Solved

Re-structuring Network Drives & Folders

Posted on 2011-03-14
4
739 Views
Last Modified: 2012-05-11
As an IT Consultant I am looking into best practices when it comes to re-structuring all Folders/Drives on a Windows Server for a number of small businesses.

When the business first started out there was not a lot of thought put into security and hierarchy, so we are now faced with a big mess of duplicate files, files saved to local drives and general chaos.

What advice can you offer based upon your experiences in the field to either setup or re-setup?
0
Comment
Question by:Flipp
4 Comments
 
LVL 9

Accepted Solution

by:
authen-tech earned 125 total points
ID: 35133223
I usually start with a Shared folder on the root.  Then start with a folder structure from there...allowing for different departments or management groups to have their own folder.  You want to make it easy for sharing, security, and backup purposes (that's why I put it all under one folder).  You really need to have each user help find the latest documents.  They will know what is important.  Also, when duplicate files are created, it's easy to see which one to keep by checking the last modified date.  

Lastly...keep the old backups!  Don't get rid of anything for a long while until you're sure everyone has had time to be sure they have all their recent documents.

If you need to start migrating to the new folder system, MS Synctoy is a free and great tool.  It lets you sync folders one way and then again before you stop sharing the old folder...only moving the new or changed files the second time.  Very big time saver!

Hope that helps,

Todd
0
 
LVL 26

Assisted Solution

by:MidnightOne
MidnightOne earned 125 total points
ID: 35169827
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!Grab your own Copy backup of the server with NTBackup before starting a blessed thing!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Rearranging folders and structures is a dicey business. It will take time (billable time) and a sit-down with the client to figure out what is what and where things are stored.

As far as the shares, you can move the shared folders around, however this may screw with the local permissions. As authen-tech says, keep the old backups.

If they're dealing with a lot of locally-saved documents, using folder redirection for the desktop and "My Documents" can save you a world of time and hurt by putting those onto the server for backup.

If everyone has their own mapped drives, you need to find out what they are and where they map. I recommend using GPOs and logon scripts based on job functions; some use one GPO per logon script, but I feel it's excessive.
0
 

Expert Comment

by:aaronmarks
ID: 35170953
http://support.microsoft.com/kb/323007

xcopy c:\olddocs c:\newdocs /O /X /E /H /K

Very useful command.
0
 
LVL 6

Author Closing Comment

by:Flipp
ID: 35176765
Thank you all!
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email signature management is something that is often overlooked in many organizations or is simply not implemented effectively. Let's take a look at what methods are available for managing this important piece of corporate branding.
Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question