Solved

NTFS Permission denied vs not adding anything

Posted on 2014-12-16
3
69 Views
Last Modified: 2014-12-22
What is the difference between adding a user to a directory & set permission to deny, & not adding the user at all?

In both cases, the user wont be able to access the folder, but why going all the way to deny?

Thanks
0
Comment
Question by:defrey
3 Comments
 
LVL 3

Assisted Solution

by:Guillermin-go
Guillermin-go earned 250 total points
ID: 40503975
Hi:

If there are conflicting permissions, the most restrictive are applied.

If a user is member of a group that can read a folder,  but you set deny read permissión to that user, the user cant read that folder.
0
 
LVL 53

Accepted Solution

by:
McKnife earned 250 total points
ID: 40503993
Another example: if you grant a group X change permissions but don't want User A to be able to change, you could deny change for that user without having to kick him out of that group. That is a use case.
But just denying him? No one would do that since not granting him anything is so much easier.
0
 
LVL 34

Expert Comment

by:Seth Simmons
ID: 40504072
where i recently worked, i came across a share that had a group with explicit deny
found out the reason; a different group was given access though a few members shouldn't have it so another group with those individuals was created and explicitly denied.  that could be a scenario where you might need to do that, though a rare circumstance
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now