Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Permissions

Posted on 2006-11-12
2
Medium Priority
?
302 Views
Last Modified: 2010-04-11
Hi


I'm having bit of trouble understanding some mcse study question..

Q1) Basically what's the difference, in permission settings between (a) and (b): -

a) Allow inertiable permissions from the parent to propagate to this object and all child objects. Include these with entries explicity defiened here

b) Replace permission enteries on all child objects with enteries shown here that apply to child objects

2) When would you use each one?

0
Comment
Question by:LFC1980
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 17926184
You would use b) if you want to modify permissions for a subtree and it's decendents.

If you are glad with (default) settings taken from the parent use a)

Of cause you can mix boths until no one knows what permissions are valid on a longer path to the deepest folder.

Keep on thing in mind: these permission settings are applied once, if you move a folder / file to a hand-crafted-folder, the old permissions on that folder are still active.

E.g. you move folder B - that allows just r/o for anyone to a folder A with full r/w for anyone - folder B is still just r/o (same with a file)

Tolomir
0
 

Author Comment

by:LFC1980
ID: 17926303
Thanks

Excellent explanation

0

Featured Post

Ready for your healthcare security check-up?

In the past few years, healthcare organizations have become a prime target for advanced attacks. Does your organization have what it needs to defend itself? Schedule your healthcare security check-up today and download our free Healthcare Security Resource Kit today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
If you are like me and like multiple layers of protection, read on!
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question