Podcast
Questions and Answers
Which of the following protocols is NOT used for folder sharing in Windows?
Which of the following protocols is NOT used for folder sharing in Windows?
What must be determined before creating a folder share?
What must be determined before creating a folder share?
Which interface provides greater control when sharing folders?
Which interface provides greater control when sharing folders?
Which service is required on a server to use the Server Message Block (SMB) protocol?
Which service is required on a server to use the Server Message Block (SMB) protocol?
Signup and view all the answers
What is an adjustable setting when creating a folder share for offline files?
What is an adjustable setting when creating a folder share for offline files?
Signup and view all the answers
What does the Full Control share permission allow a user to do?
What does the Full Control share permission allow a user to do?
Signup and view all the answers
During NTFS authorization, what does the system compare when a user attempts to access a file or folder?
During NTFS authorization, what does the system compare when a user attempts to access a file or folder?
Signup and view all the answers
Which permission allows users to create folders within a shared directory?
Which permission allows users to create folders within a shared directory?
Signup and view all the answers
What is the primary function of the Security Principals in NTFS?
What is the primary function of the Security Principals in NTFS?
Signup and view all the answers
What action is NOT permitted by the Change permission in shared folders?
What action is NOT permitted by the Change permission in shared folders?
Signup and view all the answers
What is the primary purpose of the Access Control List (ACL) in Windows Permissions Architecture?
What is the primary purpose of the Access Control List (ACL) in Windows Permissions Architecture?
Signup and view all the answers
What is an example of an Advanced Permission in Windows Permissions?
What is an example of an Advanced Permission in Windows Permissions?
Signup and view all the answers
Which statement about Deny permissions in effective access is true?
Which statement about Deny permissions in effective access is true?
Signup and view all the answers
What describes the nature of Basic Permissions in Windows Permissions?
What describes the nature of Basic Permissions in Windows Permissions?
Signup and view all the answers
In inheriting permissions, what is the primary effect of the permissions hierarchy?
In inheriting permissions, what is the primary effect of the permissions hierarchy?
Signup and view all the answers
Study Notes
Configuring File and Share Access
- Chapter objectives include configuring file and share access, designing a file sharing strategy, creating folder shares, assigning permissions, and configuring NTFS quotas.
- Network users require shares to access disks on servers.
- Determining what folders to share, assigning names, specifying permissions, and defining offline file settings are crucial.
- Creators/owners can share their folders through the simplified interface accessed by right-clicking and the 'Share with Specific People' option.
- Alternatively, more control over folder sharing can be achieved using the sharing tab within the folder's Properties sheet.
- The File Sharing dialog box enables choices for the user to share with and assign permission levels.
- The Advanced Sharing dialog box allows for share name configuration, limiting simultaneous users, comments, permissions, and caching settings.
- Server Message Blocks (SMB) is the standard file-sharing protocol used by Windows versions. Requires the File Server role service.
- Network File System (NFS) is a standard file-sharing protocol used primarily by UNIX and Linux distributions, requiring the Server to have an NFS role service.
- The Shares homepage in Server Manager displays all shares, and provides tools to manage them.
- To create a new share, the New Share Wizard is used, including the options for share name, description in local and remote paths, additional settings, permissions, and confirmation.
- Implementing share profiles is often a faster approach with more basic options for SMB share creations.
- The wizard enables selection of the server and path for the share, including choosing from the volume or specifying a custom path.
- Different configuration profile choices may result in certain options being available or not available during the creation process within the steps on the wizard.
Assigning Permissions
- Access Control Lists (ACLs), Access Control Entries (ACEs), and Security Principal concepts facilitate permissions management.
- ACL is the folder definition and specifies permissions related to sales, managers (full control), and a particular user.
- Permissions allow specific access degrees to security principals.
- Basic permissions are preconfigured combinations of permissions, while advanced permissions are more granular and applied individually.
- Additive permission, or preferred method, starts with no permissions and grants allow permissions.
- Subtractive permission starts with granting allowed permissions and grants deny permissions.
- Permissions inherit downward through a hierarchy effectively controlling access. Explicit permission overrides inherited attributes and is prioritized.
- The Security tab of a properties sheet enables permission management allowing to edit permissions for everyone.
- NTFS authorization defines how the system regulates user permission to files & folders using security identifiers (SIDs).
- Basic NTFS permissions, like full control, modify, delete, read, and execute, define specific actions associated with different permission levels for files and folders.
- Combining share and NTFS permissions affects access control, with local NTFS permissions affecting file & folder access, and shared permissions affecting network access to files & folders. The more restrictive of the permissions settings (local or remote) is the one that actually takes precedence.
NTFS Authorization
- NTFS and ReFS systems support permissions.
- Every file and folder has an ACL (Access Control List) with ACEs (Access Control Entries) specifying permissions for security principals.
- Security principals are users and groups identified by Windows using Security Identifiers (SIDs).
- During authorization, the system checks the user's SIDs against the element's ACEs to verify access.
Volume Shadow Copies
- Maintaining previous versions of files on a server.
- Enables access to a file even if accidentally deleted or overwritten.
- Implemented only for entire volumes.
Configuring NTFS Quotas
- Administrators can set storage limits for users on a volume.
- Users exceeding the quota limit might be denied access or receive a warning.
- Space consumption is measured by the size of files owned or created by the user.
Lesson Summary
- Creating folder shares makes data on file servers accessible to users.
- Permissions operate independently, including NTFS, share, registry, and Active Directory permissions.
- NTFS permissions enable granular control over access levels, including what tasks users can perform.
- Share permissions provide rudimentary, basic access control for files on a network share.
- Access-based enumeration controls access based on individual permissions and determines which resources are visible to the user.
- Offline Files store local copies of files accessed from server shares.
- Volume Shadow Copies enable the preservation of file versions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the essential concepts of configuring file and share access, including designing a file sharing strategy, creating folder shares, and assigning permissions. Learn about utilizing the File Sharing dialog box and Advanced Sharing options to enhance file accessibility. Test your understanding of share configurations and management techniques.