Solved

Novell inherited rights and filters

Posted on 2008-10-01
4
634 Views
Last Modified: 2012-08-13
Please see attached .jpg file.

As you can see, we have several permissions that are inherited but I can't see exactly what these inherited permissions are:

c - [vol1:\DATA\SERVICE\SHARED\        ]
P - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE\SHARED]
N - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE]

What i'm referring to is the following letters: c,P,S,S,F,N,F. How do I find out what each of these represents or why is it only showing the first letter of whatever it should be showing?
novell.jpg
0
Comment
Question by:Voo_pg
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
Ghost96 earned 50 total points
ID: 22614136
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22614670
Nice, i'll try that, will let you know if it fixes it, thanks.
0
 
LVL 8

Expert Comment

by:Ghost96
ID: 22614691
If you're on 4.91 SP2 I can all but guarantee that it will.
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22615027
I did search EE for this answer before putting my question in but could find what I was looking for.

Thanks for this.
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Successful collaboration among team members is essential for the growth of your business. When employees work together on projects, share ideas and communicate effectively they get better results.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question