Update Scripts/Batch/Robocopy.md
This commit is contained in:
		| @@ -7,14 +7,14 @@ An example of using Robocopy is below, with a full breakdown: | ||||
| ``` | ||||
| robocopy "E:\Share" "Z:\Share" /Z /B /R:5 /W:5 /MT:4 /COPYALL /E | ||||
| ``` | ||||
| - `robocopy "source" "destination"` : The application itself | ||||
| - `/Z` : Network Resume Mode - If the network connection (if using a network share or something) is interrupted, it will resume when the network comes back online `Useful if the network is unstable` | ||||
| - `/B` : Backup Mode - This, in some unique circumstances, can be used to circumvent ACLs on folders and files, just forcing them to copy bypassing permissions | ||||
| - `R:5` : Number of times to retry copying the same file | ||||
| - `W:5` : The number of seconds to wait between retries | ||||
| - `/MT:4` : *_Threaded_* copies that run on their own threads | ||||
| - `/COPYALL` : Retain all file/folder permissions and ownership data | ||||
| - `/E` : Copy every folder, including empty ones | ||||
| * `robocopy "source" "destination"` : The application itself | ||||
| * `/Z` : Network Resume Mode - If the network connection (if using a network share or something) is interrupted, it will resume when the network comes back online `Useful if the network is unstable` | ||||
| * `/B` : Backup Mode - This, in some unique circumstances, can be used to circumvent ACLs on folders and files, just forcing them to copy bypassing permissions | ||||
| * `R:5` : Number of times to retry copying the same file | ||||
| * `W:5` : The number of seconds to wait between retries | ||||
| * `/MT:4` : *_Threaded_* copies that run on their own threads | ||||
| * `/COPYALL` : Retain all file/folder permissions and ownership data | ||||
| * `/E` : Copy every folder, including empty ones | ||||
|  | ||||
| !!! tip "Usage of Administrative Shares" | ||||
|     Whenever dealing with copying data from one server to another, try to leverage "Administrative Shares", sometimes referred to as "Default Shares".  These exist in such a way that, if the server exists in a Windows-based domain, you can type something like `\\SERVER\C$` or `\\SERVER\E$` to access files and bypass most file access restrictions (Generally for reading data, writing works too, but not in all circumstances).   | ||||
|   | ||||
		Reference in New Issue
	
	Block a user