Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Permissions

Posted on 2006-11-12
2
Medium Priority
?
309 Views
Last Modified: 2010-04-11
Hi


I'm having bit of trouble understanding some mcse study question..

Q1) Basically what's the difference, in permission settings between (a) and (b): -

a) Allow inertiable permissions from the parent to propagate to this object and all child objects. Include these with entries explicity defiened here

b) Replace permission enteries on all child objects with enteries shown here that apply to child objects

2) When would you use each one?

0
Comment
Question by:LFC1980
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 17926184
You would use b) if you want to modify permissions for a subtree and it's decendents.

If you are glad with (default) settings taken from the parent use a)

Of cause you can mix boths until no one knows what permissions are valid on a longer path to the deepest folder.

Keep on thing in mind: these permission settings are applied once, if you move a folder / file to a hand-crafted-folder, the old permissions on that folder are still active.

E.g. you move folder B - that allows just r/o for anyone to a folder A with full r/w for anyone - folder B is still just r/o (same with a file)

Tolomir
0
 

Author Comment

by:LFC1980
ID: 17926303
Thanks

Excellent explanation

0

Featured Post

[Webinar] Database Backup and Recovery

Does your company store data on premises, off site, in the cloud, or a combination of these? If you answered “yes”, you need a data backup recovery plan that fits each and every platform. Watch now as as Percona teaches us how to build agile data backup recovery plan.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
Spectre and Meltdown, how it affects me and my clients?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

581 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question