Couldn’t the same be said in reverse? That also means they no longer match and 
there’s a new scenario.

--
There are 10 kinds of people in the world...
         those who understand binary and those who don't.

From: [email protected] [mailto:[email protected]] On 
Behalf Of James Rankin
Sent: Thursday, July 2, 2015 7:27 AM
To: [email protected]
Subject: RE: [NTSysADM] permission/ share life lesson

Easy example would be if you change the NTFS permissions in future, you don’t 
need to update the Share permissions.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Melvin Backus
Sent: 02 July 2015 12:08
To: [email protected]<mailto:[email protected]>
Subject: RE: [NTSysADM] permission/ share life lesson

Perhaps I’m missing something but I’m curious as to the benefit of changing the 
NTFS permissions if they match the share permissions.  It seems like more work 
for no gain.  Obviously you have greater granularity with file permissions, but 
when they match I’m not seeing the point.

--
There are 10 kinds of people in the world...
         those who understand binary and those who don't.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Wednesday, July 1, 2015 11:14 PM
To: [email protected]<mailto:[email protected]>
Subject: RE: [NTSysADM] permission/ share life lesson

That’s completely a workable solution as well. I have simply a “habit” to match 
share and NTFS permissions.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Kurt Buff
Sent: Wednesday, July 1, 2015 9:59 PM
To: ntsysadm
Subject: Re: [NTSysADM] permission/ share life lesson

While MBS says give them modify permissions on the share, it's been my 
long-standing practice to give Full permissions to Everybody on the share, and 
then use NTFS permissions underneath. MBS' approach surely works, but I just 
find it easier to remember/manage if all shares are set the same way.
I also only use grant permissions - never deny.
For instance, assume DirectoryA1 should not be writeable for users, and not 
should DirectoryB1, but DirectoryB1 should be read-write for users. In the 
security dialog for each directory's properties, select Advanced to set the 
type of inheritance (This folder only, vs. This folder, subfolders and files.)

Volume   <<<< Grant Administrators Full (This folder, subfolders and files), 
Users Read (This folder only)
   |
   DirectoryA1   <<<<  Grant Users Read (This folder only) (Administrators 
inherit Full from volume root)
      |
      DirectoryB1   <<<< Grant users Read (This folder, subfolders and files) 
(Administrators inherit Full from volume root)
      |
      DirectoryB2   <<<< Grant Users Read-write (This folder, subfolders and 
files) (Administrators inherit full from volume root)
This can be scripted with any number of tools, probably including PowerShell, 
though I haven't done that yet, icacls and my old favorite fileacl.
Here's a writeup I did for our file server, for the Groups share (which is 
basically the departmental share, where each department gets their own 
subdirectory). It includes the fileacl syntax for the initial configuration of 
a new departmental directory, along with guidelines on how IT will manage the 
directory:

FILEACL "k:\groups\Example" /INHERIT /REPLACE /SUB

FILEACL "k:\groups\Example" /S "CORP\Domain Users":RX/U/U /S 
"CORP\ExampleManagers":RAWaWeXDc/U /S "CORP\ExampleUsers":RX/U/U /REPLACE

FILEACL "k:\groups\Example\Private" /S "CORP\ExampleManagers":RWXD /S 
"CORP\ExampleUsers":RWXD

FILEACL "k:\groups\Example\Public" /S "CORP\Domain Users":RX /S 
"CORP\ExampleManagers":RWXD /S "CORP\ExampleUsers":RWXD


Directions for using this directory:

1) Only new directories can be created at the top level of this directory 
(k:\groups\Example) - not new files - and those can only be created by 
usGroupsExampleManagers or by IT.

2) If a new top-level directory is created, initial permissions on it will only 
be for usHomeGroupsExampleManagers - any further permissions will need to be 
added by IT.

3) The Private directory is restricted to members of the department. The Public 
directory is read-write for members of the department, and read-only for the 
rest of the org.

4) Permissions will only be placed on top-level directories within the 
departmental directory. If permissions need to be modified further down the 
directory tree, the subdirectory in question should be moved to another 
top-level folder.
HTH,
Kurt


On Wed, Jul 1, 2015 at 5:56 PM, David McSpadden 
<[email protected]<mailto:[email protected]>> wrote:
Having trouble figuring this.
I need to be able to write files to a 
\\server\share\folder\folder\blah<file:///\\server\share\folder\folder\blah>. 
That relates to volume:folder\share\folder\folder\blah
I have permission of volume:folder\share\folder\folder\ domain admin:full 
everyone:read and share permission \\server\share<file:///\\server\share> 
domain admin:full everyone:read.
Well come to find out everyone needs to be able to write to blah.
How do I give them that ability with giving them write on folder\folder as well?
And yes, please smack me around I should know this easily but it is escaping me 
for some reason.







David McSpadden
Systems Administrator
Indiana Members Credit Union
P: 317.554.8190<tel:317.554.8190> | F: 317.554.8106<tel:317.554.8106>
[Description: imcu email icon]<http://imcu.com/>  [Description: facebook email 
icon] <https://www.facebook.com/IndianaMembersCU>   [Description: twitter email 
icon] <https://twitter.com/IndMembersCU>

[Description: email logo]
[mcp2]


This e-mail and any files transmitted with it are property of Indiana Members 
Credit Union, are confidential, and are intended solely for the use of the 
individual or entity to whom this e-mail is addressed. If you are not one of 
the named recipient(s) or otherwise have reason to believe that you have 
received this message in error, please notify the sender and delete this 
message immediately from your computer. Any other use, retention, 
dissemination, forwarding, printing, or copying of this email is strictly 
prohibited.


Please consider the environment before printing this email.

Reply via email to