Solved

Inherited permissions from root can't be found?

Posted on 2011-03-10
3
612 Views
Last Modified: 2012-05-11
Using SBS 2008 and Windows Fax Service.

I've got a folder setup to hold Faxes located at D:\Data\Faxes. For some reason, one user has special permissions for this folder only that are, supposedly, inherited from the root of Drive D.

See screenshot on right of Advanced Settings, user Ron.... (Note: there is another user, R Dono... that has explicit deny permissions that I intentionally created, so this can be ignored)

However, as the left screenshot also shows, the user Ron does not have any security settings at the root.

So where are the settings coming from? I know I must be missing something obvious and don't want to mess around with the inheritence until I understand where things are coming from. Permissions
0
Comment
Question by:scion111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
cjrmail2k earned 500 total points
ID: 35096172
If you click on advanced, can you see his details listed there for the D: root? Also is he down as owner?

Just a couple of things to check
0
 

Author Closing Comment

by:scion111
ID: 35096239
cjrmail2k:

Bingo! He is listed as the current owner - no idea why. Could swear I checked that but guess I didn't...

I'll change it to Administrators. Thanks for the quick reply!
0
 
LVL 10

Expert Comment

by:cjrmail2k
ID: 35096298
Cool no problem bud, the quick fixes are always the best :)
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question