Solved

Setting Permissions - Class 101

Posted on 2006-07-18
1
216 Views
Last Modified: 2010-03-18
Need a refresher

If I have a security group called BOSSES and another called USERS
and I have a network folder called BOSSSTUFF

What is the best way to set permissions for BOSSES and for USERS on the he BOSSSTUFF folder

So that anyone in USERS can add or save a file to BOSSSTUFF, but no one other than BOSSES can modify or delete after it has been added.

TIA-TOMG
0
Comment
Question by:Tgilbert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 14

Accepted Solution

by:
FriarTuk earned 50 total points
ID: 17132866
on main folder - security tab - be sure bosses have full control & that users have read & execute, then click on advanced - select users & click edit, check create files & folder (be sure they don't have delete, change permission, or take ownership)
0

Featured Post

Plug and play, no additional software required!

The ATEN UE3310 USB3.1 Gen1 Extender Cable allows users to extend the distance between the computer and USB devices up to 10 m (33 ft). The UE3310 is a high-quality, cost-effective solution for professional environments such as hospitals, factories and business facilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question