Solved

shared folder prermissions

Posted on 2007-03-23
5
192 Views
Last Modified: 2010-04-20
on w2k3 server we have many shared folders.....on any shared folder properties window, there is permissions........what is the difference between:

1. under sharing tab: permissions
2. under security tab: permissions

do we have configure both permissions ?
0
Comment
Question by:rrajani
  • 2
  • 2
5 Comments
 
LVL 67

Accepted Solution

by:
sirbounty earned 250 total points
ID: 18781586
Most often, sharing is set to everyone/full control.
That way your effective permissions are essentially what you've configured the security to be...

Hope that helps...post back if you need further clarification
0
 

Author Comment

by:rrajani
ID: 18781879
got it......silly me.......i think i am just too worked up.......

sharing permissions is for 'sharing' ONLY which implies by its name......
security permissions is to control the access levels to the share

i am clear now.....thanks
0
 
LVL 67

Expert Comment

by:sirbounty
ID: 18781893
:)
Happy to help...thanx for the grade!
0
 
LVL 70

Expert Comment

by:KCTS
ID: 18781916
You do need to set both permissions. The Share Permissions control who is allowed to access the folder remotely, the Security or NTFS Permissions apply to both users on the local machine AND remote users. As Sirbounty says the most efficient option is to allow Everyone full control on the share and then rely on the NTFS Permissons for the security.

One thing you need to watch is that when you create a share the default share permissions are ‘Everyone’ read, which mean that by default no remote users will be able to change, create or delete files in the share even if they have the necessary NFTS permissions. Hence the recommendation to give 'Everyone' Full control and rely on NTFS to restrict users.
0
 

Author Comment

by:rrajani
ID: 18793871
thanks.........for all ur help.......
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Complete list of Microsoft tech support phone numbers 5 79
iPhone v Android phone 7 29
Doubt. 2 56
Problem to picture file 20 33
Recently Microsoft released a brand new function called CONCAT. It's supposed to replace its predecessor CONCATENATE. But how does it work? And what's new? In this article, we take a closer look at all of this - we even included an exercise file for…
This is an article about Leadership and accepting and adapting to new challenges. It focuses mostly on upgrading to Windows 10.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now