Solved

NTFS permissions

Posted on 2003-10-24
4
389 Views
Last Modified: 2013-12-04
hi ...
why we avoid to share permission to sharing NTFS permissions
0
Comment
Question by:musheer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9618855
Musheer,

Check the explanation

http://techrepublic.com.com/5100-6270-1053845.html

Sunray
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9618856
0
 
LVL 49

Accepted Solution

by:
Akhater earned 500 total points
ID: 9620745
First of all there are some stuff you should understand:

1- Shared Permission only applies on users that access the computer from a network and thus will never protect your files from ppl who have physical access to your pc.

2- Shared Permission could be applied on any file system (FAT or NTFS)

3- NTFS Permission applies to both Local and Network Users

4- we should have NTFS partitions to be able to use NTFS partition

5- NTFS Permissions are more granular, meaning that you can set much more advanced persmissions using NTFS Permissions

6- If a user access a folder from a Network and you have set on that folder both FAT and NTFS permission the most restrictive of them both will get applied, that why it is much easier to set NTFS permissions once (and protect the folder from local and network access) and then when you share the folder only set the Shared permission as Everyone Full Control beeing sure that the NTFS Permission will be the one that will be applied since it is the most restrictive.


Hope this Helps.


Best Regards
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 9624640
Musheer,

Do you want more information than the links that I had given are saying ?

Just following up

Sunray
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question