Solved

How can I export the complete folder structure

Posted on 2014-12-01
3
201 Views
Last Modified: 2014-12-17
We have a file server and I want to replicate the folder structure to another server in a new domain.  How can I export the folder structure and import it on the new server using powershell?  My end goal is to get all the data moved and the right permissions applied, but I cannot establish a trust between the old domains and new so I cannot use the ADMT.  I was going to recreate the user accounts and groups and reapply the permissions.

Would there be a way to export the folder structure and applied permissions and the reimport it on the new server?  The group names will not be the same but I can do a find and replace on the text to modify the group  names.
0
Comment
Question by:Angela Owens
  • 2
3 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40474586
Hi.

ACLs work with security identifiers (SID). These will not be the same in the new Domain, so Tools that dump the old ACLs to apply them to the new file Server will fail, unless you Combine them with Subinacl. Subinacl is a tool that can map old ACL entries to new ones, to Substitute the old SID to the new.

So steps would be

1 dump ACLs using icacls .exe into an acl-file
2 Transfer data
3 apply the dumped ACLfile
4 use subinacl to Substitute old SID with current SIDs
0
 

Author Comment

by:Angela Owens
ID: 40475875
thank you!  I will give that a try!
0
 

Author Closing Comment

by:Angela Owens
ID: 40506154
I didnt have time to get the Subacl to work but I think if i had more time to devote to it, it would have worked.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Botnet detection help me please 21 113
Extra security implementation for 2017 9 49
mysql disables rename 4 68
Windows 2012 PKI in a hybrid org 3 47
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question