Solved

How to send Deleted Files on a Networked computer to Recycle Bin ?

Posted on 2009-04-14
4
296 Views
Last Modified: 2013-12-02
I have data on a single file server on Windows Server 2008 accessed by 40 users on the network.

Is there any way that a file deleted by any of the network users goes to the Recycle Bin instead of getting deleted immediately ?
0
Comment
Question by:123bora
  • 2
  • 2
4 Comments
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24137159

There is no recycle bin when accessing a file over the network. What you are seeing where files are deleted immediately is by design in Windows; there is no way to enable a 'network' recycle bin natively.

On a network, the feature you are looking to enable is Volume Shadow Copies: http://technet.microsoft.com/en-us/library/cc757854.aspx. This takes snapshots of the disks in the server at times designated by the Administrator, and makes these available to the end-user to restore data directly from this snapshot backup whenever they wish.

-Matt
0
 

Author Comment

by:123bora
ID: 24140769
I was aware of the shadow copy option, was wondering if there was another way.
0
 
LVL 58

Expert Comment

by:tigermatt
ID: 24140796
Any reason for the 'B' grade? Only an answer of "You can't do that" is still a valid answer under EE policy, and I gave you a workaround.
0
 

Author Comment

by:123bora
ID: 24149791
I'm sorry, I don't know any way of changing it now. Your comment was certainly helpful, but I did find a software which replaces the Recycle Bin and does the job for me.
0

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question