Solved

Help with File Server Migration tool

Posted on 2008-10-27
2
2,731 Views
Last Modified: 2013-12-05
Hello Everyone,

I'm wondering what Microsofts FSM tool does with files that exceed the math path limit. Does it still copy them? Or does it exclude them? Whats the best way to avoid this error and keep everything intact?
0
Comment
Question by:Methodman85
2 Comments
 
LVL 10

Assisted Solution

by:fm250
fm250 earned 500 total points
ID: 22823540
the best thing is to get you ghost software to do this. symantec has one and TrueImage Server. another cheap one is this: http://www.terabyteunlimited.com/image-for-windows.htm
there are free functional trail as well.
 
hope this helps!
0
 
LVL 1

Accepted Solution

by:
Methodman85 earned 0 total points
ID: 22830503
It turns out it just a warning message because some applications cannot access files with a path or name longer than 260 characters... the file is still copied though.
0

Featured Post

Forrester Webinar: xMatters Delivers 261% ROI

Guest speaker Dean Davison, Forrester Principal Consultant, explains how a Fortune 500 communication company using xMatters found these results: Achieved a 261% ROI, Experienced $753,280 in net present value benefits over 3 years and Reduced MTTR by 91% for tier 1 incidents.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Setting up a Microsoft WSUS update system is free relatively speaking if you have hard disk space and processor capacity.   However, WSUS can be a blessing and a curse. For example, there is nothing worse than approving updates and they just have…
Issue: One Windows 2008 R2 64bit server on the network unable to connect to a buffalo Device (Linkstation) with firmware version 1.56. There are a total of four servers on the network this being one of them. Troubleshooting Steps: Connect via h…
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question