Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

DFS & replicating file on share

Posted on 2012-03-28
1
Medium Priority
?
393 Views
Last Modified: 2012-03-29
Hi,
I am building a dfs share where I will be dumping many of sensitive files.
These files are picked up by server on other side for processing.

My question ,s ay I am copying a 300MB file1.txt at root share which takes next 15 mins. What would be contents of Replicated share until 14 mins. I know by 15 mins the file will be replicated? Will it show file1.txt or file1part.txt with incomplete records?

Main root Share  (300MB file1.txt takes 15 mins to get copied )
        |
Replicated Share

I am looking for some official links please.

Thanks
0
Comment
Question by:crazywolf2010
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
awaggoner earned 2000 total points
ID: 37777126
http://technet.microsoft.com/en-us/library/cc782648%28v=ws.10%29.aspx

DFS stages the files in a separate folder until replication is complete
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A hard and fast method for reducing Active Directory Administrators members.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question