Solved

Robocopy command line

Posted on 2016-11-02
6
89 Views
Last Modified: 2016-11-02
I have been reading robo copy how to and in all this, I need to know the exact command line to robo copy the guys drive to a shared folder. I need all his data. Now I assume this will not copy system files or is there a command to do that as well. One command to copy the entire drive and do not care about empty folders.
0
Comment
Question by:millerdog
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41870061
The command:
robocopy.exe "PATH_DRIVE...." "SHARED_FOLDER...." /E /ZB /R:5 /W:5 /ETA /LOG:"C:\temp\log.txt"

Open in new window

0
 

Author Comment

by:millerdog
ID: 41870073
So the quotation marks are needed?
0
 

Author Comment

by:millerdog
ID: 41870074
What does the log do?
0
[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

 
LVL 19

Accepted Solution

by:
*** Hopeleonie *** earned 500 total points
ID: 41870105
So the quotation marks are needed?
Not necessary but I do include quotation to minimize path errors.

What does the log do?
I create a log every time as an evidence.
0
 

Author Closing Comment

by:millerdog
ID: 41870242
The answer was perfect and to the point. I checked Google first but the answers are long and winded. This answered all I needed to know and thanks.
0
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41871532
I was glad to help you. :-)
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The following is a collection of cases for strange behaviour when using advanced techniques in DOS batch files. You should have some basic experience in batch "programming", as I'm assuming some knowledge and not further explain the basics. For some…
YESTERDAY YESTERDAY.BAT is inspired by a previous article I wrote entitled: TOMORROW.BAT (http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/MS_DOS/A_4196-Advanced-Batch-File-Programming-TOMORROW-BAT.html). The crux of this batch f…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question