Logo
Lose Weight
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows 7

Controlling Access to Your Data (part 4) - Inherited Permissions & Effective Permissions

3/26/2011 3:06:16 PM

4. Inherited Permissions

By default, all files and folders contained in a folder inherit the permissions assigned during installation or assigned by you when you modify folder permissions. For a disk or other storage device, the top-level folder for inherited permissions is the root folder. For example, the top-level folder for the C: drive is the C:\ folder. Any permissions assigned to this folder are inherited by all other folders on the C: drive automatically. The same is true when you assign permissions to folders at any other level of the folder hierarchy. For example, if you change the permissions for the C:\Data folder, all files and folders contained in the C:\Data folder inherit these permissions by default.

When you are working with permissions, you can easily determine whether a permission is inherited. Inherited permissions are shaded (unavailable) and directly assigned permissions are not shaded. If you don’t want a file or a folder to have the same permissions as a parent folder, you have several choices. You can:

  • Access the parent folder and configure the permissions you want all included files and folders to have.

  • Try to override an inherited permission by selecting the opposite permission. In most cases, Deny overrides Allow.

  • Stop inheriting permissions from the parent folder and then copy or remove existing permissions as appropriate.

If you want a file or a folder to stop inheriting permissions from a parent folder, follow these steps:

  1. In Windows Explorer, right-click the file or folder you want to work with and then select Properties.

  2. In the Properties dialog box, select the Security tab and then click Advanced. This opens the “Advanced Security Settings for” dialog box.

  3. On the Permissions tab, click Change Permissions. This opens an editable view of the Permissions tab in a new dialog box.

  4. Clear the “Include inheritable permissions from this object’s parent” checkbox.

  5. In the Windows Security dialog box, shown in Figure 6, click Add to convert and add the permissions that were applied previously through inheritance, or click Remove to remove the inherited permissions and apply only the permissions that you explicitly set on the folder or file.

  6. After you modify or remove additional permissions as necessary, click OK to save your settings.

Figure 6. Copying or removing permissions


5. Effective Permissions

Because anyone with a user account can belong to multiple groups and those groups can all have different permissions with regard to a file or folder, it is sometimes difficult to figure out exactly what permission you or someone else has with regard to a file or folder. To remove the guesswork involved, Windows 7 lets you view the exact set of effective permissions for a particular user or group by completing just a few steps.

If you want to view effective permissions, follow these steps:

  1. In Windows Explorer, right-click the file or folder you want to work with and then select Properties.

  2. In the Properties dialog box, select the Security tab and then click Advanced. This opens the “Advanced Security Settings for” dialog box.

  3. On the Effective Permissions tab, click Select to display the Select User or Group dialog box.

  4. Type the name of a user or a group account. Click Check Names and then do one of the following:

    • If a single match is found for each entry, the dialog box is automatically updated as appropriate and the entry is underlined.

    • If multiple matches are found, you’ll see an additional dialog box that allows you to select the name you want to use, and then click OK.

    • If no matches are found, you’ve probably entered an incorrect name. Modify the name in the Name Not Found dialog box and then click Check Names again.

The complete set of effective permissions for the selected user or group is listed as shown in Figure 7.

Figure 7. Viewing effective permissions



Other -----------------
- Securing and Sharing Your Data : Securing Your Files
- Fixing and Tweaking Your Network : Managing Network Connections
- Fixing and Tweaking Your Network : Changing Network Settings
- Fixing and Tweaking Your Network : Maximizing Network Performance
- Troubleshooting Network Problems (part 2) - Troubleshooting TCP/IP Problems
- Troubleshooting Network Problems (part 1) - Troubleshooting HomeGroup Problems & Network Troubleshooting Tools
- Fixing and Tweaking Your Network : Diagnosing Problems Using Network Map
- Fixing and Tweaking Your Network : Viewing Status in Network And Sharing Center
- Connecting to Another Computer with Remote Desktop (part 4) - Configuring Performance Options
- Connecting to Another Computer with Remote Desktop (part 3) - Using a Remote Desktop Connection
- Connecting to Another Computer with Remote Desktop (part 2) - Enabling Inbound Remote Desktop Connections
- Connecting to Another Computer with Remote Desktop (part 1) - Configuring Your Network for Remote Desktop Connections
- Finding and Using Shared Resources on a Windows Network
- Sharing Resources with Older Windows Versions (part 4) - Sharing a Printer & Setting Server Properties
- Sharing Resources with Older Windows Versions (part 3) - Setting Advanced Sharing Properties
- Sharing Resources with Older Windows Versions (part 2) - Sharing Files with Public Folders & Sharing Files and Folders from Any Folder
- Sharing Resources with Older Windows Versions (part 1) - Configuring Your Network for Sharing
- Sharing Files, Digital Media, and Printers in a Homegroup (part 2)
- Sharing Files, Digital Media, and Printers in a Homegroup (part 1) - Deciding What to Share—And What Not to Share
- Using HomeGroup to Connect Your Computers at Home
 
 
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Top 10
- Windows Phone 8 Apps : Camera (part 4) - Adjusting Video Settings, Using the Video Light
- Windows Phone 8 Apps : Camera (part 3) - Using the Front Camera, Activating Video Mode
- Windows Phone 8 Apps : Camera (part 2) - Controlling the Camera’s Flash, Changing the Camera’s Behavior with Lenses
- Windows Phone 8 Apps : Camera (part 1) - Adjusting Photo Settings
- MDT's Client Wizard : Package Properties
- MDT's Client Wizard : Driver Properties
- MDT's Client Wizard : Application Properties
- MDT's Client Wizard : Operating System Properties
- MDT's Client Wizard : Customizing the Deployment Share
- Windows Server 2012 : Software and User Account Control Administration (part 5) - Maintaining application integrity - Configuring run levels
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro