Solved

Permissions on Server 2008

Posted on 2011-02-16
4
355 Views
Last Modified: 2012-05-11
Hi There

I have the following scenario:-

User 1
User 2
User 3
User 4

Folder A - all users have full control on this folder currently
Folder B,C,D,E,F,G,H,I,J,K,L,M,N,O,P, - these are subfolders of folder A  and all users currently have full control access.

I need to put the following Security in Place:-
User 1 must have access to Folder A and all subfolders and Files
User 2 must be able to Access folder A but must not have access to subfolders E,F,G
User 3 must only have access to subfolders D,E,F
User 4 must only have access to subfolder D

What would be the easiest way to set this up?

Thanks
0
Comment
Question by:junzcpt
  • 2
  • 2
4 Comments
 
LVL 59

Expert Comment

by:Darius Ghassem
Comment Utility
First thing is Users have full control they can change permissions on the folders so if you deny them access they can go in and uncheck deny. So, the way you want to do things will not work.
0
 

Author Comment

by:junzcpt
Comment Utility
what do you suggest?
0
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 500 total points
Comment Utility
Not giving them Full Control over the Main Folder would be the best solution you can then go into the Special Permissions to deny and approve permissions from there but that is still getting messy. Sometimes you have to break your folder structure in a couple of trees. Or you can use directly network drive setups
0
 

Author Closing Comment

by:junzcpt
Comment Utility
implemented and tested
0

Featured Post

Promote certifications in your email signature

Has your company recently won an award or achieved a certification? They'll no doubt want to show it off. Email signature images used to promote certifications & awards can instantly establish credibility with a recipient and provide you with numerous benefits.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A safe way to clean winsxs folder from your windows server 2008 R2 editions
This tutorial will give a an overview on how to deploy remote agents in Backup Exec 2012 to new servers. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as connecting to a remote Back…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now