Solved

RoboCopy

Posted on 2015-01-12
6
162 Views
Last Modified: 2015-01-12
I'm trying to use robocopy to copy some folders.  They are extremely large and I'm getting errors that theres not enough server storage to process this command.  So I"m trying to do one folder at a time.  However, when I write the command instead of just copying that folder it's doing the  entire drive.   This is what I'm using..
robocopy \\server\drive letter\folder\folder\folder\folder\and finally folder I want to copy Y:\folder /E /ZB /TEE - For now I switched to Xcopy but I think robocopy is faster.
0
Comment
Question by:WellingtonIS
  • 3
  • 3
6 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 500 total points
ID: 40544743
Enclose the paths in quotes:
robocopy "\\server\drive letter\folder\folder\folder\folder\and finally folder I want to copy" "Y:\folder" /E /ZB
0
 

Author Comment

by:WellingtonIS
ID: 40544772
OK it's showing me a screen that says DIR Total copied but nothing is showing up on the drive.
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 40544794
Does it list that files were copied?
Do you have write permissions to the target?
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 67

Expert Comment

by:sirbounty
ID: 40544795
Btw, /TEE is for writing simultaneously to the screen and log file - you weren't using a log file, so it's irrelevant.
0
 

Author Comment

by:WellingtonIS
ID: 40544815
I've requested that this question be closed as follows:

Accepted answer: 0 points for WellingtonIS's comment #a40544772

for the following reason:

I took out the quotes around the destination and it's working thanks!
0
 

Author Closing Comment

by:WellingtonIS
ID: 40544816
I took out quotes around the Y:\... and it's working
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now