Solved

Which permissions will give a user read and write access but NOT delete?

Posted on 2013-11-04
4
289 Views
Last Modified: 2013-11-08
Which options do I need to enable for the Authenticated Users group?

The winning answer will include a list of numbers from the below.  Links to YouTube will be ignored.  Thanks!

1 Traverse Folder/Execute File
2 List Folder/Read Data
3 List Folder:
4 Read Attributes
5 Read Extended Attributes
6 Create Files/Write Data
7 Create Folders/Append Data
8 Write Attributes
9 Write Extended Attributes
10 Delete Subfolders and Files
11 Delete
12 Read Permissions
13 Change Permissions
14 Take Ownership
15 Synchronize

http://www.ntfs.com/ntfs-permissions-file-advanced.htm
0
Comment
Question by:Geoff Millikan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
Andrew Davis earned 500 total points
ID: 39623222
Allow options 1 to 9
Deny 10

Cheers
Andrew
0
 

Author Comment

by:Geoff Millikan
ID: 39623277
Do I leave 11 to 14 unchecked for both Allow and Deny?
0
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39623454
10 Overrules 11
14 Should only be for administrators


Cheers
0
 

Author Comment

by:Geoff Millikan
ID: 39634830
Thanks!
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question