05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

8-4 Chapter 8 Securing Resources with NTFS Permissions<br />

!<br />

What Are Effective Permissions?<br />

A user’s effective permissions for a resource are the sum of the NTFS permissions<br />

that you assign to the individual user account and to all the groups to which the user<br />

belongs. If a user is granted Read permission for a folder and is a member of a group<br />

with Write permission for the same folder, the user has both Read and Write permissions<br />

for that folder.<br />

<strong>Exam</strong> Tip To manually calculate effective NTFS permissions, first combine all allow permissions<br />

from all sources. Next, determine any deny permissions the user has. Deny permissions<br />

override allow permissions. The result is the user’s effective permissions for the<br />

resource.<br />

How File Permissions Override Folder Permissions<br />

NTFS permissions assigned to files take priority over NTFS permissions assigned to the<br />

folder that contains the file. If you have access to a file, you can access the file if you<br />

have the Bypass Traverse Checking security permission—even if you do not have<br />

access to the folder containing the file. You can access the files for which you have permissions<br />

by using the full Universal Naming Convention (UNC) or local path to open<br />

the file from its respective application, even if you have no permission to access the<br />

folder that contains the file. In other words, if you do not have permission to access the<br />

folder containing the file you want to access, you must have the Bypass Traverse<br />

Checking security permission and you have to know the full path to the file to access<br />

it. Without permission to access the folder, you cannot see the folder, so you cannot<br />

browse for the file.<br />

See Also The Bypass Traverse Checking security permission is described further in Lesson 2,<br />

“Assigning NTFS Permissions and Special Permissions.”<br />

How Deny Permissions Override Allow Permissions<br />

In addition to granting a permission, you can also specifically deny a permission<br />

(although this is not the recommended method of controlling access to resources).<br />

Denying a permission overrides all instances in which that permission is allowed. Even<br />

if a user has permission to access a file or folder as a member of a group, denying permission<br />

to the user blocks any other permissions the user might have (see Figure 8-1).<br />

In Figure 8-1, User1 has Read permission for FolderA and is a member of Group A and<br />

Group B. Group B has Write permission for FolderA. Group A has been denied Write<br />

permission for File2.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!