Solved

Inherited permissions from root can't be found?

Posted on 2011-03-10
3
570 Views
Last Modified: 2012-05-11
Using SBS 2008 and Windows Fax Service.

I've got a folder setup to hold Faxes located at D:\Data\Faxes. For some reason, one user has special permissions for this folder only that are, supposedly, inherited from the root of Drive D.

See screenshot on right of Advanced Settings, user Ron.... (Note: there is another user, R Dono... that has explicit deny permissions that I intentionally created, so this can be ignored)

However, as the left screenshot also shows, the user Ron does not have any security settings at the root.

So where are the settings coming from? I know I must be missing something obvious and don't want to mess around with the inheritence until I understand where things are coming from. Permissions
0
Comment
Question by:scion111
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
cjrmail2k earned 500 total points
Comment Utility
If you click on advanced, can you see his details listed there for the D: root? Also is he down as owner?

Just a couple of things to check
0
 

Author Closing Comment

by:scion111
Comment Utility
cjrmail2k:

Bingo! He is listed as the current owner - no idea why. Could swear I checked that but guess I didn't...

I'll change it to Administrators. Thanks for the quick reply!
0
 
LVL 10

Expert Comment

by:cjrmail2k
Comment Utility
Cool no problem bud, the quick fixes are always the best :)
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This tutorial will walk an individual through the process of configuring their Windows Server 2012 domain controller to synchronize its time with a trusted, external resource. Use Google, Bing, or other preferred search engine to locate trusted NTP …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now