Solved

Sharing and NTFS security

Posted on 2013-01-16
3
260 Views
Last Modified: 2013-01-21
I have a simple question about sharing and permissions. I've done it before but I don't know why it's not working.

I have a list of 10 students that I want them to have access to a folder named "WebPublishing". Inside "WebPublishing", I've created 10 folder, one for each of them.
I want each student to be able to go inside "Webpublishing" and been able to read the list of folders inside but deny them access to any folder that it's not their own folder.
They should be able to see the list of folder but only access their own folder to create folders or files.

How should I do this?

I've shared "webpublishing". Everybody read.
Now what do I do to the individual folders inside?

I don't want to list all the things I did since none have worked so far.

Thanks.
0
Comment
Question by:SamKira
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 7

Expert Comment

by:karunamoorthy
ID: 38783124
you can create logon for all 10 students say std01, std02, ... etc and give permissions to these logon to individual webpublishing folders
0
 
LVL 44

Accepted Solution

by:
Darr247 earned 500 total points
ID: 38783892
Did you go into the Advanced Security permissions for each of those child folders in the 'webpublishing' parent folder, Change Permissions, then Remove the Everyone user, and Add the individual username to their own folder?

Be careful you don't remove your own access to those folders, if the only listed user there you're covered by is Everyone.  :-)
0
 
LVL 39

Expert Comment

by:ChiefIT
ID: 38797073
Access Based Enumeration, set up properly, will do this for you on a windows network.

http://technet.microsoft.com/en-us/library/cc784710%28v=ws.10%29.aspx
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question