?
Solved

permissions in AD 2003

Posted on 2013-02-06
2
Medium Priority
?
198 Views
Last Modified: 2013-02-19
HI A USER HAS FOLDER ON HER WORKSTATION AND IS USED BY OTHER MEMBERS IN OUR DOMAIN  PERMISSION WAS CONFIGURED WITH PERMISSIONS FROM THE USERS AND GROUPS ON THE NETWORK.  NOW SHE CREATED A SUB FOLDER AND NOW SHE WANTS THE SAME PERMISSION. (AMY DOCS TO CHANGE WITH OK_DOCS WHENEVER NEW PERMISSIONS ARE APLLIED

How would i do this on AD 2003

Thank yo
0
Comment
Question by:exchangeadmin29
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 20

Accepted Solution

by:
Russ Suter earned 2000 total points
ID: 38860778
Sub folders automatically inherit the permissions of the parent folder by default. The sub folder should already have the same permissions. Am I missing something?
0
 
LVL 35

Expert Comment

by:Nirmal Sharma
ID: 38862384
Do you see any issues when she accesses the sub-folder? Did she report any issues? If no, then you should be good.

I agree with what Russ_Suter says!

-----
Sys.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Let's recap what we learned from yesterday's Skyport Systems webinar.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question