Podcast
Questions and Answers
Advanced Permissions are commonly utilized in Windows Permissions Architecture.
Advanced Permissions are commonly utilized in Windows Permissions Architecture.
False
Deny permissions have a higher priority than Allow permissions in determining access rights.
Deny permissions have a higher priority than Allow permissions in determining access rights.
True
The Specify permissions to control access page is the last step in the New Share Wizard.
The Specify permissions to control access page is the last step in the New Share Wizard.
False
Permissions in Windows are structured such that they can only be denied and not allowed.
Permissions in Windows are structured such that they can only be denied and not allowed.
Signup and view all the answers
Effective Access is determined solely by Allow permissions in a Windows environment.
Effective Access is determined solely by Allow permissions in a Windows environment.
Signup and view all the answers
Server Message Blocks (SMB) is the file-sharing protocol used solely by UNIX systems.
Server Message Blocks (SMB) is the file-sharing protocol used solely by UNIX systems.
Signup and view all the answers
Creating a folder share involves determining which folders to share and the permissions to grant.
Creating a folder share involves determining which folders to share and the permissions to grant.
Signup and view all the answers
The Advanced Sharing dialog box provides a simplified interface for sharing folders.
The Advanced Sharing dialog box provides a simplified interface for sharing folders.
Signup and view all the answers
To access shared folders, users must be granted permissions by the owner of those folders.
To access shared folders, users must be granted permissions by the owner of those folders.
Signup and view all the answers
Network File System (NFS) requires the role service to be installed on a Windows server to function.
Network File System (NFS) requires the role service to be installed on a Windows server to function.
Signup and view all the answers
The Effective Access tab in the Advanced Security Settings dialog box allows users to set NTFS permissions only.
The Effective Access tab in the Advanced Security Settings dialog box allows users to set NTFS permissions only.
Signup and view all the answers
In NTFS, every file and folder has an Access Control List (ACL) that contains Access Control Entries (ACEs).
In NTFS, every file and folder has an Access Control List (ACL) that contains Access Control Entries (ACEs).
Signup and view all the answers
To access files, a user’s Security Identifier (SID) must match the permissions defined in the Access Control Entries (ACEs).
To access files, a user’s Security Identifier (SID) must match the permissions defined in the Access Control Entries (ACEs).
Signup and view all the answers
The Share Permissions tab allows users to perform actions that are usually restricted to Read permissions.
The Share Permissions tab allows users to perform actions that are usually restricted to Read permissions.
Signup and view all the answers
Full Control in NTFS permissions allows a user to modify folder permissions but does not include taking ownership of files.
Full Control in NTFS permissions allows a user to modify folder permissions but does not include taking ownership of files.
Signup and view all the answers
What is the primary protocol used for file sharing in Windows environments?
What is the primary protocol used for file sharing in Windows environments?
Signup and view all the answers
Which of the following steps is NOT required when creating a folder share?
Which of the following steps is NOT required when creating a folder share?
Signup and view all the answers
What role service is required for the Network File System (NFS) to operate?
What role service is required for the Network File System (NFS) to operate?
Signup and view all the answers
Which interface allows for a more detailed configuration when sharing folders?
Which interface allows for a more detailed configuration when sharing folders?
Signup and view all the answers
When sharing folders, which of the following is typically NOT a parameter that needs to be set?
When sharing folders, which of the following is typically NOT a parameter that needs to be set?
Signup and view all the answers
What is the main purpose of the Specify permissions to control access page in the New Share Wizard?
What is the main purpose of the Specify permissions to control access page in the New Share Wizard?
Signup and view all the answers
Which statement best describes the characteristics of Advanced Permissions in Windows Permissions Architecture?
Which statement best describes the characteristics of Advanced Permissions in Windows Permissions Architecture?
Signup and view all the answers
In Windows Permissions, what does the term 'Effective Access' refer to?
In Windows Permissions, what does the term 'Effective Access' refer to?
Signup and view all the answers
Which principle is primarily followed when granting permissions in Windows environments?
Which principle is primarily followed when granting permissions in Windows environments?
Signup and view all the answers
How does Inheriting Permissions function in the context of file sharing?
How does Inheriting Permissions function in the context of file sharing?
Signup and view all the answers
What action is NOT permitted by the Full Control permission in NTFS for folders?
What action is NOT permitted by the Full Control permission in NTFS for folders?
Signup and view all the answers
During the authorization of file accesses, what is compared against the Access Control Entries (ACEs)?
During the authorization of file accesses, what is compared against the Access Control Entries (ACEs)?
Signup and view all the answers
Which of the following statements about Share Permissions is TRUE?
Which of the following statements about Share Permissions is TRUE?
Signup and view all the answers
What is the role of Security Principals in NTFS and ReFS authorization?
What is the role of Security Principals in NTFS and ReFS authorization?
Signup and view all the answers
What does an Access Control List (ACL) specifically contain regarding file permissions?
What does an Access Control List (ACL) specifically contain regarding file permissions?
Signup and view all the answers
Study Notes
Chapter 7: Configuring File and Share Access
- The chapter covers configuring file and share access, designing file sharing strategies, creating folder shares, assigning permissions, and configuring NTFS quotas.
Overview of Chapter Objectives
- Chapter objectives include configuring file and share access, designing file sharing strategies, creating folder shares, assigning permissions, and configuring NTFS quotas.
Creating Folder Shares
-
Shares must be created for network users to access server disks.
-
Crucial factors to determine when creating shares include:
- Folders to share
- Share names
- User permissions for shares
- Offline Files settings for shares
-
Folder shares can be created by right-clicking a folder and selecting "Share with Specific People."
-
A simplified interface is provided by this method.
-
Users can also configure folders for sharing through the folder's properties sheet, offering more control options.
Types of Folder Shares
-
Server Message Blocks (SMB):
- A standard file-sharing protocol used across all Windows versions.
- Requires the File Server role service.
-
Network File System (NFS):
- A standard file-sharing protocol predominantly employed in UNIX and Linux systems.
- Requires the server to have NFS role service installed.
Creating a Folder Share Steps
- Select the profile: Choose from basic SMB profiles (Quick, Advanced, Applications) or NFS profiles. Profiles dictate settings for sharing style.
- Select the server and path: Determine the server and folder path for the share. Options include volume selection or custom path; the location will be a new folder in the \Shares directory on the selected volume.
- Specify share name: Assign a name and description for the folder share.
-
Configure share settings:
- Decide on access enumeration for files on the share.
- Determine whether to enable caching or BranchCache for offline file access making content available to offline users.
- Decide on encryption for data access during share operations to secure data transmitted to and from the share.
- Specify permissions: Define folder permissions for security principals using Basic or Advanced Permissions.
- Confirm selections: Review the configured settings for the file share. A confirmation page verifies the local path, server, cluster role, protocol, and other settings.
Assigning Permissions
-
Windows Permissions Architecture:
- Access Control List (ACL): A list of permissions related to a folder.
- Access Control Entries (ACEs): Define permissions for specific security principals, like users or groups.
-
Windows permits granular control of permissions through the security settings page.
-
The "Additive" approach to assigning permissions begins with a blank set and uses multiple "Allow" entries to grant various access levels.
-
The "Subtractive" approach starts by assigning all access ("Allowed"), then selectively removing ("Deny").
-
Permissions:
- "Full Control": Grants all possible rights (change permissions, take ownership, perform any action enabled by the "Change" permission).
- "Change": Allows modification of file permissions and ownership.
- "Read": Viewing folder names, filenames, file data, attributes, and accessing other folders within the shared folder.
- "Write": Overwriting files, modifying attributes, viewing ownership and permissions.
- "Read & Execute": Navigating restricted folders and performing actions allowed by Read permissions (including reading and running application files).
- "List Folder Contents": Viewing folder names and subfolder names.
- Additional permissions include special permissions, like "Read Extended Attributes", "Create Files/Write Data," "Create Folders/Append Data," etc.
NTFS Authorization
- NTFS and ReFS support permissions for each file and folder, including an ACL with ACEs.
- Each ACE specifies permissions for security principals (users and groups) using security identifiers (SIDs).
- Authorization involves comparing user SIDs with elements’ ACEs to determine access levels.
NTFS Basic Permissions (Folder and File), Overview
- Permissions listed include:
- Full Control
- Modify
- Read & Execute
- List Folder Contents
- Read
- Write
Combining Share and NTFS Permissions
- Share permissions (FC) and NTFS permissions combined offer network folder access.
- Local permissions are often NTFS permissions, while the more restrictive permission set will prevail during conflicting remote share or NTFS access.
Volume Shadow Copies
- Allows maintainance of file versions, recovering accidentally deleted or overwritten data.
- Functionally available for entire volumes only, not specific shares or folders.
Configuring NTFS Quotas
- Enables administrative control of storage limits per volume.
- NTFS quotas limit the storage space available to specific users on a shared volume, preventing disk usage overload.
- To configure, use the “Quota” tab in the Volume’s Properties page.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz focuses on Chapter 7, which explores the configuration of file and share access, including the design of file sharing strategies, creation of folder shares, assignment of permissions, and the management of NTFS quotas. Test your understanding of these critical components in network file sharing.