Redirect User Data to Network Shares
One of the most often asked features in recent years has to do with changing where user documents are stored. One of the best times to make such a change is a system refresh, or migration time. Migrate7’s team engaged in a pain-staking review of how these policies can be supported in Migrate7. The result is a feature called “Folder Redirection.” This feature as far as we know is not found in USMT or other free products.
Using Folder Redirection is as straight-forward as the rest of Migrate7. This blog entry covers the basics.
We’ll assume you are using a Windows Server 2008 R2 environment and you want to configure Folder Redirection. This feature should work on older versions of Windows Server, although the screen shots might be different.
Profile Share Configuration
- Create a folder to store the redirected folders. (i.e. “C:\folder_redirection”)
- Share the folder and make it hidden from browsing. You do this by adding a “$” at the end of the share name.
- Give “Full Control” share permissions to the following groups:
- SYSTEM
- The security group that contains all roaming profiles domain accounts. (i.e. “Folder Redirect”)
- Domain Admins
- Built-in system admins (Administrators)
-
-
Give “Full Control” security permissions to the following groups:
- Domain Admins
- SYSTEM
- Built-in system admins (Administrators)
- The security group that contains all folder redirected domain accounts. (i.e. “Folder Redirect”) will need special permissions to the folder.
- List folder /read data (Allow)
- Create folders / write data (Allow)
- The above settings should apply to “This folder only”.
- The security group “CREATOR OWNER” will also need special permission to the folder.
- Full Control (Allow)
- The setting should apply to “Subfolders and files only”.
Running Migrate7
When running Migrate7 in an environment that is secured according to the instructions in this document you have to run Migrate7 as a Domain Admin or during logon of a redirected user.
That’s it. That’s all there is to it. Your users will never know the difference, and your IT policy experts will smile as they know that storage, backup,disaster recovery, and malware-prevention are easier to carry out on centrally-managed data.