Solved

Novell inherited rights and filters

Posted on 2008-10-01
4
610 Views
Last Modified: 2012-08-13
Please see attached .jpg file.

As you can see, we have several permissions that are inherited but I can't see exactly what these inherited permissions are:

c - [vol1:\DATA\SERVICE\SHARED\        ]
P - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE\SHARED]
N - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE]

What i'm referring to is the following letters: c,P,S,S,F,N,F. How do I find out what each of these represents or why is it only showing the first letter of whatever it should be showing?
novell.jpg
0
Comment
Question by:Voo_pg
  • 2
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
Ghost96 earned 50 total points
ID: 22614136
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22614670
Nice, i'll try that, will let you know if it fixes it, thanks.
0
 
LVL 8

Expert Comment

by:Ghost96
ID: 22614691
If you're on 4.91 SP2 I can all but guarantee that it will.
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22615027
I did search EE for this answer before putting my question in but could find what I was looking for.

Thanks for this.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question