Podcast
Questions and Answers
What is the purpose of the Configure share settings page in the New Share Wizard?
What is the purpose of the Configure share settings page in the New Share Wizard?
- To confirm the selections made during the sharing process
- To define permissions for the shared folder (correct)
- To manage the users who can access the share
- To set the name of the new share
Which statement about Windows Permissions Architecture is true?
Which statement about Windows Permissions Architecture is true?
- ACLs are specific to folders only
- Every security principal can have multiple ACEs (correct)
- Deny permissions take precedence over Basic Permissions
- Advanced Permissions are always preferred over Basic Permissions
What happens when Allow permissions and Deny permissions are both assigned to a security principal?
What happens when Allow permissions and Deny permissions are both assigned to a security principal?
- Both permissions are applied equally
- Deny permissions are cumulative
- Allow permissions are ignored
- Deny permissions will override Allow permissions (correct)
What is described as preconfigured permission combinations in Windows Permissions?
What is described as preconfigured permission combinations in Windows Permissions?
In the context of permissions, what does 'inheriting permissions' refer to?
In the context of permissions, what does 'inheriting permissions' refer to?
What is one of the actions that can be performed with the Modify permission on a file?
What is one of the actions that can be performed with the Modify permission on a file?
Which NTFS permission allows a user to view the names of files and subfolders without accessing their contents?
Which NTFS permission allows a user to view the names of files and subfolders without accessing their contents?
What capability does the owner of a file or folder retain, regardless of current permission settings?
What capability does the owner of a file or folder retain, regardless of current permission settings?
When a user has Read permission on a folder, what can they do?
When a user has Read permission on a folder, what can they do?
What can a user do with Write permission on a folder?
What can a user do with Write permission on a folder?
What must be determined before creating folder shares?
What must be determined before creating folder shares?
Which file-sharing protocol is standard for all versions of Windows?
Which file-sharing protocol is standard for all versions of Windows?
What is a necessary requirement for using the Network File System (NFS)?
What is a necessary requirement for using the Network File System (NFS)?
Which action allows a user to share their own folders with specific people?
Which action allows a user to share their own folders with specific people?
Which of the following is NOT a consideration when creating a folder share?
Which of the following is NOT a consideration when creating a folder share?
What permissions are included in the Full Control option for a folder?
What permissions are included in the Full Control option for a folder?
Which of the following is NOT a capability granted by Share Permissions?
Which of the following is NOT a capability granted by Share Permissions?
What do security principals represent in the context of NTFS permissions?
What do security principals represent in the context of NTFS permissions?
During the authorization process in NTFS, what is compared to determine a user's access to a file or folder?
During the authorization process in NTFS, what is compared to determine a user's access to a file or folder?
What is one function of the Share Permissions tab for a shared folder?
What is one function of the Share Permissions tab for a shared folder?
Advanced Permissions are more commonly used than Basic Permissions.
Advanced Permissions are more commonly used than Basic Permissions.
Deny permissions always override Allow permissions in Windows permissions architecture.
Deny permissions always override Allow permissions in Windows permissions architecture.
Permissions run upward through a hierarchy in Windows systems.
Permissions run upward through a hierarchy in Windows systems.
Explicit permissions are less important than inherited permissions.
Explicit permissions are less important than inherited permissions.
An Access Control List (ACL) specifies the capabilities of a security principal.
An Access Control List (ACL) specifies the capabilities of a security principal.
Only System Administrators can create folder shares on a server.
Only System Administrators can create folder shares on a server.
The Server Message Blocks (SMB) protocol is used exclusively by UNIX and Linux systems.
The Server Message Blocks (SMB) protocol is used exclusively by UNIX and Linux systems.
NTFS quotas can be configured to limit the disk space available to users on a server.
NTFS quotas can be configured to limit the disk space available to users on a server.
Creating folder shares requires you to assign specific names, permissions, and determine folder settings.
Creating folder shares requires you to assign specific names, permissions, and determine folder settings.
NFS role service must be installed to use the SMB protocol.
NFS role service must be installed to use the SMB protocol.
NTFS and ReFS drives do not support permissions.
NTFS and ReFS drives do not support permissions.
A user with Full Control permission can take ownership of files and folders.
A user with Full Control permission can take ownership of files and folders.
The permissions for a file are determined by comparing the user's security identifiers (SIDs) to the access control entries (ACEs).
The permissions for a file are determined by comparing the user's security identifiers (SIDs) to the access control entries (ACEs).
The Share Permissions tab grants users the ability to change file attributes.
The Share Permissions tab grants users the ability to change file attributes.
In NTFS authorization, every file and folder has an ACL with numerous ACEs.
In NTFS authorization, every file and folder has an ACL with numerous ACEs.
An owner of a file or folder cannot modify the permissions if current settings deny them access.
An owner of a file or folder cannot modify the permissions if current settings deny them access.
With Write permission on a folder, a user can create new files and subfolders inside that folder.
With Write permission on a folder, a user can create new files and subfolders inside that folder.
The Read & Execute permission allows users to run applications and perform all actions associated with the Read permission.
The Read & Execute permission allows users to run applications and perform all actions associated with the Read permission.
List Folder Contents permission allows a user to view the contents of files without needing any additional permissions.
List Folder Contents permission allows a user to view the contents of files without needing any additional permissions.
The Take Ownership permission allows a user to assume ownership of a file or folder that they did not create.
The Take Ownership permission allows a user to assume ownership of a file or folder that they did not create.
Flashcards
Folder Shares
Folder Shares
A mechanism that allows network users to access files and folders located on a server. Creating shares involves defining which folders are shared, assigning names to them, setting permissions for users, and configuring offline file options.
SMB (Server Message Blocks)
SMB (Server Message Blocks)
The standard file sharing protocol used by all versions of Windows. It enables file sharing between Windows computers and requires the File Server role service to be installed on the server.
NFS (Network File System)
NFS (Network File System)
The standard file sharing protocol used by most UNIX and Linux systems. It enables file sharing between Unix/Linux systems and requires the NFS role service to be installed on the server.
Sharing Tab - Folder Properties
Sharing Tab - Folder Properties
Signup and view all the flashcards
New Share Wizard
New Share Wizard
Signup and view all the flashcards
Access Control List (ACL)
Access Control List (ACL)
Signup and view all the flashcards
Access Control Entry (ACE)
Access Control Entry (ACE)
Signup and view all the flashcards
Permissions
Permissions
Signup and view all the flashcards
Additive Permissions
Additive Permissions
Signup and view all the flashcards
Subtractive Permissions
Subtractive Permissions
Signup and view all the flashcards
Share Permissions
Share Permissions
Signup and view all the flashcards
Full Control Share Permission
Full Control Share Permission
Signup and view all the flashcards
Read Share Permission
Read Share Permission
Signup and view all the flashcards
NTFS Permissions
NTFS Permissions
Signup and view all the flashcards
What does an ACE contain?
What does an ACE contain?
Signup and view all the flashcards
NTFS Permission: Modify
NTFS Permission: Modify
Signup and view all the flashcards
NTFS Permission: Read & Execute
NTFS Permission: Read & Execute
Signup and view all the flashcards
NTFS Permission: List Folder Contents
NTFS Permission: List Folder Contents
Signup and view all the flashcards
NTFS Permission: Read
NTFS Permission: Read
Signup and view all the flashcards
NTFS Permission: Write
NTFS Permission: Write
Signup and view all the flashcards
What are the types of folder shares?
What are the types of folder shares?
Signup and view all the flashcards
What is the purpose of the New Share Wizard?
What is the purpose of the New Share Wizard?
Signup and view all the flashcards
What is the File Sharing dialog box?
What is the File Sharing dialog box?
Signup and view all the flashcards
What's the purpose of the 'Advanced Sharing' dialog box?
What's the purpose of the 'Advanced Sharing' dialog box?
Signup and view all the flashcards
What does the 'Shares' homepage show?
What does the 'Shares' homepage show?
Signup and view all the flashcards
ACL
ACL
Signup and view all the flashcards
ACE
ACE
Signup and view all the flashcards
Security Principal
Security Principal
Signup and view all the flashcards
What are security principals?
What are security principals?
Signup and view all the flashcards
What is a share permission?
What is a share permission?
Signup and view all the flashcards
Study Notes
Chapter Objectives
- Configure File and Share Access
- Designing a File Sharing Strategy
- Creating Folder Shares
- Assigning Permissions
- Configuring NTFS Quotas
Creating Folder Shares
- Shares are required for network users to access server disks.
- To create a share, determine:
- Folders to share
- Names for shares
- Permissions for users
- Offline Files settings
Creator/Owner
- Users can share their folders.
- Right-click and select "Share with Specific People" for a simplified interface.
- Use the Sharing tab in the folder's Properties sheet for more control.
Creating Folder Shares (Dialog Box)
- The File Sharing dialog box lets you choose network users to share with.
- You can enter a user's name and click "Add" or use the arrow to find them.
- Permission levels include "Read/Write," "Owner," and "Read."
Advanced Sharing
- The Advanced Sharing dialog box provides additional settings.
- Allows specifying a share name, limit on simultaneous users, comments, permissions, and caching.
Types of Folder Shares
- Server Message Blocks (SMB): Standard file-sharing protocol used by all Windows versions. Requires the File Server role service.
- Network File System (NFS): Standard file-sharing protocol used by most UNIX and Linux distributions. Requires the Server to have the NFS role service installed.
Create a Folder Share (Homepage)
- The Shares homepage allows viewing and managing shares in Server Manager, presenting a list of all shares, associated tasks, and volumes.
- This page displays a list of shares, and enables creation of a new share using the New Share Wizard.
Select the Profile for This Share
- The New Share Wizard presents different sharing profiles:
- SMB Share - Quick
- SMB Share - Advanced
- SMB Share - Applications
- NFS Share - Quick
- NFS Share - Advanced
Select the Server and Path for This Share
- The New Share Wizard allows choosing the server and path for the share.
- Selects which volume (e.g., C:) the new folder will be created under.
- Allows entering a custom path.
Specify Share Name
- The New Share Wizard prompts for the name and description of the share.
- It indicates whether the folder to share on the local computer exists (or will be created).
- A remote path or share can also be specified.
Configure Share Settings
- Users can decide whether to Enable access-based enumeration.
- This feature allows only files and folders with read permissions to display to users
- Allows caching of shares to make them available offline, if the BranchCache for Network Files role service is installed.
- Users can decide whether to Enable BranchCache on the share.
- Users can decide whether to Encrypt data access.
Specify Permissions to Control Access
- Permissions for files accessed via a share are decided by a combination of folder permissions, share permissions, and an optional central access policy.
- Pre-defined permissions and groups are provided (e.g., CREATOR OWNER, BUILTIN\Users).
Confirm Selections
- Before creating the share, this page confirms the settings defined in the Wizard.
- Includes information like the server, share name, protocol, disk space, and whether access-based enumeration, caching, BranchCache, and encryption are disabled.
The New Share on the Shares Homepage
- The new share appears after successful creation on the Shares homepage.
Assigning Permissions
- This section covers how to configure file and share access permissions.
- Discusses Access Control List (ACLs), Access Control Entries (ACEs), and security principals.
Windows Permissions Architecture
- ACLs (Access Control Lists) regulate access to folders.
- ACEs (Access Control Entries) determine which user has what permission by connecting to the user or group.
- Security principals are users or groups identified by Windows using security identifiers (SIDs).
The Security Tab of a Properties sheet
- Enables checking and changing permissions for different user groups, such as Everyone and Creator/Owner.
Basic and Advanced Permissions
- Basic permissions are preconfigured combinations.
- Advanced permissions offer granular controls, though rarely used.
Allowing and Denying Permissions
- Additive: Starts with no permissions, then grants Allow permissions.
- Subtractive: Grants Allow permissions, then adds Deny permissions for restricted access.
Inheriting Permissions
- Permissions apply downward to subfolders and files.
Effective Access
- The combined Allow and Deny permissions determine access to an element.
- Allow permissions are cumulative; Deny overrides Allow.
- Explicit permissions take precedence over inherited permissions.
The Effective Access Tab of the Advanced Security Settings Dialog Box
- This tab provides a detailed view of the permissions for a user, group, or device account.
- It allows evaluation of the potential impact of adding a group or user.
Setting Shared Folder Permissions
- This tab in the share's properties window allows specific share permissions.
Share Permissions
- Share permissions control access to shared folders.
- Different permissions dictate actions, such as full control, change, and read.
NTFS Authorization
- NTFS and ReFS support permissions.
- Each element has an ACL that includes ACEs (Access Control Entries) that link a security principal (person or group) with permissions.
- Security principals are identified by security identifiers (SIDs).
NTFS Basic Permissions
- Full Control: Modifying folder permissions, taking ownership, and performing related actions.
- Modify: Deleting/modifying folder(s).
- Read & Execute: Navigating and running applications within folders.
- Read: Viewing file contents, their ownership, permissions details
- Write: Creating, modifying (overwriting), attributes.
Configuring NTFS Quotas
- Enables administrators to set space restrictions for users on a volume.
- Users exceeding the limit can be either denied access or warned.
How NTFS Security and Shared Permissions Work Together
- When configuring a shared folder, both NTFS permissions (file/folder level) and shared permissions (network access) must be set up.
- When these two permissions conflict, local permissions (NTFS) take precedence.
Volume Shadow Copies
- Allows maintaining previous versions of files and folders.
- Enables reverting to earlier versions if accidentally deleted or overwritten.
- Applicable to volumes only, not individual files/folders.
NTFS Security and Shared Permissions Example
- The presentation provides an example to calculate the effective permissions for a user based on the combination of NTFS permissions and share permissions, and the hierarchy of permissions.
Volume Shadow Copies
- Allows maintaining previous versions of files on a server.
- A copy of a file is accessible even if it is deleted or overwritten.
- Can be applied to entire volumes only.
NTFS Quotas
- Enable administrators to set storage limits for users on a volume.
- Users exceeding the limit may be denied access or warned.
NTFS Basic Permissions—Additional Examples
- List Folder Contents: Viewing the names of subfolders and files within a folder.
- Read: Viewing files and subfolder contents, ownership, permissions, and attributes of a folder.
- Write: Creating new files and subfolders within a target folder, modifying folder attributes, and viewing ownership and permissions.
- Modify: Modifying file/folder attributes and deleting.
- Read & Execute: Navigating folders to access other files/folders, running applications.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Windows permissions architecture and file-sharing settings with this comprehensive quiz. Explore topics such as inheritance of permissions, NTFS permissions, and the capabilities of security principals in Windows environments.