Solved

Regarding File Sharing Permissions, what is difference between Allow unchecked/Deny unchecked, and Allow unchecked/Deny checked?

Posted on 2004-10-14
1
867 Views
Last Modified: 2006-11-17
In Windows XP, if I right click a folder in Windows Explorer and go to "Sharing and Security", and then the "Sharing" Tab, and then "Permissions", I am offered the following choices:

Allow or Deny:
Full Control
Change
Read

What I don't understand is you can:
Uncheck Allow and Uncheck Deny
or
Uncheck Allow and Check Deny

What is the difference???  If Allow is unchecked doesn't that imply Deny?  I assume there is a finer point I am missing here.  Any help is greatly appreciated!
0
Comment
Question by:markabe1
1 Comment
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 500 total points
ID: 12314064
Hope this para can be clear and not confusing. Didnot want to confuse you with my statements,
See if this makes some sense
http://www.pcguide.com/ref/hdd/file/ntfs/secRes-c.html

Read this:

Windows 2000 offers much better control over how permissions are assigned, as well as the benefits of dynamic inheritance and advanced inheritance control. However, these extra features make permission resolution much more complicated. In addition to the potential conflicts caused by users being in more than one user group, as above, you can have conflicts between permissions that were set for the object directly and those that were inherited from any of the object's predecessors: its parent, grandparent and so on. Furthermore, the existence of both "allow" and "deny" permissions complicates matters further. To deal with these complexities, Windows 2000 uses an algorithm that follows these general rules:


0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now