Solved

How can I keep the security settings (ACL) when I copy a network folder to another location ?

Posted on 2007-11-14
4
626 Views
Last Modified: 2013-12-04
Hi,

In windows XP, I can changed the value of this regkey to keep the ACL set on a folder. So when I copy a folder and paste it in another location on my network, the security was automatically set.

[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
"ForceCopyAclwithFile"=dword:00000001"

Do you know how can I do this in Vista? Or do you have another way to do this ?
0
Comment
Question by:mchart911
  • 2
4 Comments
 
LVL 14

Expert Comment

by:Geisrud
ID: 20282831
If you copy a folder/file, it inherits the permissions from the parent folder.  If you move a folder/file it retains its permissions.
0
 

Author Comment

by:mchart911
ID: 20283038
Yes I know. The reason I need to retains the permissions on "copy" is because we use a client template (we build a complete folder structure with correct permission). In fact, when we have a new client folder to create, we simply copy and paste the "client template" and rename it to the new client name.
0
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 20284903
I would use robocopy since it can also do ACL copying.

See the Windows resource lit or the MS site to grab it.

I hope this helps !
0
 

Author Closing Comment

by:mchart911
ID: 31409213
Thanks for your help, it's working very well !!! Thank you !
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ensuring effective and secure communication in the age of healthcare BYOD.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question