Solved

WIndows 2000 Server Permission Problem - Sharing Folders

Posted on 2004-10-08
4
584 Views
Last Modified: 2012-05-05
Having a huge problem simply trying to grant access to a couple of WINXP clients to their folders on the Win2K server.  Even though all the permissions appear to be in place, they are not able to access some folders.  The folder is shared via active directory.  I have removed the share, added it back, set the permissions, and still they are denied access.  I even set the permissions to allow Everyone, and yet they are still denied. This is weird....any takers?
0
Comment
Question by:sbcw
4 Comments
 
LVL 1

Expert Comment

by:DaTom
Comment Utility
Have you checked the rights on the "share" and the rights on the "Files and Folders"?
0
 
LVL 6

Expert Comment

by:knoxj81
Comment Utility
Check the rights on the actual user. I had the same problem, and the user just didn't have the proper rights.
0
 

Author Comment

by:sbcw
Comment Utility
When I click on the sharing tab for the folders, both the permission and security tabs show these uses have full access.  Yet they do not.  This is driving me insane!!
0
 
LVL 7

Accepted Solution

by:
shahrial earned 500 total points
Comment Utility
Try this,
1.) On the server: at the shared folder, click the Security tab.
2.) Click the [Advanced] button. Untick the checkbox "Inherit from parent the permission entries that apply to child objects...blah...blah...blah".
3.) A Security window will appear, choose [Copy].
4.) Click the checkbox "Replace permission entries on all child objects with entries shown here that apply to child objects".
5.) Click [OK] to complete. Now test the user access.

Note:
If while applying the Setting shows access denied (for whatever reason), then cancel the update and do this step. Click the Owner tab, choose an owner, click the checkbox "Replace owner on subcontainers and objects". Then click [OK].
Repeat 1.) to 5.) again.

This should resolve your user access problem (I hope)...;-)
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now