Solved

Subfolder permission

Posted on 2008-10-31
6
418 Views
Last Modified: 2013-12-04
I have a shared folder called "QMS" on 2003 Enterprise. I want everyone can access but no writing in this folder.

There are a few subfolders under "QMS" called "Forms", "WIs", and "Records". There are several folders under "Records" for different departments "Sales", IT.  I want to setup everyone can access "Forms", "WIs" and "Records" but can not write. I want Sales group can have full control on "Sales" and IT group have full control on "IT".

I need to set up subfolders under "Sales" and only a user can have full control on a folder.

What is the best practice for setting this?

Thanks,
0
Comment
Question by:Brgzaq
  • 3
  • 3
6 Comments
 
LVL 6

Accepted Solution

by:
GCD1 earned 125 total points
ID: 22850956
Turn off inherit permissions on the "QMS" folder and all subfolders (apply the changes to all subfolders to make that easiest to start from).  Then apply your permissions for each subfolder, one at a time, with the permissions you want for each subfolder.
0
 

Author Closing Comment

by:Brgzaq
ID: 31512067
GCD1: Thank you very much for the answer. My following up questions are 1. "How about the override of permission for folders and their subfolders?"
2. "Only "QMS" is shared, do I set up share permission only on "QMS"?". 3.  "setup Subfolders only under "Security"?"

Thank you.

0
 
LVL 6

Expert Comment

by:GCD1
ID: 22852357
The only way you would want to override permissions is if the permissions for all files and folders underneath the given folder should have the same permissions.  I think you will find it easiest to not override permissions and to just make sure you specify permissions on each folder independently.

You will not need to alter the share permissions on anything except the root folder.  Just make sure that everyone that will need access to sub folders at least has read access on the share permissions to the share itself or else they won't even be able to get to it, and then you will adjust further permissions on the Security tab.

Obviously you will want to test all of this but you will find permissions can be difficult to figure out at times.
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Comment

by:Brgzaq
ID: 22852550
GCD1:

Thank you very much for the prompt answers. I appreciate it.

I will do some tests based on your solutions.

0
 

Author Comment

by:Brgzaq
ID: 22852621
If the is no write permission set on the share folder for one group, can I set any subfolder with write permission for that group?

Thanks.
0
 
LVL 6

Expert Comment

by:GCD1
ID: 22867453
Yes, I believe you can do that, but I would test it beforehand to make sure.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
recommend secure & efficient Unix LDAP (equiv of Windows AD) 6 108
internet access from windows servers 4 71
Compromised PC? 17 219
Using cipher to decrypt files. 4 69
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question