Podcast
Questions and Answers
Which of the following protocols is NOT used for folder sharing in Windows?
Which of the following protocols is NOT used for folder sharing in Windows?
- Network File System (NFS)
- Server Message Block (SMB)
- File Transfer Protocol (FTP) (correct)
- Common Internet File System (CIFS)
What must be determined before creating a folder share?
What must be determined before creating a folder share?
- The type of server hardware being used
- The folders to share and their permissions (correct)
- The maximum file size allowed in the share
- The specific user accounts that can access the share
Which interface provides greater control when sharing folders?
Which interface provides greater control when sharing folders?
- Advanced Sharing dialog box
- File Sharing dialog box
- Properties sheet Sharing tab (correct)
- New Share Wizard
Which service is required on a server to use the Server Message Block (SMB) protocol?
Which service is required on a server to use the Server Message Block (SMB) protocol?
What is an adjustable setting when creating a folder share for offline files?
What is an adjustable setting when creating a folder share for offline files?
What does the Full Control share permission allow a user to do?
What does the Full Control share permission allow a user to do?
During NTFS authorization, what does the system compare when a user attempts to access a file or folder?
During NTFS authorization, what does the system compare when a user attempts to access a file or folder?
Which permission allows users to create folders within a shared directory?
Which permission allows users to create folders within a shared directory?
What is the primary function of the Security Principals in NTFS?
What is the primary function of the Security Principals in NTFS?
What action is NOT permitted by the Change permission in shared folders?
What action is NOT permitted by the Change permission in shared folders?
What is the primary purpose of the Access Control List (ACL) in Windows Permissions Architecture?
What is the primary purpose of the Access Control List (ACL) in Windows Permissions Architecture?
What is an example of an Advanced Permission in Windows Permissions?
What is an example of an Advanced Permission in Windows Permissions?
Which statement about Deny permissions in effective access is true?
Which statement about Deny permissions in effective access is true?
What describes the nature of Basic Permissions in Windows Permissions?
What describes the nature of Basic Permissions in Windows Permissions?
In inheriting permissions, what is the primary effect of the permissions hierarchy?
In inheriting permissions, what is the primary effect of the permissions hierarchy?
Flashcards
Server Message Block (SMB)
Server Message Block (SMB)
A technology used by Windows servers to share files across a network, allowing users to access files remotely.
Network File System (NFS)
Network File System (NFS)
A technology used by Unix and Linux servers to share files across a network. It enables users on different systems to access and modify files on a shared server.
Creating a Folder Share
Creating a Folder Share
A process that involves creating a shared folder on a server, allowing multiple users to access files stored within it simultaneously.
File Sharing Dialog Box
File Sharing Dialog Box
Signup and view all the flashcards
Advanced Sharing Dialog Box
Advanced Sharing Dialog Box
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Access Control Entries (ACEs)
Access Control Entries (ACEs)
Signup and view all the flashcards
Security Principal
Security Principal
Signup and view all the flashcards
Permission
Permission
Signup and view all the flashcards
Subtractive Permissions
Subtractive Permissions
Signup and view all the flashcards
What is Effective Access in Windows?
What is Effective Access in Windows?
Signup and view all the flashcards
What does "Full Control" access permission mean in a shared folder?
What does "Full Control" access permission mean in a shared folder?
Signup and view all the flashcards
What does "Read" access permission mean in a shared folder?
What does "Read" access permission mean in a shared folder?
Signup and view all the flashcards
Explain NTFS Access Control Lists (ACLs).
Explain NTFS Access Control Lists (ACLs).
Signup and view all the flashcards
What is NTFS "Full Control" permission?
What is NTFS "Full Control" permission?
Signup and view all the flashcards
Study Notes
Configuring File and Share Access
- Chapter objectives include configuring file and share access, designing a file sharing strategy, creating folder shares, assigning permissions, and configuring NTFS quotas.
- Network users require shares to access disks on servers.
- Determining what folders to share, assigning names, specifying permissions, and defining offline file settings are crucial.
- Creators/owners can share their folders through the simplified interface accessed by right-clicking and the 'Share with Specific People' option.
- Alternatively, more control over folder sharing can be achieved using the sharing tab within the folder's Properties sheet.
- The File Sharing dialog box enables choices for the user to share with and assign permission levels.
- The Advanced Sharing dialog box allows for share name configuration, limiting simultaneous users, comments, permissions, and caching settings.
- Server Message Blocks (SMB) is the standard file-sharing protocol used by Windows versions. Requires the File Server role service.
- Network File System (NFS) is a standard file-sharing protocol used primarily by UNIX and Linux distributions, requiring the Server to have an NFS role service.
- The Shares homepage in Server Manager displays all shares, and provides tools to manage them.
- To create a new share, the New Share Wizard is used, including the options for share name, description in local and remote paths, additional settings, permissions, and confirmation.
- Implementing share profiles is often a faster approach with more basic options for SMB share creations.
- The wizard enables selection of the server and path for the share, including choosing from the volume or specifying a custom path.
- Different configuration profile choices may result in certain options being available or not available during the creation process within the steps on the wizard.
Assigning Permissions
- Access Control Lists (ACLs), Access Control Entries (ACEs), and Security Principal concepts facilitate permissions management.
- ACL is the folder definition and specifies permissions related to sales, managers (full control), and a particular user.
- Permissions allow specific access degrees to security principals.
- Basic permissions are preconfigured combinations of permissions, while advanced permissions are more granular and applied individually.
- Additive permission, or preferred method, starts with no permissions and grants allow permissions.
- Subtractive permission starts with granting allowed permissions and grants deny permissions.
- Permissions inherit downward through a hierarchy effectively controlling access. Explicit permission overrides inherited attributes and is prioritized.
- The Security tab of a properties sheet enables permission management allowing to edit permissions for everyone.
- NTFS authorization defines how the system regulates user permission to files & folders using security identifiers (SIDs).
- Basic NTFS permissions, like full control, modify, delete, read, and execute, define specific actions associated with different permission levels for files and folders.
- Combining share and NTFS permissions affects access control, with local NTFS permissions affecting file & folder access, and shared permissions affecting network access to files & folders. The more restrictive of the permissions settings (local or remote) is the one that actually takes precedence.
NTFS Authorization
- NTFS and ReFS systems support permissions.
- Every file and folder has an ACL (Access Control List) with ACEs (Access Control Entries) specifying permissions for security principals.
- Security principals are users and groups identified by Windows using Security Identifiers (SIDs).
- During authorization, the system checks the user's SIDs against the element's ACEs to verify access.
Volume Shadow Copies
- Maintaining previous versions of files on a server.
- Enables access to a file even if accidentally deleted or overwritten.
- Implemented only for entire volumes.
Configuring NTFS Quotas
- Administrators can set storage limits for users on a volume.
- Users exceeding the quota limit might be denied access or receive a warning.
- Space consumption is measured by the size of files owned or created by the user.
Lesson Summary
- Creating folder shares makes data on file servers accessible to users.
- Permissions operate independently, including NTFS, share, registry, and Active Directory permissions.
- NTFS permissions enable granular control over access levels, including what tasks users can perform.
- Share permissions provide rudimentary, basic access control for files on a network share.
- Access-based enumeration controls access based on individual permissions and determines which resources are visible to the user.
- Offline Files store local copies of files accessed from server shares.
- Volume Shadow Copies enable the preservation of file versions.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the essential concepts of configuring file and share access, including designing a file sharing strategy, creating folder shares, and assigning permissions. Learn about utilizing the File Sharing dialog box and Advanced Sharing options to enhance file accessibility. Test your understanding of share configurations and management techniques.