Permissions Help Needed w/ MS Server 2003

Posted on 2012-08-10
Last Modified: 2012-08-17
Our business has a scanner that must remain off the network. So when we scan a document, it was sent to the laptop (attached to the scanner - running XP) where we would save the file to a flash drive and literally WALK it over to our server for placement on the network and so that the users could all access it.

Well, someone stole the laptop and the scanner went ka-put. So we bought a new Brother 9320 All-in-One with a USB slot on the front. Now we simply scan and save DIRECTLY to the flash drive --> Walk it over to the server, and paste the file on the network.

THE PROBLEM:  Even though we are pasting the file into the networked drive using the same method, our staff can view, access, and read the file just fine. However, we cannot attach the file to our email (using MS Outlook 2007) anymore UNLESS the file was saved onto the server while logged into the account of the person sending the email.

So if user A logs into the server as user A and saves the file on the network for everyone to see - but user B tries to attach it to an email - user B cannot attach it due to a permissions error. However, user A can attach it just fine.

I checked the permissions policy on the server and "Authorized Users" is listed as having full privileges, and I manually added the others users a few times just to check - but still had no success.

Any idea what we can do on the server?  I feel like the old computer (laptop running XP) was assigning some kind of user permissions that were inherited by the server, which allowed everyone to have full functionality to the file - but I have never seen anything like this before.

Question by:dr00t2012
    LVL 24

    Expert Comment

    There are 2 locations for permissions on a share - the share permissions(which it sounds like you've checked) and the Security tab - have you listed Auth Users in the security tab with Modify/Full permissions?
    LVL 24

    Expert Comment

    In the Security section as well, click Advanced down near the bottom - ensure the 'Inherit permissions...' tick box is checked - this will mean any further files/folders added to the root folder take on the permissions of the root folder itself and should take care of further permission problems...
    LVL 30

    Expert Comment

    Off the network?
    So you aren't using it as a networked printer?

    Accepted Solution

    I resolved the issue.

    @smckeown777:  Thanks. You were very close. However, without your direction... I would not have seen the checkbox I overlooked.

    @pgm554:  Yes, long story. I inherited the client and this was the case... however, I am in the process of networking it so they get full printing capabilities out of their really nice laser printer. They also use it for a fax, so it wasn't a total waste.

    Here is what I did...

    1. I right-clicked on the parent folder on the server that the customer typically places the file into for sharing across the network.

    2. Then, I selected Sharing and Security. Of course, it was already shared.

    3. I opened the "Security" tab at the top.

    4. I clicked on "Advanced" located at the bottom of the Security tab.

    5. Within the Permissions tab, I selected "Authenticated Users" and verified they have full control.

    6. Then, here is where I confirmed the "Allow inheritable permissions from the parent to propagate... ... ..." was checked (which it already was). BUT, I also placed a check in the second box, which reads: "Replace permission entries on all child objects with entries shown here that apply to child objects".

    Once I saved settings... I logged in as the other user to confirm the settings took effect and work. Success.

    Hope this helps anyone with the same problem.

    Author Closing Comment

    I used the advice given to me by another member, but ultimately resolved the issue myself and had to check my own response because it was the appropriate response outlining the total solution.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Many admins will agree: WSUS is is a nice invention but using it on the client side when updating a newly installed computer is still time consuming as you have to do several reboots and furthermore, the procedure of installing updates, rebooting an…
    Find out how to use Active Directory data for email signature management in Microsoft Exchange and Office 365.
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now