Solved

W2k Server.  User name changed, is there anyway to automate the permission change throughout the file structure

Posted on 2006-06-21
2
181 Views
Last Modified: 2013-12-04
Hi guys.

We are running windows 2000 server as a file server.

Recently one of our users has got married and as a result required their username changed.  What I would like to know is if there is any software/scripting that can be used to trawl through the whole file structure and basically replace the old username with the new username, including copying the exact permissions on each of these files/folders.

If this is not possible is there any way to print out a directory listing that will show me the permissions used throughout each directory so I do not have to search though all of them manually.

It is quite urgent as the user wants to be able to use her new name straight away.
Any help would be appreciated.

Cheers
Steve
0
Comment
Question by:spaffey
2 Comments
 
LVL 25

Accepted Solution

by:
mikeleebrla earned 500 total points
ID: 16952435
all you need to do is rightclick on her name and choose 'rename', then a box will pop up giving you all the fields that you would like to change, logon name, fullname etc etc.

Security is tied to the SID (Security IDentifier), not the display/logon/fullname/ect. so you can change them all you want and it won't affect the NTFS security permissions at all.

FYI, if you have exchange, set it up so that both her maiden and married name can recieve email.
0
 

Author Comment

by:spaffey
ID: 16952741
Cheers Fella, thought it would be that TBH.  Funnily enough my manager wasn't sure how to do it and thats why I was given the task of creating a new account and reassigning everything (didn't really fancy doing that).

At least mt thoughts are confirmed and I can have an easier job if the same thing happens again.

Cheers again.
Steve

BTW we already had the exchange mail sorted but thanks for the suggestion.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now