[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Using Subinacl

Posted on 2004-09-29
2
Medium Priority
?
606 Views
Last Modified: 2013-12-04
Hi

I am trying to create a script to give users full access to the C: drive of a machine, I have managed to get that right but also need to know if i can get Subinacl
to exclude the c:\windows\system32 folder from being changed to full control and just stay the same.

Thanks

Leon
0
Comment
Question by:RMBTechnology
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 150 total points
ID: 12197417
The easiest thing to do, would probably be to have 3 parts to the script
1) print the current permissions ( owners etc,,,if necessary) of the dir you wish to remain the same
2) change all dir's to Everyone F C
3) use the values that you recoded for the system32 folder (and sub-folders?), and apply them back to that directory (and sub-folders?)

You may want to check out XcACLS.exe also
http://www.microsoft.com/windows2000/techinfo/reskit/tools/existing/xcacls-o.asp
-rich
0

Featured Post

Are You Ready for GDPR?

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question