Solved

Permissions on Server 2008

Posted on 2011-02-16
4
361 Views
Last Modified: 2012-05-11
Hi There

I have the following scenario:-

User 1
User 2
User 3
User 4

Folder A - all users have full control on this folder currently
Folder B,C,D,E,F,G,H,I,J,K,L,M,N,O,P, - these are subfolders of folder A  and all users currently have full control access.

I need to put the following Security in Place:-
User 1 must have access to Folder A and all subfolders and Files
User 2 must be able to Access folder A but must not have access to subfolders E,F,G
User 3 must only have access to subfolders D,E,F
User 4 must only have access to subfolder D

What would be the easiest way to set this up?

Thanks
0
Comment
Question by:junzcpt
  • 2
  • 2
4 Comments
 
LVL 59

Expert Comment

by:Darius Ghassem
ID: 34908008
First thing is Users have full control they can change permissions on the folders so if you deny them access they can go in and uncheck deny. So, the way you want to do things will not work.
0
 

Author Comment

by:junzcpt
ID: 34909922
what do you suggest?
0
 
LVL 59

Accepted Solution

by:
Darius Ghassem earned 500 total points
ID: 34910659
Not giving them Full Control over the Main Folder would be the best solution you can then go into the Special Permissions to deny and approve permissions from there but that is still getting messy. Sometimes you have to break your folder structure in a couple of trees. Or you can use directly network drive setups
0
 

Author Closing Comment

by:junzcpt
ID: 35137048
implemented and tested
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As cyber crime continues to grow in both numbers and sophistication, a troubling trend of optimization has emerged over the last year.
There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question