Keep Original SIDs in NTFS and Share Permissions
This advanced feature is intended for some specific scenarios, such as a migration of accounts without a data migration taking place, by moving the physical disks or the SAN connection from source to target system.
Another scenario this feature is useful for, is the migration between two domains and you temporarily want to retain the ability to access data for both, users in the source domain and users already working in the target domain (co-existence scenario).
Migrate user and group accounts to the target system and run a "Security & Attributes" job to add them with identical access rights in NTFS and share level permissions.
Switch Disk/SAN to new System
Next the disk or SAN connection gets moved to the new system. If anything goes wrong you could rollback by moving the disk/SAN connection back to the source system.
Finally run a clean-up job to remove references to the old accounts by running another "Security & Attributes" job.
Windows User Profiles
Optionally migrate user profiles hosted on RDP servers or profiles of roaming users by enabling the corresponding option in the "User Environment" page of your job definition. If enabled and if migrating the folder containing the profiles to the target server, CopyRight2 will automatically update references to the source system with references to the target system. Additionally you can supply it with additional computer names or strings it should search and replace in HKCU. It will automatically update permissions set within HKCU to match the migrated user accounts and allow the user profile to get mounted after a user logs on.
If you want to migrate profiles hosted on workstations we recommend 3rd party tools, for example the excellent ForensIT User Profile Wizard
not only migrating the profiles on the workstations but additionally allowing you to change the workstations domain membership from a central location.
Update the location of LNK shortcuts and automatically replace references to the old system with references to the new system.
Most Recently Used Files (MRU)
Update the most recently used file lists of users and other registry locations referencing the source system's name to reflect the new system's name.
Persistent Network Connections
Update persistent network connections to reflect the new UNC path.
Exclusion / Inclusion Lists for Data and Accounts
Exclusion and inclusion lists allow you to either use a positive or a negative lists of files, folders or account to migrate. Additionally you can specify filters using any of the file and folders time stamps.
Include & Exclude Data and Accounts
You can use inclusion and exclusion lists to limit which data or accounts are getting migrated. You can include/exclude files and folders based on their name, path or file extension. You can specify paths of the source or the target system. Accounts can be filtered for based on their name.
Filter Files and Folders by Time Stamp
Additionally you can set-up a filter in your data migration job, to filter by creation time, last modification time or the last accessed time.
CSV Input File Support
You can use CSV files to control aspects of your migration, such as the source & target folders or the names of user and group accounts. This is useful if you want to integrate the migration process with other external processes and systems allowing them to dynamically control the migration.
Source & Target Folders
In addition to defining the source and target folders statically within your job definition, you can configure it to use a CSV file instead.
Accounts to Migrate
Just like the source and target folders, you can specify the names of user and group accounts you want to migrate in a CSV file.
Inclusion & Exclusion Lists
Instead of a static definition in the job configuration, the inclusion & exclusion lists can use CSV files as well.
You can run CopyRight2 interactively on the source, the target or a 3rd computer. It is integrated with Windows Task Scheduler, so you can schedule it to run in the background to synchronize the target at a specified interval. In case of larger scale migrations, with hundreds of systems to migrate, you can use CopyRight2's template based rollout planning feature to deploy, control and monitor the migration process from a central location. All features are accessible through CopyRight2's command line interface if you should prefer scripting.
Background Execution of Scheduled Jobs
Configure jobs to run scheduled at a specified interval and in the background when no one is logged on to the system.
Email Notifications and Event Log Reporting
Jobs can optionally send out notifications by email or report to the Windows® event log upon success or failure.
Use CopyRight2's template based rollout planning feature to centrally control and monitor larger scale migrations.