Solved

permissions question

Posted on 2003-11-10
3
276 Views
Last Modified: 2010-04-14
what is the difference between :

Full controll       X
change             X
read                 X


if i remove the full controll , what are my restrictions ?


victor
0
Comment
Question by:victorbx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 9716495
Full control is just that it allows whoever is assigned full control to do any thing they want with the folder/files

read means that the users that are assigned this and only this can only read the contents of the folder/file

>>>if i remove the full controll , what are my restrictions ?

It depenps on what other permissions you assign or don't assign to the user.
0
 
LVL 4

Expert Comment

by:darth_wannabe
ID: 9716535
removing Full control will mean that the user can not change the permissions.
0
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 9716718
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Robocopy - migrate user shares access denied 6 1,542
website 1 333
Dell PowerEdge raid drive replacement 13 527
how to run this deletion request 4 46
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The goal of this blog is to: > note what has impeded us from reaching effective life on-call > provide 3 steps to mastering life on-call > highlight what will be achieved with effective life on-call
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question