Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Novell inherited rights and filters

Posted on 2008-10-01
4
Medium Priority
?
657 Views
Last Modified: 2012-08-13
Please see attached .jpg file.

As you can see, we have several permissions that are inherited but I can't see exactly what these inherited permissions are:

c - [vol1:\DATA\SERVICE\SHARED\        ]
P - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED\        ]
S - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE\SHARED]
N - [vol1:\DATA\SERVICE\SHARED]
F - [vol1:\DATA\SERVICE]

What i'm referring to is the following letters: c,P,S,S,F,N,F. How do I find out what each of these represents or why is it only showing the first letter of whatever it should be showing?
novell.jpg
0
Comment
Question by:Voo_pg
  • 2
  • 2
4 Comments
 
LVL 8

Accepted Solution

by:
Ghost96 earned 200 total points
ID: 22614136
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22614670
Nice, i'll try that, will let you know if it fixes it, thanks.
0
 
LVL 8

Expert Comment

by:Ghost96
ID: 22614691
If you're on 4.91 SP2 I can all but guarantee that it will.
0
 
LVL 1

Author Comment

by:Voo_pg
ID: 22615027
I did search EE for this answer before putting my question in but could find what I was looking for.

Thanks for this.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Hello there! As a developer I have modified and refactored the unit tests which was written by fellow developers in the past. On the course, I have gone through various misconceptions and technical challenges when it comes to implementation. I would…
Mailbox Corruption is a nightmare every Exchange DBA wishes he never has. Recovering from it can be super-hectic if not entirely futile. And though techniques like the New-MailboxRepairRequest cmdlet have been designed to help with fixing minor corr…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question