Solved

Something similar to FSRM from R2, without having R2

Posted on 2010-09-08
3
624 Views
Last Modified: 2012-06-21
Hello,

I am looking to implement the folder quota management. Also i would REALLLY like to block certain files from the server (usual suspects - .exe, music, pictures).
My previous employer had an 2003 R2 server, and i really enjoyed the simple yet full of features FSRM.
now i want to (need) to do the same thing on SBS2K3 server that doesnt have R2 installed. Also, it has at least 2 years of life in it, so getting a new server with new OS with all those features that i need is not an option at the moment.

anyone has any suggestions???
i can enable basic "Quota management" on the drive and limit the size of hte home drives, but
i have no clue yet how to block users from saving pictures and music to their home drives.
i either need a pointer to the GPO that can do something like it (i couldnt find it),
or a 3rd party program/utility that would be cheap and effective. by cheap i mean it has to be cheap enough to stop my from considering buying R2

Thanks
0
Comment
Question by:Lisij
3 Comments
 
LVL 15

Expert Comment

by:Dave_AND
ID: 33631990
There is no way to "filter" live the same was as FSRM, you could create a batch file deleting all .exe and .mp3 for example on an hourly basis or daily.

easy batch to make:

del *.mp3 /s /q
del *.exe /s /q

etc etc
0
 
LVL 56

Expert Comment

by:Cliff Galiher
ID: 33632074
To do the type of filtering you want, the product has to tie in at the OS filesystem level (which FSRM does) and nobody does that inexpensively. After all, if you could do everything that newer versions of an OS can do cheaper, there would never be a reason to upgrade the OS.
-Cliff
 
0
 
LVL 3

Accepted Solution

by:
Lisij earned 0 total points
ID: 33702962
so to sum it up, except for the r2 functionality, i am SOL. thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now