Solved

Permissions for files and folders

Posted on 2014-03-13
5
115 Views
Last Modified: 2014-04-01
Relating to my previous question:

1) Where it´s specified that everything is denied before granting?
2) With /grant:r lusiaescrivane:(w) the User can´t rename files.
3) With /grant:r lusiaescrivane:(w,d) the User can´t delete files.

Regards
0
Comment
Question by:LexNews
  • 3
  • 2
5 Comments
 
LVL 24

Accepted Solution

by:
lionelmm earned 500 total points
Comment Utility
This will deny all rights to the folder for a user or a group name
icacls c:\foldername /deny username or groupname:f
Note that denying is dangerous and can make the folder inaccessible so test it on a test folder first. also note that your folder may be inheriting rights from the folder above or the root of the drive so may also have to use the /inheritance option to remove it
2) are you want to make it so that  /grant:r lusiaescrivane:(w) will stop lusiaescrivane from renaming files? and 3) so lusiaescrivane can't delete files?
This links will help you if you want a better understanding
http://technet.microsoft.com/en-us/magazine/2009.07.geekofalltrades.aspx
http://timbolton.net/2010/06/23/icacls-changing-permissions-on-files-and-folders/
http://ss64.com/nt/icacls.html
I use them when I try to help othes
0
 

Author Comment

by:LexNews
Comment Utility
Thanks.
I´ll take a look on these articles.
0
 
LVL 24

Expert Comment

by:lionelmm
Comment Utility
Did you get it working as you wanted? If so please post your solution here for others to see, but if not let me know if you need any more help.
0
 

Author Comment

by:LexNews
Comment Utility
Not yet.
I´m elaborating a more specific question.
0
 

Author Comment

by:LexNews
Comment Utility
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

If you migrate a Terminal Server licenses server inside the 2008 server family, you can takte advantage of the build-in migration tool. If you like to migrate an older 2003 Server (and the installed client CALs) to a 2008 R2 server for example, you …
Sometimes drives fill up and we don't know why.  If you don't understand the best way to use the tools available, you may end up being stumped as to why your drive says it's not full when you have no space left!  Here's how you can find out...
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now