Solved

Windows Server 2008 Folder Security - take ownership but retain original rights?

Posted on 2011-10-01
4
733 Views
Last Modified: 2012-05-12
Hi,

I'm migrating a server / network this weekend from Windows Server 2003 to Windows Server 2008.
The users used to use Folder Redirection on their old network, so I'm going to continue to do so on the new one (however I'm not going to use roaming profiles this time as they rarely change actual PC's and folder redirection now has a lot more folders included).

Now the previous folder that held all the Folder redirection paths has been copied to the new server. I was now going to manually move users old folder redirected folders to the location created for them on the new server. (so I have already logged in as the users on the new server environment and empty folders have been created).


My issue is that as administrator on the new server, if I try to access the new user folders unde folder redirection I do not have permission to do so. It says I have to take ownership to do so. But if I take ownership as administrator then the original user may loose access and then I have to regnant each particular user rights over that file.

What is the best way to have it so that the administrator has access to all the users folders under the folder redirect, but  I do not have to regnant permission to the original owner.


I do hope my question makes sense. Thanks in advance.
0
Comment
Question by:afflik1923
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 9

Accepted Solution

by:
ghodder earned 350 total points
ID: 36896054
Doing it manually there is no quick process.

Basically you take ownership as administrator and apply it to all children, assign permissions for administrator as well as the appropriate user and apply to all children, change the owner back to the appropriate user and apply to all children, then copy in whatever files you need to copy.
0
 

Author Comment

by:afflik1923
ID: 36896211
OK than, thanks. That's what I'll have to do. Thanks.
0
 
LVL 6

Assisted Solution

by:penguinjas
penguinjas earned 150 total points
ID: 36898446
Method  1 - File server migration tool is one method.  

http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=10268

Method 2 - backup and restore
Depending on what backup software you use and the speed of restore sometimes this is a better bet.  You run a full backup the night before, on the night of disable shares at set time on the old server to avoid accidental access. run an incremental and Kick off your restore to the new server, enable the shares and all permissions are restored with the files.
0
 

Author Closing Comment

by:afflik1923
ID: 36930337
Manual was the approach I took in the end.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question