Solved

Inherited permissions from root can't be found?

Posted on 2011-03-10
3
597 Views
Last Modified: 2012-05-11
Using SBS 2008 and Windows Fax Service.

I've got a folder setup to hold Faxes located at D:\Data\Faxes. For some reason, one user has special permissions for this folder only that are, supposedly, inherited from the root of Drive D.

See screenshot on right of Advanced Settings, user Ron.... (Note: there is another user, R Dono... that has explicit deny permissions that I intentionally created, so this can be ignored)

However, as the left screenshot also shows, the user Ron does not have any security settings at the root.

So where are the settings coming from? I know I must be missing something obvious and don't want to mess around with the inheritence until I understand where things are coming from. Permissions
0
Comment
Question by:scion111
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
cjrmail2k earned 500 total points
ID: 35096172
If you click on advanced, can you see his details listed there for the D: root? Also is he down as owner?

Just a couple of things to check
0
 

Author Closing Comment

by:scion111
ID: 35096239
cjrmail2k:

Bingo! He is listed as the current owner - no idea why. Could swear I checked that but guess I didn't...

I'll change it to Administrators. Thanks for the quick reply!
0
 
LVL 10

Expert Comment

by:cjrmail2k
ID: 35096298
Cool no problem bud, the quick fixes are always the best :)
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows Security Pop-Up 7 49
Using MS Hello on a Domain Joined Surface Book 4 17
How does ADMT SID History work? 1 28
Antivirus in server 3 20
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
This article explains the steps required to use the default Photos screensaver to display branding/corporate images
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question