05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

You can deny permission to a user account or group. To deny all access to a user<br />

account or group for a folder, deny the Full Control permission.<br />

Standard NTFS File Permissions<br />

You assign file permissions to control the access that users have to files. Table 8-2 lists<br />

the standard NTFS file permissions that you can assign and the type of access that each<br />

provides.<br />

Table 8-2 NTFS File Permissions<br />

This NTFS File<br />

Permission Allows the User to<br />

Lesson 1 Introduction to NTFS Permissions<br />

Read Read the file and view file attributes, ownership, and permissions<br />

Write Overwrite the file, change file attributes, and view file ownership and<br />

permissions<br />

Read & Execute Run applications, plus perform the actions permitted by the Read<br />

permission<br />

Modify Modify and delete the file, plus perform the actions permitted by the Write<br />

permission and the Read & Execute permission<br />

Full Control Change permissions and take ownership, plus perform the actions<br />

permitted by all other NTFS file permissions<br />

How Windows XP Professional Uses Access Control Lists<br />

NTFS stores an access control list (ACL) with every file and folder on an NTFS volume.<br />

The ACL contains a list of all user accounts and groups that have been assigned<br />

permissions for the file or folder, as well as the permissions that they have been<br />

assigned. When a user attempts to gain access to a resource, the ACL must contain an<br />

entry, called an access control entry (ACE), for the user account or a group to which<br />

the user belongs. The entry must allow the type of access that is requested (for example,<br />

Read access) for the user to gain access. If no ACE exists in the ACL, the user cannot<br />

access the resource.<br />

How Effective Permissions Are Calculated When Multiple Sets of NTFS<br />

Permissions Are in Effect<br />

It is possible for multiple sets of NTFS permissions to apply to a user for a particular<br />

resource. For example, a user might be a member of two different groups, each of<br />

which is assigned different permissions to access a resource. To assign permissions<br />

effectively, you must understand the rules and priorities by which NTFS assigns and<br />

combines multiple permissions and NTFS permissions inheritance.<br />

8-3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!