Improve company productivity with a Business Account.Sign Up

x
?
Solved

NTFS Permission denied vs not adding anything

Posted on 2014-12-16
3
Medium Priority
?
102 Views
Last Modified: 2014-12-22
What is the difference between adding a user to a directory & set permission to deny, & not adding the user at all?

In both cases, the user wont be able to access the folder, but why going all the way to deny?

Thanks
0
Comment
Question by:defrey
3 Comments
 
LVL 3

Assisted Solution

by:Guillermo Feijóo
Guillermo Feijóo earned 1000 total points
ID: 40503975
Hi:

If there are conflicting permissions, the most restrictive are applied.

If a user is member of a group that can read a folder,  but you set deny read permissión to that user, the user cant read that folder.
0
 
LVL 59

Accepted Solution

by:
McKnife earned 1000 total points
ID: 40503993
Another example: if you grant a group X change permissions but don't want User A to be able to change, you could deny change for that user without having to kick him out of that group. That is a use case.
But just denying him? No one would do that since not granting him anything is so much easier.
0
 
LVL 37

Expert Comment

by:Seth Simmons
ID: 40504072
where i recently worked, i came across a share that had a group with explicit deny
found out the reason; a different group was given access though a few members shouldn't have it so another group with those individuals was created and explicitly denied.  that could be a scenario where you might need to do that, though a rare circumstance
0

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In the video, one can understand the process of resizing images in single or bulk. Kernel Bulk Image Resizer is an easy to use tool for resizing large number of images. One can add and resize multiple images with this tool in single go. The video sh…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question