Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Permissions on Server 2008

Posted on 2011-02-16
4
Medium Priority
?
373 Views
Last Modified: 2012-05-11
Hi There

I have the following scenario:-

User 1
User 2
User 3
User 4

Folder A - all users have full control on this folder currently
Folder B,C,D,E,F,G,H,I,J,K,L,M,N,O,P, - these are subfolders of folder A  and all users currently have full control access.

I need to put the following Security in Place:-
User 1 must have access to Folder A and all subfolders and Files
User 2 must be able to Access folder A but must not have access to subfolders E,F,G
User 3 must only have access to subfolders D,E,F
User 4 must only have access to subfolder D

What would be the easiest way to set this up?

Thanks
0
Comment
Question by:junzcpt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 34908008
First thing is Users have full control they can change permissions on the folders so if you deny them access they can go in and uncheck deny. So, the way you want to do things will not work.
0
 

Author Comment

by:junzcpt
ID: 34909922
what do you suggest?
0
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 2000 total points
ID: 34910659
Not giving them Full Control over the Main Folder would be the best solution you can then go into the Special Permissions to deny and approve permissions from there but that is still getting messy. Sometimes you have to break your folder structure in a couple of trees. Or you can use directly network drive setups
0
 

Author Closing Comment

by:junzcpt
ID: 35137048
implemented and tested
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
What we learned in Webroot's webinar on multi-vector protection.
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question