Solved

NTFS permissions

Posted on 2003-10-24
4
397 Views
Last Modified: 2013-12-04
hi ...
why we avoid to share permission to sharing NTFS permissions
0
Comment
Question by:musheer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9618855
Musheer,

Check the explanation

http://techrepublic.com.com/5100-6270-1053845.html

Sunray
0
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 9620745
First of all there are some stuff you should understand:

1- Shared Permission only applies on users that access the computer from a network and thus will never protect your files from ppl who have physical access to your pc.

2- Shared Permission could be applied on any file system (FAT or NTFS)

3- NTFS Permission applies to both Local and Network Users

4- we should have NTFS partitions to be able to use NTFS partition

5- NTFS Permissions are more granular, meaning that you can set much more advanced persmissions using NTFS Permissions

6- If a user access a folder from a Network and you have set on that folder both FAT and NTFS permission the most restrictive of them both will get applied, that why it is much easier to set NTFS permissions once (and protect the folder from local and network access) and then when you share the folder only set the Shared permission as Everyone Full Control beeing sure that the NTFS Permission will be the one that will be applied since it is the most restrictive.


Hope this Helps.


Best Regards
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9624640
Musheer,

Do you want more information than the links that I had given are saying ?

Just following up

Sunray
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question