Podcast
Questions and Answers
Advanced Permissions are commonly utilized in Windows Permissions Architecture.
Advanced Permissions are commonly utilized in Windows Permissions Architecture.
False (B)
Deny permissions have a higher priority than Allow permissions in determining access rights.
Deny permissions have a higher priority than Allow permissions in determining access rights.
True (A)
The Specify permissions to control access page is the last step in the New Share Wizard.
The Specify permissions to control access page is the last step in the New Share Wizard.
False (B)
Permissions in Windows are structured such that they can only be denied and not allowed.
Permissions in Windows are structured such that they can only be denied and not allowed.
Effective Access is determined solely by Allow permissions in a Windows environment.
Effective Access is determined solely by Allow permissions in a Windows environment.
Server Message Blocks (SMB) is the file-sharing protocol used solely by UNIX systems.
Server Message Blocks (SMB) is the file-sharing protocol used solely by UNIX systems.
Creating a folder share involves determining which folders to share and the permissions to grant.
Creating a folder share involves determining which folders to share and the permissions to grant.
The Advanced Sharing dialog box provides a simplified interface for sharing folders.
The Advanced Sharing dialog box provides a simplified interface for sharing folders.
To access shared folders, users must be granted permissions by the owner of those folders.
To access shared folders, users must be granted permissions by the owner of those folders.
Network File System (NFS) requires the role service to be installed on a Windows server to function.
Network File System (NFS) requires the role service to be installed on a Windows server to function.
The Effective Access tab in the Advanced Security Settings dialog box allows users to set NTFS permissions only.
The Effective Access tab in the Advanced Security Settings dialog box allows users to set NTFS permissions only.
In NTFS, every file and folder has an Access Control List (ACL) that contains Access Control Entries (ACEs).
In NTFS, every file and folder has an Access Control List (ACL) that contains Access Control Entries (ACEs).
To access files, a user’s Security Identifier (SID) must match the permissions defined in the Access Control Entries (ACEs).
To access files, a user’s Security Identifier (SID) must match the permissions defined in the Access Control Entries (ACEs).
The Share Permissions tab allows users to perform actions that are usually restricted to Read permissions.
The Share Permissions tab allows users to perform actions that are usually restricted to Read permissions.
Full Control in NTFS permissions allows a user to modify folder permissions but does not include taking ownership of files.
Full Control in NTFS permissions allows a user to modify folder permissions but does not include taking ownership of files.
What is the primary protocol used for file sharing in Windows environments?
What is the primary protocol used for file sharing in Windows environments?
Which of the following steps is NOT required when creating a folder share?
Which of the following steps is NOT required when creating a folder share?
What role service is required for the Network File System (NFS) to operate?
What role service is required for the Network File System (NFS) to operate?
Which interface allows for a more detailed configuration when sharing folders?
Which interface allows for a more detailed configuration when sharing folders?
When sharing folders, which of the following is typically NOT a parameter that needs to be set?
When sharing folders, which of the following is typically NOT a parameter that needs to be set?
What is the main purpose of the Specify permissions to control access page in the New Share Wizard?
What is the main purpose of the Specify permissions to control access page in the New Share Wizard?
Which statement best describes the characteristics of Advanced Permissions in Windows Permissions Architecture?
Which statement best describes the characteristics of Advanced Permissions in Windows Permissions Architecture?
In Windows Permissions, what does the term 'Effective Access' refer to?
In Windows Permissions, what does the term 'Effective Access' refer to?
Which principle is primarily followed when granting permissions in Windows environments?
Which principle is primarily followed when granting permissions in Windows environments?
How does Inheriting Permissions function in the context of file sharing?
How does Inheriting Permissions function in the context of file sharing?
What action is NOT permitted by the Full Control permission in NTFS for folders?
What action is NOT permitted by the Full Control permission in NTFS for folders?
During the authorization of file accesses, what is compared against the Access Control Entries (ACEs)?
During the authorization of file accesses, what is compared against the Access Control Entries (ACEs)?
Which of the following statements about Share Permissions is TRUE?
Which of the following statements about Share Permissions is TRUE?
What is the role of Security Principals in NTFS and ReFS authorization?
What is the role of Security Principals in NTFS and ReFS authorization?
What does an Access Control List (ACL) specifically contain regarding file permissions?
What does an Access Control List (ACL) specifically contain regarding file permissions?
Flashcards
Folder Share
Folder Share
A folder that is accessible over the network, allowing users to read, write, or modify files.
Server Message Block (SMB)
Server Message Block (SMB)
The protocol used for file sharing on Windows servers, allowing computers to access files, folders, and printers across a network.
Network File System (NFS)
Network File System (NFS)
The protocol for file sharing on UNIX and Linux systems, enabling access to files and resources on a network.
Creator/Owner
Creator/Owner
Signup and view all the flashcards
Advanced Sharing Dialog Box
Advanced Sharing Dialog Box
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Access Control Entry (ACE)
Access Control Entry (ACE)
Signup and view all the flashcards
Security Principal
Security Principal
Signup and view all the flashcards
Permission
Permission
Signup and view all the flashcards
Configuring File and Share Access
Configuring File and Share Access
Signup and view all the flashcards
Share Permission - Read
Share Permission - Read
Signup and view all the flashcards
Share Permission - Full Control
Share Permission - Full Control
Signup and view all the flashcards
Setting Share Permissions
Setting Share Permissions
Signup and view all the flashcards
Share Permission - Change
Share Permission - Change
Signup and view all the flashcards
Share Permissions
Share Permissions
Signup and view all the flashcards
What are Access Control Lists (ACLs)?
What are Access Control Lists (ACLs)?
Signup and view all the flashcards
What are Access Control Entries (ACEs)?
What are Access Control Entries (ACEs)?
Signup and view all the flashcards
What is 'Configuring File and Share Access'?
What is 'Configuring File and Share Access'?
Signup and view all the flashcards
What is 'Effective Access'?
What is 'Effective Access'?
Signup and view all the flashcards
What are 'Allowing and Denying Permissions'?
What are 'Allowing and Denying Permissions'?
Signup and view all the flashcards
NTFS Authorization
NTFS Authorization
Signup and view all the flashcards
Study Notes
Chapter 7: Configuring File and Share Access
- The chapter covers configuring file and share access, designing file sharing strategies, creating folder shares, assigning permissions, and configuring NTFS quotas.
Overview of Chapter Objectives
- Chapter objectives include configuring file and share access, designing file sharing strategies, creating folder shares, assigning permissions, and configuring NTFS quotas.
Creating Folder Shares
-
Shares must be created for network users to access server disks.
-
Crucial factors to determine when creating shares include:
- Folders to share
- Share names
- User permissions for shares
- Offline Files settings for shares
-
Folder shares can be created by right-clicking a folder and selecting "Share with Specific People."
-
A simplified interface is provided by this method.
-
Users can also configure folders for sharing through the folder's properties sheet, offering more control options.
Types of Folder Shares
- Server Message Blocks (SMB):
- A standard file-sharing protocol used across all Windows versions.
- Requires the File Server role service.
- Network File System (NFS):
- A standard file-sharing protocol predominantly employed in UNIX and Linux systems.
- Requires the server to have NFS role service installed.
Creating a Folder Share Steps
- Select the profile: Choose from basic SMB profiles (Quick, Advanced, Applications) or NFS profiles. Profiles dictate settings for sharing style.
- Select the server and path: Determine the server and folder path for the share. Options include volume selection or custom path; the location will be a new folder in the \Shares directory on the selected volume.
- Specify share name: Assign a name and description for the folder share.
- Configure share settings:
- Decide on access enumeration for files on the share.
- Determine whether to enable caching or BranchCache for offline file access making content available to offline users.
- Decide on encryption for data access during share operations to secure data transmitted to and from the share.
- Specify permissions: Define folder permissions for security principals using Basic or Advanced Permissions.
- Confirm selections: Review the configured settings for the file share. A confirmation page verifies the local path, server, cluster role, protocol, and other settings.
Assigning Permissions
-
Windows Permissions Architecture:
- Access Control List (ACL): A list of permissions related to a folder.
- Access Control Entries (ACEs): Define permissions for specific security principals, like users or groups.
-
Windows permits granular control of permissions through the security settings page.
-
The "Additive" approach to assigning permissions begins with a blank set and uses multiple "Allow" entries to grant various access levels.
-
The "Subtractive" approach starts by assigning all access ("Allowed"), then selectively removing ("Deny").
-
Permissions:
- "Full Control": Grants all possible rights (change permissions, take ownership, perform any action enabled by the "Change" permission).
- "Change": Allows modification of file permissions and ownership.
- "Read": Viewing folder names, filenames, file data, attributes, and accessing other folders within the shared folder.
- "Write": Overwriting files, modifying attributes, viewing ownership and permissions.
- "Read & Execute": Navigating restricted folders and performing actions allowed by Read permissions (including reading and running application files).
- "List Folder Contents": Viewing folder names and subfolder names.
- Additional permissions include special permissions, like "Read Extended Attributes", "Create Files/Write Data," "Create Folders/Append Data," etc.
NTFS Authorization
- NTFS and ReFS support permissions for each file and folder, including an ACL with ACEs.
- Each ACE specifies permissions for security principals (users and groups) using security identifiers (SIDs).
- Authorization involves comparing user SIDs with elements’ ACEs to determine access levels.
NTFS Basic Permissions (Folder and File), Overview
- Permissions listed include:
- Full Control
- Modify
- Read & Execute
- List Folder Contents
- Read
- Write
Combining Share and NTFS Permissions
- Share permissions (FC) and NTFS permissions combined offer network folder access.
- Local permissions are often NTFS permissions, while the more restrictive permission set will prevail during conflicting remote share or NTFS access.
Volume Shadow Copies
- Allows maintainance of file versions, recovering accidentally deleted or overwritten data.
- Functionally available for entire volumes only, not specific shares or folders.
Configuring NTFS Quotas
- Enables administrative control of storage limits per volume.
- NTFS quotas limit the storage space available to specific users on a shared volume, preventing disk usage overload.
- To configure, use the “Quota” tab in the Volume’s Properties page.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.