[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

file permissions child domain

Posted on 2011-03-04
4
Medium Priority
?
351 Views
Last Modified: 2012-08-13
i have a file I have given userA modify permissions on.  UserA is on a different child domain than I am on, both under the same parent.  Every few hours the permissions are removed.  I'm thinking maybe a group policy is removing the permissions I am setting, but haven't been able to figue it out.  any ideas?

both clients are XP SP3
DCs are 2003
0
Comment
Question by:darrennelson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 8

Expert Comment

by:engeltje
ID: 35042163
The file you mention: is it a database file?
Seems like a service is stripping off the permissions.
Seen this before with ms SQL server.
0
 

Author Comment

by:darrennelson
ID: 35044128
actually its an excel file.  Something odd happened today with the file.  The permissions no longer fall out, but every time the user accesses the file, the ownership of the file changes to userA.

0
 

Accepted Solution

by:
darrennelson earned 0 total points
ID: 35096679
I unshared the dir, removed user permissions, then recreated everything and it now seems to be ok
0
 

Author Closing Comment

by:darrennelson
ID: 35135843
not sure of the source of the original issue
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question