Solved

Tips on file server security

Posted on 2009-05-19
3
243 Views
Last Modified: 2013-12-02
Hi All,

One of my customers (150 users; all Windows 2003 servers) wants to create a new folder structure and security structure on it's fileserver. unfortunatly they want to have permissions on a top level folder, and different permissions on subfolders. Something like:

Folder (Permissions: Everyone full Control)
   - Subfolder 1 (Permissions: John: Full, Mary: Read, Steve: List content)
      - Subfolder 1-1 (Permissions: Steve: Full, John; read, Mary: Read)
etc etc. etc.

This of course will lead to a lot of headache. Untill now I havn't been able to convince them that this is not the right approach. I've been googling on some good documents on how one should setup permissions on a fileserver, But havn't been able to find a good one. Anyone here has a good link ?

Thanks,
Gerard
0
Comment
Question by:Jubal1234
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 16

Expert Comment

by:speshalyst
ID: 24421277
Unfortunately there is no one size fits all when it comes to setting up security..
it really depends on how ur org wants it set.
Best practices usually include create specific user groups and applying permissions to the groups.
Also avoid using 'DENY"
 
0
 
LVL 27

Accepted Solution

by:
bluntTony earned 125 total points
ID: 24421619
Agree - management rarely care what gives the IT dept headaches :0)

MS Best practices for applying permissions : http://technet.microsoft.com/en-us/library/cc779601(WS.10).aspx

This does mention applying permissions at the top level and using inheritance.
0
 
LVL 4

Author Comment

by:Jubal1234
ID: 24421780
Great ! This waas exactly what I needed. My headache has gotten better now :o) Thenk !
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Goal:  To set up a secure SSH server for your home computer to make it accessible anywhere AND to use it as a port forwarding proxy. Steps 1.  WinSSHD version 5 is free for personal use.  So download and install it.  You can download it from the…
Hello, As I have seen there a lot of requests regarding monitoring and reporting for exchange 2007 / 2010 / 2013 I have decided to post some thoughts together and link to articles that have helped me. Of course a lot of information you can get…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question