NTFS, Share Folder and File permissions

Posted on 2010-01-04
Medium Priority
Last Modified: 2012-05-08
I'm trying to work out the best file permission settings for the following scenario

I have a folder several levels down which i need to put certain permissions on... - NTFS permission are set to modify as everyone needs access to the folder and to be able to create folders and files within.. this main folder. modify permission are inherited.

they have now asked that anything created within this folder can only be deleted by that person who created it and no one else whilst preserving all other permissions.

can anyone advise which permissions I will need to set to allow/deny to make sure the above criteria is met?


Question by:PlacesForPeople
LVL 11

Expert Comment

by:Jon Winterburn
ID: 26170183
If the Modify permission is inherited, then whoever has that Modify permission will be able to Delete the files/folders. Therefore it is not possible for you to change the permissions for the Creator/Owner and still leave the other permissions intact because you'd have to remove the inherited permissions of Modify for other users, else they will be inherited. Does that make sense?

Alternatively you could add Everyone to the folders in question (leaving the inherited Modify intact) and then set Deny for Everyone, add the Creator Owner and set Allowed for that. That should work.

See the File and folder special permissions grid here: http://support.microsoft.com/kb/308419
LVL 38

Accepted Solution

Rich Rumble earned 2000 total points
ID: 26172711
Correct jonathen, the thing to remember with Share and NTFS permissions is that they work together, the most restrictive setting is the one that is used... so I've found it best to set share permissions to Everyone Full Control and then use NTFS permissions for the actual ACL's.

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question