Link to home
Start Free TrialLog in
Avatar of Arthit84
Arthit84Flag for Sweden

asked on

Share Acess in SMB

Hello i have a strange problem with a share folder.

I have a share folder call "Special1"
in the Shared permission i have these group
-Special1
-domainadministrator
-administrator

I am in domain administrator group but i still dont have access to the shared folder.
I read some where that UAC strip of admin right to the folder for security reason, but if this is the case any got some links so i can read up on this?

If i add myself to Special1 group then there is no problem accessing the folder.
I can live with the work around because the problem is so little. But it would be fun to understand the actual problems :D

Thansk Experts
Avatar of Tom Cieslik
Tom Cieslik
Flag of United States of America image

It must be some glitch
Just assign for your account full permissions to this folder, remove domain admins, close all and reopen folder properties / permission and add domain admins again and assign All permissions again.
You can also take ownership for this group and make domain admins to be owner.
Avatar of Arthit84

ASKER

OK, i will try that.
I took ownership as the users should i redo and take ownership as domain administrator group instead?
Avatar of btan
btan

Try running AccessChk to know what kind of accesses specific users or groups have to resource. You can specify a user or group name and path, AccessChk will report the effective permissions for that account; e.g. The  command reports the accesses that the Power Users account has to files and directories in \Windows\System32: accesschk "power users" c:\windows\system32

Some note on Share folder vs NTFS permission
- Share permissions apply to users who connect to a shared folder over the network.
- Share permissions do not affect users who log on locally, or log on using Remote Desktop. So to set permissions for users who log on locally or using Remote Desktop, set NTFS file permissions using the options on the Security tab instead of the Share Permissions tab.

It may seems to be a local user vs a domain user access permission. If both share permissions and file system permissions are set for a shared folder, the more restrictive permissions apply when connecting to the shared folder.
For example, to give Read access on a shared folder to users in your domain, on the Share Permissions tab, set permissions for the Everyone group to Full Control. On the Security tab, specify more restrictive access by setting the file permissions for the Domain Users group to Read access. The result is that a user who is a member of the Domain Users group has read-only access to the shared folder whether the user is connected through a network share, through Remote Desktop, or is logged on locally.
In addition to shared folder permissions, users must have NTFS permissions for the files and subfolders that shared folders contain to gain access to those files and subfolders.
ASKER CERTIFIED SOLUTION
Avatar of McKnife
McKnife
Flag of Germany image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Sorry for the delay in answer, have been on vacation :D
Thanks for all the answer i will check these and get back
I would say AccessChk would help too see UAC need for elevated rights despite being a domain admin.

For example, AccessChk may run an exe and show the the elevated state:

.\accesschk.exe -p powershell.exe -e
ran elevated, shows:

[3256] powershell.exe
  Medium Mandatory Level [No-Write-Up, No-Read-Up]
  RW superUserPC2\testuser
  RW NT AUTHORITY\SYSTEM
[3660] powershell.exe
  High Mandatory Level [No-Write-Up, No-Read-Up]
  RW BUILTIN\Administrators
  RW NT AUTHORITY\SYSTEM

In the second PowerShell (3660) it is running elevated because it has the High Mandatory Level.

For consideration, pl.
Accesscheck does not offer additional value. It is a command line tool for mass-checking permissions.
Here, the case is very clearly UAC related as this is an evergreen problem, you see this question over and over for as long as UAC has been around. The permissions were listed by the author and accesschk will not reveal anything new.The elevation state of explorer is unelevated - it cannot run elevated without the registry modification that I linked.

Now you can close the question btan.
The tool is just to state whether the folder is required for elevated rights and permission. I understand where you are coming from. I do not have rights to close this discussion. thks for sharing
You misunderstand accesschk.
You run it against powershell, a process that you have started once elevated and once non-elevated. This makes a difference, yes. But running it against his folder or share will show no difference, because integrity levels are not used on folders by default. You can use those, yes, but it won't be the case here, since he does not seem to know these technical specialties.
noted thanks for the clarification.
Then suggest go with McKnife's comment #a41941968