Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Windows 2008 Clustered server file and folder permission issue.

Posted on 2013-06-06
6
Medium Priority
?
597 Views
Last Modified: 2013-06-10
We have a win2k8 cluster server.  We create a share folder from the failover cluster manager.  We then open up windows explorer and open up the properties of the folder.  Go to share>advance sharing, grant authenticated users(F), system(F), domain admin(f).  Under security, we only leave system(F), server\adminisrator(F), server\users(R, this folder only), group1(F).  

We add a test user to group1, login to a workstation as this test user.  I am able to map the share but not able to write.

Please advise.

Many thanks.
0
Comment
Question by:nav2567
  • 2
6 Comments
 
LVL 11

Assisted Solution

by:Paul S
Paul S earned 750 total points
ID: 39227438
what group is group1 from the list of groups in the first paragraph?
0
 

Author Comment

by:nav2567
ID: 39228530
domain local security group
0
 
LVL 22

Accepted Solution

by:
65td earned 750 total points
ID: 39234566
What is the error returned?
Is it a UAC issue?
0
 

Author Closing Comment

by:nav2567
ID: 39236505
I did not expect that I had to do this.  After I logoff and login again, and it is working now.  

Thanks, everyone.
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
High user turnover can cause old/redundant user data to consume valuable space. UserResourceCleanup was developed to address this by automatically deleting user folders when the user account is deleted.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question