Terminal Server  Profile Migration

Posted on 2012-08-10
Last Modified: 2013-01-25
Can anyone advice me on a good and reliable strategy in migrating Terminal service users profile from Win2K3 over to a Win2k8R2 box?
All users profile data is stored on a file server and mapped.
Is there a script to migrate 300+ users profile from a win2k3 platform to win2k8R2 platform, safely and reliably with all the users files, and services such as network printers, Outlook emails profiles, critical apps ,etc.

How about test and confirming that the migration was successfully transfer over,  is there any tricks or tips on how to valid post-migration?
Aside from logging in as the user and making sure everything works x 300 users.
Thank you,
Question by:DowneyCity

    Assisted Solution

    Take a look at the Microsoft Support doc on the topic;EN-US;947025 and see if it helps.
    LVL 33

    Accepted Solution

    The Windows 2000\2003 Terminal Server user profiles are the old v1 user profile structure.  Windows 2008\08R2\2012 are the v2 user profile.  So your user profiles will not directly migrate from 2003 to 2008 R2.
    Since you are not using roaming profiles, your migration path will change depending on how much user customization you want to transfer.  If you want to migrate the entire user profile, settings and all, then you will need convert to roaming profiles and use USMT.  If you are simply concerned with user data, then you can implement folder redirection to migrate the data off the old TS and make it available on the new RDS.;EN-US;947025



    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    Learn more about how the humble email signature can be used as more than just an electronic business card. When used correctly, a signature can easily be tailored for different purposes by different departments within an organization.
    Granting full access permission allows users to access mailboxes present in their database. By giving full access permission one can open and read the content of any mailbox but cannot send emails from that mailbox.
    The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    7 Experts available now in Live!

    Get 1:1 Help Now