Solved

Permissions

Posted on 2006-11-12
2
281 Views
Last Modified: 2010-04-11
Hi


I'm having bit of trouble understanding some mcse study question..

Q1) Basically what's the difference, in permission settings between (a) and (b): -

a) Allow inertiable permissions from the parent to propagate to this object and all child objects. Include these with entries explicity defiened here

b) Replace permission enteries on all child objects with enteries shown here that apply to child objects

2) When would you use each one?

0
Comment
Question by:LFC1980
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 125 total points
ID: 17926184
You would use b) if you want to modify permissions for a subtree and it's decendents.

If you are glad with (default) settings taken from the parent use a)

Of cause you can mix boths until no one knows what permissions are valid on a longer path to the deepest folder.

Keep on thing in mind: these permission settings are applied once, if you move a folder / file to a hand-crafted-folder, the old permissions on that folder are still active.

E.g. you move folder B - that allows just r/o for anyone to a folder A with full r/w for anyone - folder B is still just r/o (same with a file)

Tolomir
0
 

Author Comment

by:LFC1980
ID: 17926303
Thanks

Excellent explanation

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Apple.com Account Security Lockout - SCAM? 3 43
Avast Internet Security blocking QuickBooks 2017 email 10 124
Report to police 8 45
Web content filtering solution 6 24
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

756 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question