Solved

How can I export the complete folder structure

Posted on 2014-12-01
3
205 Views
Last Modified: 2014-12-17
We have a file server and I want to replicate the folder structure to another server in a new domain.  How can I export the folder structure and import it on the new server using powershell?  My end goal is to get all the data moved and the right permissions applied, but I cannot establish a trust between the old domains and new so I cannot use the ADMT.  I was going to recreate the user accounts and groups and reapply the permissions.

Would there be a way to export the folder structure and applied permissions and the reimport it on the new server?  The group names will not be the same but I can do a find and replace on the text to modify the group  names.
0
Comment
Question by:Angela Owens
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 55

Accepted Solution

by:
McKnife earned 500 total points
ID: 40474586
Hi.

ACLs work with security identifiers (SID). These will not be the same in the new Domain, so Tools that dump the old ACLs to apply them to the new file Server will fail, unless you Combine them with Subinacl. Subinacl is a tool that can map old ACL entries to new ones, to Substitute the old SID to the new.

So steps would be

1 dump ACLs using icacls .exe into an acl-file
2 Transfer data
3 apply the dumped ACLfile
4 use subinacl to Substitute old SID with current SIDs
0
 

Author Comment

by:Angela Owens
ID: 40475875
thank you!  I will give that a try!
0
 

Author Closing Comment

by:Angela Owens
ID: 40506154
I didnt have time to get the Subacl to work but I think if i had more time to devote to it, it would have worked.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Part One of the two-part Q&A series with MalwareTech.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Suggested Courses
Course of the Month8 days, 20 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question