Solved

Sharing and NTFS security

Posted on 2013-01-16
3
228 Views
Last Modified: 2013-01-21
I have a simple question about sharing and permissions. I've done it before but I don't know why it's not working.

I have a list of 10 students that I want them to have access to a folder named "WebPublishing". Inside "WebPublishing", I've created 10 folder, one for each of them.
I want each student to be able to go inside "Webpublishing" and been able to read the list of folders inside but deny them access to any folder that it's not their own folder.
They should be able to see the list of folder but only access their own folder to create folders or files.

How should I do this?

I've shared "webpublishing". Everybody read.
Now what do I do to the individual folders inside?

I don't want to list all the things I did since none have worked so far.

Thanks.
0
Comment
Question by:SamKira
3 Comments
 
LVL 7

Expert Comment

by:karunamoorthy
ID: 38783124
you can create logon for all 10 students say std01, std02, ... etc and give permissions to these logon to individual webpublishing folders
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
ID: 38783892
Did you go into the Advanced Security permissions for each of those child folders in the 'webpublishing' parent folder, Change Permissions, then Remove the Everyone user, and Add the individual username to their own folder?

Be careful you don't remove your own access to those folders, if the only listed user there you're covered by is Everyone.  :-)
0
 
LVL 38

Expert Comment

by:ChiefIT
ID: 38797073
Access Based Enumeration, set up properly, will do this for you on a windows network.

http://technet.microsoft.com/en-us/library/cc784710%28v=ws.10%29.aspx
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now