?
Solved

NTFS Permission denied vs not adding anything

Posted on 2014-12-16
3
Medium Priority
?
87 Views
Last Modified: 2014-12-22
What is the difference between adding a user to a directory & set permission to deny, & not adding the user at all?

In both cases, the user wont be able to access the folder, but why going all the way to deny?

Thanks
0
Comment
Question by:defrey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Assisted Solution

by:Guillermin-go
Guillermin-go earned 1000 total points
ID: 40503975
Hi:

If there are conflicting permissions, the most restrictive are applied.

If a user is member of a group that can read a folder,  but you set deny read permissión to that user, the user cant read that folder.
0
 
LVL 56

Accepted Solution

by:
McKnife earned 1000 total points
ID: 40503993
Another example: if you grant a group X change permissions but don't want User A to be able to change, you could deny change for that user without having to kick him out of that group. That is a use case.
But just denying him? No one would do that since not granting him anything is so much easier.
0
 
LVL 35

Expert Comment

by:Seth Simmons
ID: 40504072
where i recently worked, i came across a share that had a group with explicit deny
found out the reason; a different group was given access though a few members shouldn't have it so another group with those individuals was created and explicitly denied.  that could be a scenario where you might need to do that, though a rare circumstance
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses
Course of the Month14 days, 8 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question