Change Windows Security Permission Without Messing Everything Else

We have about eight shares hosted on a Windows 2003 domain controller. Each of those shares has many folder and sub-folders. Over time, the security permissions changed for a lot of these individual folders and sub-folders. I want to change permissions for all shares that are propagated to everything beneath them so that users cannot delete files. A lot of the shares have the general domain\domain users group granting permissions. But other folders have select users with security permissions to that folder. I just want to make sure that if I select deny in the delete column, that it doesn't mess up other permissions, when I propagate permissions to all child folders. Is that possible?
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

PberSolutions ArchitectCommented:
Be very careful with denies.  They override allows.

So if at a folder, you grant "Domain Administrators" full control, then grant "Domain Users" Deny delete, then "Domain Administrators" will not be able to delete.

Also don't get mixed up between share permissions and folder/file permissions.  Share permissions are more limiting as well.  Usually we grant our users Modify at the share level.  Then we control more specific access at the folder/file level.  Once again, if you specify a deny at the share level, users coming into the share at that level, will be restricted with that deny even if you give them full control of the file itself.
Will SzymkowskiSenior Solution ArchitectCommented:
Share Permissions should be Full and then break out Security Using the NTFS permissions. However I would never use the Deny as it is not necessary and it can create a lot of headaches if misused.

All you need to do is From the Top Level directory set the permissions and allow them to propagate to all child objects.

If you are going to use the Deny i would suggest that you test this first on a different directory.

eshiramAuthor Commented:
Gentlemen, thanks for your answers! I will continue trying to test this. However, is there a way to set this up using GPO?
Will SzymkowskiSenior Solution ArchitectCommented:
You can use Group Policy to set folder permissions but to be completely honest, i would not use this approach. This becomes cumbersome to work with and you will need to resort to using the Group Policies to modify security.

However if you still want to proceed with this you can follow the link below.


Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2003

From novice to tech pro — start learning today.