Solved

How does FRS handle chaging file permissions

Posted on 2006-11-30
1
268 Views
Last Modified: 2008-02-01
If I change file permissions in an FRS replica set, how does FRS handle it.

Does it think the file has changed and replicate the whole file or does it just change the permissions

I have 190Gb in a replica set that I wish to change the permissions, would it be quicker to prestage it?
0
Comment
Question by:premierpc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 22

Accepted Solution

by:
Rick Hobbs earned 125 total points
ID: 18050575
Unfortunately, when you change permission on an FRS-DFS replica set, the entire replica set will be updated.  Prestaging would probably be your best bet. Or o the permission change Friday night and let it ren over the weekend.
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Let's recap what we learned from yesterday's Skyport Systems webinar.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question