IT tutorials
 
Technology
 

Windows 8 : Controlling Access to Files and Folders with NTFS Permissions (part 1) - Understanding and Using Basic Permissions

9/2/2013 9:47:42 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Understanding and Using Basic Permissions

In Windows 8, the owner of a file or a folder has the right to allow or deny access to that resource, as do members of the Administrators group and other authorized users. By allowing a permission, you grant that permission to a user or a group. By denying a permission, you deny that permission to a user or a group. Keep in mind that entries that deny permissions take precedence over entries that allow permissions. As a result, if a user is a member of two groups, and one group is allowed a permission and the other is denied that permission, the user is denied that permission.

Using File Explorer, you can view the currently assigned basic permissions by pressing and holding or right-clicking a file or a folder, tapping or clicking Properties, and then tapping or clicking the Security tab in the Properties dialog box.

As shown in Figure 1, the Group Or User Names list shows the users and groups with permissions set for the selected resource. If you select a user or a group, the assigned permissions are shown in the Permissions For list. If permissions are shaded (unavailable), it means they have been inherited from a parent folder. 

The Security tab shows the currently assigned basic permissions.

Figure 1. The Security tab shows the currently assigned basic permissions.

Working with and Setting Basic Permissions

All permissions are stored in the file system as part of the access control list (ACL) assigned to a file or a folder. As described in Table 1, six basic permissions are used with folders, and five are also used with files. Although some permissions are inherited based on permissions of a parent folder, all permissions are defined explicitly at some level of the file system hierarchy. Permissions are listed in this table in approximate order of their scope, from Full Control, which grants the most permissions, to Read and Write, which grant specific permissions.

Table 1. Basic File and Folder Permissions

PERMISSION

DESCRIPTION

Full Control

Grants the user or group full control over the selected file or folder and permits reading, writing, changing, and deleting files and subfolders. A user with Full Control permission for a file or folder can change permissions, delete files in the folder regardless of the permission on the files, and also take ownership of a folder or a file. Selecting this permission selects all the other permissions as well.

Modify

Allows the user or group to read, write, change, and delete files. A user with Modify permission can also create files and subfolders, but the user cannot take ownership of files. Selecting this permission selects all the permissions below it.

Read & Execute

Permits viewing and listing files and subfolders as well as executing files. If applied to a folder, this permission is inherited by all files and subfolders within the folder. Selecting this permission selects the List Folder Contents and Read permissions as well.

List Folder Contents (folders only)

Similar to the Read & Execute permission, but available only for folders. Permits viewing and listing files and subfolders, as well as executing files. Unlike Read & Execute, this permission is inherited by subfolders, but not by files within the folder or subfolders.

Read

Allows the user or group to view and list the contents of a folder. A user with this permission can view file attributes, read permissions, and synchronize files. Read is the only permission needed to run scripts. Read access is required to access a shortcut and its target.

Write

Allows the user or group to create new files and write data to existing files. A user with this permission can also view file attributes, read permissions, and synchronize files. Giving a user permission to write but not delete a file or a folder doesn’t prevent the user from deleting the folder’s or file’s contents.

Equally as important as the basic permissions are the users and groups to which you assign those permissions. If a user or a group whose permissions you want to assign is already selected in the Group Or User Names list on the Security tab, you can modify the assigned permissions by tapping or clicking Edit and then using the Allow and Deny columns in the Permissions list. Select check boxes in the Allow column to add permissions, or clear check boxes to remove permissions and then tap or click OK.

To expressly forbid a user or a group from using a permission, select the appropriate check boxes in the Deny column. Because denied permissions have precedence over other permissions, Deny is useful in two specific scenarios:

  • If a user is a member of a group that has been granted a permission, but you don’t want the user to have the permission and don’t want to or can’t remove the user from the group, you can override the inherited permission by denying that specific user the right to use the permission.

  • If a permission is inherited from a parent folder and you prefer that a user or a group not have the inherited permission, you can override the allowed permission (in most cases) by expressly denying the user or group the use of the permission.

If users or groups whose permissions you want to assign aren’t already available in the Group Or User Names list on the Security tab, you can easily add them. To set basic permissions for users or groups not already listed on a file or a folder’s Security tab, follow these steps:

  1. On the Security tab, tap or click Edit. This displays the Permissions For dialog box.

  2. In the Permissions For dialog box, tap or click Add to display the Select Users, Computers, Service Accounts, Or Groups dialog box, as shown in Figure 2.

    Use the Select Users, Computers, Service Accounts, Or Groups dialog box to specify users or groups whose permissions you want to configure.

    Figure 2. Use the Select Users, Computers, Service Accounts, Or Groups dialog box to specify users or groups whose permissions you want to configure.

    Note

    In a workgroup, this dialog box is titled “Select Users Or Groups.” Both dialog boxes serve the same purpose.

    Tip

    Always double-check the value of the From This Location text box. In workgroups, computers will always show only local accounts and groups. In domains, this text box is changeable and is set initially to the default (logon) domain of the currently logged-on user. If this isn’t the location you want to use for selecting user and group accounts to work with, tap or click Locations to see a list of locations you can search, including the current domain, trusted domains, and other resources that you can access.

  3. Type the name of a user or a group account. Be sure to reference the user account name rather than the user’s full name. When entering multiple names, separate them with semicolons.

  4. Tap or click Check Names. If a single match is found for each entry, the dialog box is automatically updated, and the entry is underlined. Otherwise, you’ll see an additional dialog box. If no matches are found, you’ve either entered the name incorrectly or you’re working with an incorrect location. Modify the name in the Name Not Found dialog box and try again, or tap or click Locations to select a new location. When multiple matches are found, in the Multiple Names Found dialog box, select the name you want to use, and then tap or click OK. The users and groups are added to the Group Or User Names list.

  5. You can now configure permissions for each user and group you added by selecting an account name and then allowing or denying access permissions as appropriate.

Special Identities and Best Practices for Assigning Permissions

When you work with basic permissions, it is important to understand not only how the permissions are used, but how special identities can be used to help you assign permissions. The special identities you’ll see the most are Creator Owner and Users, but others are also used occasionally, as described in Table 2. Special identities are members of some groups automatically. To configure permissions for a special identity, enter the special identity’s name as you would the name of any other user or group.

Table 2. Special Identities Used When Setting Permissions

SPECIAL IDENTITY

DESCRIPTION

Anonymous Logon

Includes any network logons for which credentials are not provided. This special identity is used to allow anonymous access to resources, such as those available on a web server.

Authenticated Users

Includes users and computers who log on with a user name and password; does not include users who log on using the Guest account, even if the account is assigned a password.

Creator Owner

The special identity for the account that created a file or a folder. Windows 8 uses this group to identify the account that has ultimate authority over the file or folder.

Dialup

Includes any user who accesses the computer through a dial-up connection. This identity is used to distinguish dial-up users from other types of users.

Everyone

Includes all interactive, dial-up, and authenticated users. Although this group includes guests, it does not include anonymous users.

Interactive

Includes any user logged on locally or through a remote desktop connection.

Network

Includes any user who logs on over the network. This identity is used to allow remote users to access a resource and does not include interactive logons that use remote desktop connections.

Users

Includes authenticated users and domain users only. The built-in Users group is preferred over Everyone.

A solid understanding of these special identities can help you more effectively configure permissions on NTFS volumes. Additionally, whenever you work with permissions, you should keep the following guidelines in mind:

  • Follow the file system hierarchy Inheritance plays a big part in how permissions are set. By default, permissions you set on a folder apply to all files and subfolders within that folder. With this in mind, start at the root folder of a local disk or at a user’s profile folder (both of which act as top-level folders) when you start configuring permissions.

  • Have a plan Don’t set permissions without a clear plan. If permissions on folders get out of sync, and you are looking for a way to start over so that you have some continuity, you might want to configure the permissions as they should be in a parent folder and then reset the permissions on all subfolders and files in that folder.

  • Grant access only as necessary An important aspect of the file access controls built into NTFS is that permissions must be explicitly assigned. If you don’t grant a permission to a user and that user isn’t a member of a group that has a permission, the user doesn’t have that permission—it’s that simple. When assigning permissions, it is especially important to keep this rule in mind because it’s tempting just to give users full control rather than the specific permissions they really need. Granting only the specific permissions users need to do their job is known as the principle of least privilege.

  • Use groups to manage permissions more efficiently Whenever possible, you should make users members of appropriate groups and then assign permissions to those groups rather than to individual users. In this way, you can grant permissions to new users by making them members of the appropriate groups. Then, when a user leaves or goes to another group, you can change the group membership as appropriate. For example, when Sarah joins the sales team, you can add her to the SalesUS and SalesCan groups so that she can access those groups’ shared data. If she later leaves the sales team and joins the marketing team, you can remove her from the SalesUS and SalesCan groups and add her to the MarketingUS and MarketingCan groups. This is much more efficient than editing the properties for every folder Sarah needs access to and assigning permissions.

  • Use central access policies to enhance existing access controls On your domain servers running Windows Server 2012, use central access policies to very precisely define the specific attributes that users and devices must have to access resources.

 
Others
 
- Windows 8 : Managing File Security and Resource Sharing - File Security and Sharing Options
- Scripting Windows Home Server : Programming the WshShell Object (part 2) - Working with Registry Entries, Working with Environment Variables
- Scripting Windows Home Server : Programming the WshShell Object (part 2) - Running Applications, Working with Shortcuts
- Scripting Windows Home Server : Programming the WshShell Object (part 1) - Displaying Information to the User
- Developer Tooling for Sharepoint 2013 : Developing SharePoint Applications Using SharePoint Designer
- Developer Tooling for Sharepoint 2013 : Site Settings
- Developer Tooling for Sharepoint 2013 : SharePoint Development Across Developer Segments, Web-Based Development in SharePoint
- Windows Small Business Server 2011 : Configuring the Windows Update Client Using Group Policy
- Windows Small Business Server 2011 : Configuring WSUS Using the Windows SBS Console
- Windows Server 2008 : Using the Integrated Scripting Environment - Executing Commands in the ISE, Creating and Saving a Script in the ISE
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us