Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Security/Permissions & "everyone"

Posted on 2004-04-26
7
Medium Priority
?
404 Views
Last Modified: 2013-12-04
I cannot understand this, and it happens so often: In a windows network environment, there are many occasions where a user *cannot* read (write, etc...) a file, which has full sharing and security persmissions for "Everyone". As soon as I add the particular user, everything is ok. But why? How can I make "everyone" be everyone?!?
0
Comment
Question by:piou
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 67

Assisted Solution

by:sirbounty
sirbounty earned 80 total points
ID: 10917789
Is that Everyone with Full permission on both the share and security?
Perhaps there's an explicit Deny for a group they're a member of...
0
 
LVL 13

Accepted Solution

by:
ocon827679 earned 120 total points
ID: 10919081
When you have share permissions and file permissions set, the OS takes the most restrictive stance.  Say you have everyone-full on the share.  However in the file permissions you have only one group with Full and everyone as Read.  Only that group will have Full, and Everyone else will have Read only.

Within just file permissions if you have a user in two different groups and one group has full while the other has Read only, then that person will have Full since within the file permissions the "least" restrictive stance is taken.
0
 

Author Comment

by:piou
ID: 10925953
I didn't mention (sorry!) that I only have full permissions (file and network) for Everybody. And almost all times, that's only it. No other explicit permissions set. That's why I'm posing the question anyway....
0
Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

 
LVL 67

Expert Comment

by:sirbounty
ID: 10927829
Hmm - can you try perhaps creating another share on a test folder.  By default, it should be shared as Everyone/Full - just confirm the security is as well (not inherited)...
0
 

Author Comment

by:piou
ID: 10936189
Thanks ppl!
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 10938013
What was the final resolution?
0
 

Author Comment

by:piou
ID: 10938029
I think that the problem actually was that permissions do not apply when copying files from another system or windows 98 or...., and need to be reset.
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question