Solved

What will happen to currently stored fily types that I block with FSRM?

Posted on 2008-06-11
1
208 Views
Last Modified: 2010-04-18
I have a file server that houses all sorts of files that I would like to block, and then slowly remove (.pst files, media files, etc..).  I just installed FSRM for Windows 2003 R2, and I was wondering what, if anything, will happen too all the files that are already stored on the server?  Will they stay there and just not be able to be accessed?  Deleted?  Corrupted?  etc...?  Thanks.
0
Comment
Question by:tenover
1 Comment
 
LVL 19

Accepted Solution

by:
aissim earned 500 total points
ID: 21782713
Nothing will happen to the previously saved files. Users (or applications) will still have access to those files...the FSRM will only block attempts to save certain files moving forward after your screen is in place.

So the file screening only pertains to saving of new files.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, I had the need to build a standalone system to run a point-of-sale system. I’m running this on a low-voltage Atom processor, so I wanted a light-weight operating system, but still needed Windows. I chose to use Microsoft Windows Server 200…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question