Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

SBS 2008 best practice re. issue with users moving folders

Posted on 2013-01-29
1
Medium Priority
?
224 Views
Last Modified: 2013-02-14
A user moved a folder from the SBS server by mistake, rather than copying this; however is there a simple way of preventing this type of problem from occuring, without restricting a user's ability to modify files and / or create sub folders.

The user concerned was a member of a security group which had full access to the server area concerned.

This seems to be quite a common issue, but I am not sure if there is a workable solution to this.
0
Comment
Question by:itcroydon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 37

Accepted Solution

by:
ArneLovius earned 2000 total points
ID: 38833657
moving is copying (reading, then writing) and deleting

usually removing one of those capabilities makes work rather difficult...
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

After seeing many questions for JRNL_WRAP_ERROR for replication failure, I thought it would be useful to write this article.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question