think that this behavior is not so wise, as in a destination folder there will be files with very different permissions with no possibility of recognize them aside than "replacing permissions on all child objects" command. I will instruct all users never to cut and paste files.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question