Solved

Regarding File Sharing Permissions, what is difference between Allow unchecked/Deny unchecked, and Allow unchecked/Deny checked?

Posted on 2004-10-14
1
869 Views
Last Modified: 2006-11-17
In Windows XP, if I right click a folder in Windows Explorer and go to "Sharing and Security", and then the "Sharing" Tab, and then "Permissions", I am offered the following choices:

Allow or Deny:
Full Control
Change
Read

What I don't understand is you can:
Uncheck Allow and Uncheck Deny
or
Uncheck Allow and Check Deny

What is the difference???  If Allow is unchecked doesn't that imply Deny?  I assume there is a finer point I am missing here.  Any help is greatly appreciated!
0
Comment
Question by:markabe1
1 Comment
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 12314064
Hope this para can be clear and not confusing. Didnot want to confuse you with my statements,
See if this makes some sense
http://www.pcguide.com/ref/hdd/file/ntfs/secRes-c.html

Read this:

Windows 2000 offers much better control over how permissions are assigned, as well as the benefits of dynamic inheritance and advanced inheritance control. However, these extra features make permission resolution much more complicated. In addition to the potential conflicts caused by users being in more than one user group, as above, you can have conflicts between permissions that were set for the object directly and those that were inherited from any of the object's predecessors: its parent, grandparent and so on. Furthermore, the existence of both "allow" and "deny" permissions complicates matters further. To deal with these complexities, Windows 2000 uses an algorithm that follows these general rules:


0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
f5 Persistence 14 52
eigrp - not allow a subnet from advertising 1 38
Nimble Storage 3 69
Cisco 3650 switch 7 32
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question