Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Folder Redirection deleting items

Posted on 2008-06-24
3
Medium Priority
?
250 Views
Last Modified: 2010-05-18
I have Folder Redirection setup on several machines and sometimes when my users delete a file it completely bypasses the Recycle Bin. The files are not large and I believe they are typically on the desktop when the user deletes them.  Is there a setting I need to set to keep this from happening?
0
Comment
Question by:dpickard
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 8

Accepted Solution

by:
DenverRick earned 1000 total points
ID: 21860462
Are these "Redirections" involving locations on Servers, i.e. did you redirect the Desktop to a Folder on a Server?  If so they will not go to the Recycle Bin on the workstation since the File is physically located on a Server.  Files on Servers deleted on Workstations never go to any Recycle Bin unless you add third party software to the server that is designed to handle this.
0
 

Author Closing Comment

by:dpickard
ID: 31470371
Not the answer I was hoping for but one I was kind of expecting. Thanks, do you happen to know of any good 3rd party programs?
0
 
LVL 8

Expert Comment

by:DenverRick
ID: 21860571
Have you considered Server 2003's Volume Shadow Copy.  This would allow users to restore to any version (last 100) that was made depending on the schedule you setup. Be careful, depending on the size of your Folders, the speed of the platters, and the speed of the Server you can easily create a "bod down" effect while the schedule runs.  I set most of my sites up for 6am, 12pm, 6pm.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
Let's recap what we learned from yesterday's Skyport Systems webinar.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question