?
Solved

FRS how it works

Posted on 2011-03-08
2
Medium Priority
?
644 Views
Last Modified: 2012-05-11
Hi all

I need information about how FRS works, there is a technect article talking about that, but I need more kind of friendly explanation of how it works, I couldnt find any good article (human readable) on internet about that.

For example, since the user opens the file, what is all the cycle till the file is replicated, the file is opened, the USN journal is written, the file goes to the staging folder, then to the prestage, etc etc.. this kind of explanation.. I need to know all the cycle and how it works from start to finish.

Any help is much appreciated
Thanks very much.
0
Comment
Question by:M7K
2 Comments
 
LVL 21

Accepted Solution

by:
snusgubben earned 2000 total points
ID: 35068550
Have you seen this article. It explains the most of it?

http://technet.microsoft.com/en-us/library/cc758169(WS.10).aspx

0
 

Author Comment

by:M7K
ID: 35068596
I just realized that everything is there.. thanks mate!
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question