Podcast
Questions and Answers
What do NTFS permissions primarily determine for users and groups?
What do NTFS permissions primarily determine for users and groups?
Which set of permissions is commonly used 99% of the time?
Which set of permissions is commonly used 99% of the time?
Which permission allows a user to modify the contents of a folder?
Which permission allows a user to modify the contents of a folder?
What is the primary function of NTFS permissions?
What is the primary function of NTFS permissions?
Signup and view all the answers
What is a key feature of inherited permissions?
What is a key feature of inherited permissions?
Signup and view all the answers
Which permission is NOT a basic permission in NTFS?
Which permission is NOT a basic permission in NTFS?
Signup and view all the answers
What does an Access Token contain when a user logs onto an NTFS formatted computer?
What does an Access Token contain when a user logs onto an NTFS formatted computer?
Signup and view all the answers
What is the role of groups in NTFS permissions?
What is the role of groups in NTFS permissions?
Signup and view all the answers
In the context of NTFS, what does ACL stand for?
In the context of NTFS, what does ACL stand for?
Signup and view all the answers
Which action can NOT be performed with special permissions?
Which action can NOT be performed with special permissions?
Signup and view all the answers
What outcome occurs if the system does not find a match between an Access Token and an ACE in the ACL?
What outcome occurs if the system does not find a match between an Access Token and an ACE in the ACL?
Signup and view all the answers
Which of the following operating systems first introduced NTFS on a client Operating System?
Which of the following operating systems first introduced NTFS on a client Operating System?
Signup and view all the answers
What happens when a user creates a new file in a folder with inherited permissions?
What happens when a user creates a new file in a folder with inherited permissions?
Signup and view all the answers
What happens to permissions when an object is copied to the same NTFS volume?
What happens to permissions when an object is copied to the same NTFS volume?
Signup and view all the answers
What is the effect of moving a file from an NTFS volume to a FAT partition?
What is the effect of moving a file from an NTFS volume to a FAT partition?
Signup and view all the answers
How can you check a specific user's cumulative permissions to an object?
How can you check a specific user's cumulative permissions to an object?
Signup and view all the answers
What does the command 'ICACLS testfolder /reset /t /c' do?
What does the command 'ICACLS testfolder /reset /t /c' do?
Signup and view all the answers
What happens when an object is copied from a FAT partition to an NTFS volume?
What happens when an object is copied from a FAT partition to an NTFS volume?
Signup and view all the answers
What happens to the permissions when a user has READ permission and belongs to a group with WRITE permission on the same object?
What happens to the permissions when a user has READ permission and belongs to a group with WRITE permission on the same object?
Signup and view all the answers
What is the effect of disabling inheritance on a folder's permissions?
What is the effect of disabling inheritance on a folder's permissions?
Signup and view all the answers
What is the primary function of the DENY permission in a permissions structure?
What is the primary function of the DENY permission in a permissions structure?
Signup and view all the answers
What happens when a user copies an object to a new location in terms of its permissions?
What happens when a user copies an object to a new location in terms of its permissions?
Signup and view all the answers
What is the behavior of the REMOVE option when disabling inheritance?
What is the behavior of the REMOVE option when disabling inheritance?
Signup and view all the answers
What can an object owner do regarding permissions on their owned object?
What can an object owner do regarding permissions on their owned object?
Signup and view all the answers
How does moving an object within the same NTFS volume affect its permissions?
How does moving an object within the same NTFS volume affect its permissions?
Signup and view all the answers
Which of the following statements about permission inheritance is false?
Which of the following statements about permission inheritance is false?
Signup and view all the answers
What is the purpose of setting EVERYONE = FULL CONTROL in NTFS share permissions?
What is the purpose of setting EVERYONE = FULL CONTROL in NTFS share permissions?
Signup and view all the answers
What character is used to denote a hidden share in NTFS?
What character is used to denote a hidden share in NTFS?
Signup and view all the answers
Which of the following represents the MOST RESTRICTIVE result when combining share and NTFS permissions?
Which of the following represents the MOST RESTRICTIVE result when combining share and NTFS permissions?
Signup and view all the answers
How can you access a network share using the Universal Naming Convention (UNC)?
How can you access a network share using the Universal Naming Convention (UNC)?
Signup and view all the answers
What must be done to enable access to the default hidden shares on a home network?
What must be done to enable access to the default hidden shares on a home network?
Signup and view all the answers
Study Notes
NTFS (New Technology File System)
- Windows 2000 was the first operating system to introduce NTFS on a client operating system.
- NTFS provides security at the file system level.
- When logging into an NTFS formatted computer, an Access Token is created for the user which contains their User SID, Group SID and permissions
- All processes have access to this token, enabling NTFS permissions to be checked against a resource's Access Control List (ACL)
- An ACL contains Access Control Entries (ACE) which define permissions for each user/object on the system.
- Access is granted if the user's Access Token matches an ACE in the ACL, otherwise access is denied.
NTFS Permissions
- NTFS Permissions dictate what users, groups and computers can access files, folders and objects (printers)
- Permissions determine what level of access (read, write, modify, etc.) a user can have on a file or folder
- Files and folders use the same permissions settings/template
- Basic permissions are comprised of advanced permissions
- 'Full Control' is the most inclusive permission and provides all access
- 'Modify' allows to read and write to a file or folder
- 'Read & Execute' only allows to read the content of a file and execute a file
- 'List folder contents' is folder specific and allows to view the files and folders in a directory
- 'Read' allows to access and read a file
- 'Write' allows to overwrite a file or create new content
- Groups can be used to simplify permissions management by assigning permissions to a group and simply adding or removing members
NTFS Permission Rules & Tools
- Permissions can be explicitly set for a specific object or inherited from the parent folder
- Explicit permissions are set directly at the object level
- Inherited permissions are automatically applied from parent folder to child folder
- All permissions are cumulative and are added together to determine a user's effective permissions to an object
- Inheritance can be disabled via the object properties by selecting 'Disable Inheritance'
- Selecting 'Convert' when disabling inheritance will make all inherited permissions explicit and editable, while keeping existing permissions intact
- Selecting 'Remove' when disabling inheritance will remove all permissions, including those held by the system, and replace them with new explicit permissions.
- 'Deny' overrides 'Allow' and can cancel existing permissions, it is generally discouraged and should be used sparingly.
- Every object has an owner that can change permissions, even if they don't have any permissions to the object
- Administrator accounts can change ownership of an orphaned object
- When copying a file, the copied object inherits permissions from its new parent folder
- When moving a file, the file maintains its existing permissions because a new object is not created
- When moving or copying a file between NTFS volumes the new object will inherit permissions from the parent folder
- Moving or copying from NTFS to FAT will result in losing all permissions
- Moving or copying from FAT to NTFS will cause the file to inherit permissions from the parent folder
- Effective permissions can be checked for a specific user for any object
- 'ICACLS' is a command line tool used for checking and setting permissions on objects
- It allows saving permissions settings before making changes to enable easy restoration
- 'ICACLS' can be used in scripts to automate permission modification
NTFS Sharing
- There are two options for sharing objects, in the real world, only one is recommended
- Three types of share permissions exist: 'Read', 'Change', and 'Full Control'
- NTFS share permissions and NTFS object permissions work together and the most restrictive permission is applied
- To avoid inconsistent access levels, set share permissions using 'Everyone = Full Control'
- Accessing shared objects is done through the Universal Naming Convention (UNC) path
- Format: \ComputerName\ShareName
- C:\ is a hidden share by default, accessible through \ComputerName\C$
- Hidden shares do not show up in File Explorer and must explicitly be entered using the UNC path
- Create hidden shares by adding a '$' to the end of the share name
- Default share accessible on Domain Network, but not home network, a registry change can be made to enable on a home network
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on NTFS (New Technology File System) fundamentals and its permission settings. This quiz covers the introduction of NTFS in Windows 2000, Access Tokens, ACLs, and permission management for files and folders.