Solved

How can I export the complete folder structure

Posted on 2014-12-01
3
195 Views
Last Modified: 2014-12-17
We have a file server and I want to replicate the folder structure to another server in a new domain.  How can I export the folder structure and import it on the new server using powershell?  My end goal is to get all the data moved and the right permissions applied, but I cannot establish a trust between the old domains and new so I cannot use the ADMT.  I was going to recreate the user accounts and groups and reapply the permissions.

Would there be a way to export the folder structure and applied permissions and the reimport it on the new server?  The group names will not be the same but I can do a find and replace on the text to modify the group  names.
0
Comment
Question by:Angela Owens
  • 2
3 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
Comment Utility
Hi.

ACLs work with security identifiers (SID). These will not be the same in the new Domain, so Tools that dump the old ACLs to apply them to the new file Server will fail, unless you Combine them with Subinacl. Subinacl is a tool that can map old ACL entries to new ones, to Substitute the old SID to the new.

So steps would be

1 dump ACLs using icacls .exe into an acl-file
2 Transfer data
3 apply the dumped ACLfile
4 use subinacl to Substitute old SID with current SIDs
0
 

Author Comment

by:Angela Owens
Comment Utility
thank you!  I will give that a try!
0
 

Author Closing Comment

by:Angela Owens
Comment Utility
I didnt have time to get the Subacl to work but I think if i had more time to devote to it, it would have worked.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Find out what Office 365 Transport Rules are, how they work and their limitations managing Office 365 signatures.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now