Solved

Permissions

Posted on 2008-06-25
12
221 Views
Last Modified: 2013-12-04
hi all
i have a query with permissions and the correct way to do them.  I have a NTFS drive on our server and it i have top level share called share below share i have lots and lots of other folders. when a user logs on they get this mapped drive with all the shares inside it and then the permissions kicks in as to what folders they can access ie access denied if no permissions or access granted if permissions is there. Now lets say i wanted to give a user access to a folder that is way down that folder tree ie within the top level share lets say we have a folder called depts and within depts we have prod and with prod we have test. whats the best way to give a user access to test?

ta
0
Comment
Question by:kingcastle
  • 7
  • 5
12 Comments
 
LVL 25

Expert Comment

by:slam69
ID: 21868294
give them list folder contents only access to all the parent folders down to test and then give them modify if required to teh test folder and children of that
0
 

Author Comment

by:kingcastle
ID: 21868369
is this the norm or is there a better way of doing it
0
 
LVL 25

Expert Comment

by:slam69
ID: 21868434
no that would be the norm, that way the users can only see the folders down to the level of where they need access and not open anything else, you could share the test folder but creating shares underneath shares creates a permissioning nightmare and i would never recommend it
0
 
LVL 25

Expert Comment

by:slam69
ID: 21872458
any update
0
 

Author Comment

by:kingcastle
ID: 21872826
cheers for that if i wanted to give users access to a folder but the only thing i did not want them to do was delete more move either the folder itself or anything within that folder what would rights would i assign

ta
0
 
LVL 25

Expert Comment

by:slam69
ID: 21872890
ok that sentance was  a little confusing but i think you want to deny the user delete privildges, when you set the permissions on teh security tab if you click the advanced button you get a whole more range of options other than the standard read write modify etc.

Within this advanced tab you can specify deny delete rights take a look at it.

If you want to go to teh next level have a look at security explorer which is an ntfs permissioning tool, same as using teh security tab but its a better tool in my opinion and easier to understand
0
 

Author Comment

by:kingcastle
ID: 21872913
were would one find security explorer
0
 
LVL 25

Expert Comment

by:slam69
ID: 21872923
here you go,

but take a look at the advanced tab as well so that you are aware of teh range of permission assignments you can make

http://www.pnltools.com/productinfo~productid~32~pageid~1~subpageid~0.asp

be very careful as if you arent fully cionfident of what you are doing you can cause a network more harm than good!!
0
 

Author Comment

by:kingcastle
ID: 21873165
last bit of this post now, what are create owner and system that appear under the security and d o i need to keep them or remove them
0
 
LVL 25

Expert Comment

by:slam69
ID: 21873201
always always keep system in there as it allows your system accounts to access directory same as you always leave your admin accounts in there to administrate.

Creator owner is a funney one, usually whoever creates the directory will need further access but thats not always teh case, usually you have to do thi son a case by case assessment but you will usually find the creator of a file or folder will need continued access
0
 

Author Comment

by:kingcastle
ID: 21873217
excellent post
0
 
LVL 25

Accepted Solution

by:
slam69 earned 500 total points
ID: 21873222
No problem.

please remember to close quetion :O)
0

Join & Write a Comment

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now