Improve company productivity with a Business Account.Sign Up

x
?
Solved

Share and Advanced Sharing permissions

Posted on 2016-10-28
8
Medium Priority
?
808 Views
1 Endorsement
Last Modified: 2016-11-08
Any Expert to explain the difference between the permissions we put in Share and Advanced Sharing.
Thank you

Shares
1
Comment
Question by:jskfan
7 Comments
 
LVL 61

Assisted Solution

by:Cliff Galiher
Cliff Galiher earned 400 total points
ID: 41864767
Advanced sharing just allows more granular control if you can't get what you want with sharing. Both update the same ACLs.
0
 
LVL 25

Assisted Solution

by:yo_bee
yo_bee earned 1600 total points
ID: 41865149
The Advance Sharing is what an admin only had pre Server 2008.  I find that you are better off always using the Advance Sharing when you are standing up a new share. You can add full control to the share permission, whereas you do not have that option with the Share button.  Both will give you the ability to share out a folder and give at least the read or read/writer to the share.  

Permissions are different than security.  Permission is if a user has rights to the share or not.  Security if what the user can do within that share.
0
 

Author Comment

by:jskfan
ID: 41865157
- if you set permissions in Share and Advanced sharing which one wins ? they are both share permissions, but which one wins?

- on the Share there is Security tab. I believe this deals with NTFS permissions..if so then if you set up permissions under Security tab with "Replace all child object permission entries...etc..."  then unless if inheritance is blocked on the child object (folders under the Share) the permissions specified will flow down the hierarchie. Correct ?
0
Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

 
LVL 53

Expert Comment

by:Jackie Man
ID: 41873409
You might need to take a short coursr for MS Server 2008 as permission and sharing can be complicated if you do not understand the basic concept.

Permission is just an access control list whereas sharing is a distribution method for a network share. Both are working on both file and folder level.
0
 

Author Comment

by:jskfan
ID: 41878658
Jackie Man

Keep that expertise for yourself
0
 
LVL 25

Accepted Solution

by:
yo_bee earned 1600 total points
ID: 41878698
- if you set permissions in Share and Advanced sharing which one wins ? they are both share permissions, but which one wins?

The Share and Advance buttons do almost the exact same thing. The major difference is that the Advance share you can set the number of concurrent connects and also give full permission to the share.  

- on the Share there is Security tab. I believe this deals with NTFS permissions..if so then if you set up permissions under Security tab with "Replace all child object permission entries...etc..."  then unless if inheritance is blocked on the child object (folders under the Share) the permissions specified will flow down the hierarchie. Correct ?
When it comes to NTFS, this is how you control what happens in the folder, files and sub-folders.  If you have blocked inheritance and you select the option to replace all child objects the block inheritance is lifted and the inherit checkbox is enabled again.
0
 

Author Closing Comment

by:jskfan
ID: 41879103
Thank you Guys!
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

In a question here at Experts Exchange, a member was looking for "a little app that would allow sound to be turned OFF and ON by simply clicking on an icon in the system tray". This article shows how to achieve that, as well as providing the same OF…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
How to fix incompatible JVM issue while installing Eclipse While installing Eclipse in windows, got one error like above and unable to proceed with the installation. This video describes how to successfully install Eclipse. How to solve incompa…

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question