Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Windows 2003 Folder Security Permission

Posted on 2004-04-27
5
263 Views
Last Modified: 2013-12-04
Please help me out with this scenario , I have a folder called "Project" which has been shared with a group called "Cadusers" , I need the following security to implement on the folder.

a.      The users should able to access the Project folder along with all sub folders and files
b.      The users should be able to open there files ex. ACAD Files and work on day to day basic and save the same on the server.
c.      The users are not supposed to Rename Or Delete any folder.

Consider this as an Urgent Issue

Please help me

Zain
0
Comment
Question by:syed_khamer
  • 2
5 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 125 total points
ID: 10927285
Share the folder granting Everyone - Full Control
Now on the local security,
you're going to need to choose Advanced, Edit for the group in question and explicitly Deny the Delete and Delete Subfolders permissions.
Unfortunately, I don't think granting them the Read/Create/Write rights with the Deny will prevent a rename though...
0
 
LVL 16

Expert Comment

by:JamesDS
ID: 10927584
syed_khamer

sirbounty is right. The permissions structure you have requested is impossible.

I suggest you invest in a decent back for when they do delete something they shouldn't

Cheers

JamesDS
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 10938040
syed_khamer - can you let me know why you've given this a "C" grade?

>>
The following is a good guideline to follow when grading:

A: The Expert(s) either provided you with a thorough answer or they provided you with a link to information that thoroughly answered your question. An "A" can also be given to any answer that you found informative or enlightening beyond the direct question that you asked.

B: The Expert(s) provided an acceptable solution, or a link to an acceptable solution, that you were able to use, although you may have needed a bit more information to complete the task.

C: Because Experts' reliability are often judged by their grading records, many Experts would like the opportunity to clarify if you have questions about their solutions. If you have given the Expert(s) ample time to respond to your clarification posts and you have responded to each of their posts providing requested information; or if the answers, after clarification, lack finality or do not completely address the issue presented, then a "C" grade is an option. You also have the option here of just asking Community Support to delete the question.
<< ref: http:help.jsp#hi73
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question