Goal: Use NTFS folder permissions set by Active Directory groups to over-ride (restrict) access for a shared folder sub-tree.
Share Approach: Create share at top of folder tree, group "Everyone" gets "read" Share permission
Folder Security: Inheritance of NTFS permissions is turned off at all levels of the tree.
Sub-Folder control: A specific subfolder has Active Directory resource groups that control Read or Read/Write to the folder with a "Deny" mode for all others.
Concern: We don't know how to implement a group control that creates a "Deny all" default position that is then superceded by the resource group that allows certain members to Read/write.
QUESTION: How do you typically constrain a specific NTFS sub-folder to NOT have the same open Read permissions as the file share specifies AND also identify groups that have RW or R permissions in that folder?
D.E.R. Management - IT Project Management Consulting
Share Approach: Create share at top of folder tree, group "Everyone" gets "read" Share permission
Folder Security: Inheritance of NTFS permissions is turned off at all levels of the tree.
Sub-Folder control: A specific subfolder has Active Directory resource groups that control Read or Read/Write to the folder with a "Deny" mode for all others.
Concern: We don't know how to implement a group control that creates a "Deny all" default position that is then superceded by the resource group that allows certain members to Read/write.
QUESTION: How do you typically constrain a specific NTFS sub-folder to NOT have the same open Read permissions as the file share specifies AND also identify groups that have RW or R permissions in that folder?
D.E.R. Management - IT Project Management Consulting