Solved

Create new user with same permissions as another user in Server 2003

Posted on 2009-07-09
2
207 Views
Last Modified: 2012-05-07
Hi all,

We have a network with 10 users on it and each user has a pretty unique set of user permissions to various directories on the server and also to various people's mailboxes and calendars.  The user with the most diverse and complex set of permissions has left the company and is being replaced by a new user who needs exactly the same permissions.  I can't rename the old user as we need to keep her email address open for a while so need to create an identical user.

Is there a way of creating a new user that will automatically inherit all the access rights, permissions and mailbox permissions of the old user?

Thanks

Adam
0
Comment
Question by:amlydiate
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Accepted Solution

by:
rhandels earned 500 total points
ID: 24811760
Hey,

In a very very small answer, no there isn't.. But this heavily depends on how you set up your security. If you used groups then yes you can just place this user in the same groups the old user was. This way He or she will receive the exact same permissions (which is a best practice stated by Microsoft, exactly because of the issue you're stating out right now.).

The other option you have is simply rename the account and add a second e-mail address to this account. This way the new user will have his or her own username and will still receive e-mails send to the user that has left the company.. This can be done by using the AD Users & Computers going to the e-mail tab and add a new SMTP address...
0
 

Author Closing Comment

by:amlydiate
ID: 31601485
Excellent many thanks for that!
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP,  Windows Server…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question