Solved

Access denied when I want to sync offline files

Posted on 2011-03-23
5
324 Views
Last Modified: 2012-05-11
Hello,

This is my situation :
I have a HomeDirectory as :
\\server_1\toto
The sync works fine.

I migrate all the data to a new file server (Netapp bay), now the HomeDirectory is like that :
\\server_2\folder\%username%

Then the user has a network drive S:\, which point to \\server_2\folder\%username%.
When I want to make this drive available with offline files I have an error message "Access Denied".

I don't understand why, the user has all right to his HomeDir.

Thanks in advance for your help, it's urgent.
0
Comment
Question by:croustimiel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 10

Expert Comment

by:Hutch_77
ID: 35200927
You may need to kill the cache and rebuild it with the new mapped drive.
0
 

Author Comment

by:croustimiel
ID: 35201034
OK, how can I make it ?
I already make Ctrl+SHIFT + Suppress file and reboot.
And after right click on the network drive and "make available offline files"

What can I do ?

0
 
LVL 1

Accepted Solution

by:
squickel earned 500 total points
ID: 35201222
You may need to set the Share permissions as well as the permissions on the folder?
0
 

Author Comment

by:croustimiel
ID: 35202027
The user has the RW rights on his folder %username%.
On "folder", "everyone" has all rights too for share permission
0
 

Author Closing Comment

by:croustimiel
ID: 35215362
Infact, it was that.
Shame on me, I didn't see that.

Thanks
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question