Solved

UNC Path and Permissions

Posted on 2009-07-15
2
477 Views
Last Modified: 2013-12-04
I wanted to try and get clarification on how UNC paths function. My understanding that when typing a UNC path, for instance to access a server running server 2003 I would use \\server01\share\foldera\folderb that each folder or hop required that you had permissions to move to the next level below.

However recently I ran into a case where a user did not have any rights to foldera but was able to access folderb if the full UNC path was entered. It seems that UNC acts in the same way a share would to bypass folders at higher levels that the user does not have access to. I didn't find any good information online so any help you can provide would be great.
0
Comment
Question by:jhsit
2 Comments
 
LVL 83

Accepted Solution

by:
oBdA earned 500 total points
ID: 24862692
That's not only via UNC, that's the normal behavior. This "behavior" is actually a user right, "Bypass traverse checking". This user right is by default given to the Everyone group.
"Access Denied" Error Message When Users Try to Access Shared Folders
http://support.microsoft.com/kb/277644
Bypass traverse checking
http://technet.microsoft.com/en-us/library/cc739389(WS.10).aspx
Permissions for files and folders
http://technet.microsoft.com/en-us/library/cc787794(WS.10).aspx
0
 

Author Closing Comment

by:jhsit
ID: 31603892
Great info, thanks!

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Is your Office 365 signature not working the way you want it to? Are signature updates taking up too much of your time? Let's run through the most common problems that an IT administrator can encounter when dealing with Office 365 email signatures.
Find out what you should include to make the best professional email signature for your organization.
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now