Solved

cut/paste doesnt reset file security permissions

Posted on 2008-10-06
12
630 Views
Last Modified: 2013-12-05
when my user copies a file from one secured folder to another secured folder,  the file security permissions are reset (inherited) and the people that have access to the new folder can view the copied file..

but when they cut/paste the file from one secured folder to another secured folder,  the file security permissions are not reset (inherited) and the people that have access to the new folder can not view the moved file..

both copy and cut work from a domain admin ID.. but only copy works from a domain user that has full control over both folders..

0
Comment
Question by:ODOTServer
  • 5
  • 4
  • 3
12 Comments
 
LVL 70

Accepted Solution

by:
KCTS earned 250 total points
Comment Utility
If a new copy of the file is created then the permissions are always inherited from the new parent.

If you cut/paste a file from one folder to another folder on the same partition then no new file is created - the pointers in the file table that say which folder the file is in are simply updated - so permissions are not changed.

If you cut/paste a file from one folder to another folder on a different partition then a new file must be created - so the new file inherits the properties of the new folder.
0
 
LVL 26

Assisted Solution

by:Pber
Pber earned 250 total points
Comment Utility
0
 
LVL 70

Expert Comment

by:KCTS
Comment Utility
Aw - come on, I just explained all that :-)
0
 
LVL 26

Expert Comment

by:Pber
Comment Utility
Yeah, as much as I would like the points, KCTS did answer it.  I just added some supporting docs.  
0
 

Author Comment

by:ODOTServer
Comment Utility
Thanks both,
Sorry, I don't know how to change the point split after its been entered..
0
 
LVL 26

Expert Comment

by:Pber
Comment Utility
I would also be careful with that registry hack as this only affects the machines you modify it on.  So your machine will work, but all the other machines will need to be modified as well.  You might end up with a security issue later on after new machine show up or you use restore points, rebuild, etc.
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 26

Expert Comment

by:Pber
Comment Utility
Click the Request attention link on the original question and ask for the question to be re-opened so you can split.
0
 
LVL 70

Expert Comment

by:KCTS
Comment Utility
I have requested that the question is re-opened so that you can close it properly - its only right to take the time to allocate the points correctly after experts have taken the time to answer your question ;-)
0
 

Author Comment

by:ODOTServer
Comment Utility
do you both agree to a 50/50 split?
0
 
LVL 70

Expert Comment

by:KCTS
Comment Utility
Seems fair ;-)
0
 
LVL 26

Expert Comment

by:Pber
Comment Utility

Sounds fair to me.
(:
0
 

Author Closing Comment

by:ODOTServer
Comment Utility
Thanks, that fixed it..

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer  

Value name: MoveSecurityAttributes
Data type: DWORD
Value data: 0
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video discusses moving either the default database or any database to a new volume.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now