Solved

Which permissions will give a user read and write access but NOT delete?

Posted on 2013-11-04
4
290 Views
Last Modified: 2013-11-08
Which options do I need to enable for the Authenticated Users group?

The winning answer will include a list of numbers from the below.  Links to YouTube will be ignored.  Thanks!

1 Traverse Folder/Execute File
2 List Folder/Read Data
3 List Folder:
4 Read Attributes
5 Read Extended Attributes
6 Create Files/Write Data
7 Create Folders/Append Data
8 Write Attributes
9 Write Extended Attributes
10 Delete Subfolders and Files
11 Delete
12 Read Permissions
13 Change Permissions
14 Take Ownership
15 Synchronize

http://www.ntfs.com/ntfs-permissions-file-advanced.htm
0
Comment
Question by:Geoff Millikan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
Andrew Davis earned 500 total points
ID: 39623222
Allow options 1 to 9
Deny 10

Cheers
Andrew
0
 

Author Comment

by:Geoff Millikan
ID: 39623277
Do I leave 11 to 14 unchecked for both Allow and Deny?
0
 
LVL 18

Expert Comment

by:Andrew Davis
ID: 39623454
10 Overrules 11
14 Should only be for administrators


Cheers
0
 

Author Comment

by:Geoff Millikan
ID: 39634830
Thanks!
0

Featured Post

[Webinar] Code, Load, and Grow

Managing multiple websites, servers, applications, and security on a daily basis? Join us for a webinar on May 25th to learn how to simplify administration and management of virtual hosts for IT admins, create a secure environment, and deploy code more effectively and frequently.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question