Podcast
Questions and Answers
What is the purpose of the Configure share settings page in the New Share Wizard?
What is the purpose of the Configure share settings page in the New Share Wizard?
Which statement about Windows Permissions Architecture is true?
Which statement about Windows Permissions Architecture is true?
What happens when Allow permissions and Deny permissions are both assigned to a security principal?
What happens when Allow permissions and Deny permissions are both assigned to a security principal?
What is described as preconfigured permission combinations in Windows Permissions?
What is described as preconfigured permission combinations in Windows Permissions?
Signup and view all the answers
In the context of permissions, what does 'inheriting permissions' refer to?
In the context of permissions, what does 'inheriting permissions' refer to?
Signup and view all the answers
What is one of the actions that can be performed with the Modify permission on a file?
What is one of the actions that can be performed with the Modify permission on a file?
Signup and view all the answers
Which NTFS permission allows a user to view the names of files and subfolders without accessing their contents?
Which NTFS permission allows a user to view the names of files and subfolders without accessing their contents?
Signup and view all the answers
What capability does the owner of a file or folder retain, regardless of current permission settings?
What capability does the owner of a file or folder retain, regardless of current permission settings?
Signup and view all the answers
When a user has Read permission on a folder, what can they do?
When a user has Read permission on a folder, what can they do?
Signup and view all the answers
What can a user do with Write permission on a folder?
What can a user do with Write permission on a folder?
Signup and view all the answers
What must be determined before creating folder shares?
What must be determined before creating folder shares?
Signup and view all the answers
Which file-sharing protocol is standard for all versions of Windows?
Which file-sharing protocol is standard for all versions of Windows?
Signup and view all the answers
What is a necessary requirement for using the Network File System (NFS)?
What is a necessary requirement for using the Network File System (NFS)?
Signup and view all the answers
Which action allows a user to share their own folders with specific people?
Which action allows a user to share their own folders with specific people?
Signup and view all the answers
Which of the following is NOT a consideration when creating a folder share?
Which of the following is NOT a consideration when creating a folder share?
Signup and view all the answers
What permissions are included in the Full Control option for a folder?
What permissions are included in the Full Control option for a folder?
Signup and view all the answers
Which of the following is NOT a capability granted by Share Permissions?
Which of the following is NOT a capability granted by Share Permissions?
Signup and view all the answers
What do security principals represent in the context of NTFS permissions?
What do security principals represent in the context of NTFS permissions?
Signup and view all the answers
During the authorization process in NTFS, what is compared to determine a user's access to a file or folder?
During the authorization process in NTFS, what is compared to determine a user's access to a file or folder?
Signup and view all the answers
What is one function of the Share Permissions tab for a shared folder?
What is one function of the Share Permissions tab for a shared folder?
Signup and view all the answers
Advanced Permissions are more commonly used than Basic Permissions.
Advanced Permissions are more commonly used than Basic Permissions.
Signup and view all the answers
Deny permissions always override Allow permissions in Windows permissions architecture.
Deny permissions always override Allow permissions in Windows permissions architecture.
Signup and view all the answers
Permissions run upward through a hierarchy in Windows systems.
Permissions run upward through a hierarchy in Windows systems.
Signup and view all the answers
Explicit permissions are less important than inherited permissions.
Explicit permissions are less important than inherited permissions.
Signup and view all the answers
An Access Control List (ACL) specifies the capabilities of a security principal.
An Access Control List (ACL) specifies the capabilities of a security principal.
Signup and view all the answers
Only System Administrators can create folder shares on a server.
Only System Administrators can create folder shares on a server.
Signup and view all the answers
The Server Message Blocks (SMB) protocol is used exclusively by UNIX and Linux systems.
The Server Message Blocks (SMB) protocol is used exclusively by UNIX and Linux systems.
Signup and view all the answers
NTFS quotas can be configured to limit the disk space available to users on a server.
NTFS quotas can be configured to limit the disk space available to users on a server.
Signup and view all the answers
Creating folder shares requires you to assign specific names, permissions, and determine folder settings.
Creating folder shares requires you to assign specific names, permissions, and determine folder settings.
Signup and view all the answers
NFS role service must be installed to use the SMB protocol.
NFS role service must be installed to use the SMB protocol.
Signup and view all the answers
NTFS and ReFS drives do not support permissions.
NTFS and ReFS drives do not support permissions.
Signup and view all the answers
A user with Full Control permission can take ownership of files and folders.
A user with Full Control permission can take ownership of files and folders.
Signup and view all the answers
The permissions for a file are determined by comparing the user's security identifiers (SIDs) to the access control entries (ACEs).
The permissions for a file are determined by comparing the user's security identifiers (SIDs) to the access control entries (ACEs).
Signup and view all the answers
The Share Permissions tab grants users the ability to change file attributes.
The Share Permissions tab grants users the ability to change file attributes.
Signup and view all the answers
In NTFS authorization, every file and folder has an ACL with numerous ACEs.
In NTFS authorization, every file and folder has an ACL with numerous ACEs.
Signup and view all the answers
An owner of a file or folder cannot modify the permissions if current settings deny them access.
An owner of a file or folder cannot modify the permissions if current settings deny them access.
Signup and view all the answers
With Write permission on a folder, a user can create new files and subfolders inside that folder.
With Write permission on a folder, a user can create new files and subfolders inside that folder.
Signup and view all the answers
The Read & Execute permission allows users to run applications and perform all actions associated with the Read permission.
The Read & Execute permission allows users to run applications and perform all actions associated with the Read permission.
Signup and view all the answers
List Folder Contents permission allows a user to view the contents of files without needing any additional permissions.
List Folder Contents permission allows a user to view the contents of files without needing any additional permissions.
Signup and view all the answers
The Take Ownership permission allows a user to assume ownership of a file or folder that they did not create.
The Take Ownership permission allows a user to assume ownership of a file or folder that they did not create.
Signup and view all the answers
Study Notes
Chapter Objectives
- Configure File and Share Access
- Designing a File Sharing Strategy
- Creating Folder Shares
- Assigning Permissions
- Configuring NTFS Quotas
Creating Folder Shares
- Shares are required for network users to access server disks.
- To create a share, determine:
- Folders to share
- Names for shares
- Permissions for users
- Offline Files settings
Creator/Owner
- Users can share their folders.
- Right-click and select "Share with Specific People" for a simplified interface.
- Use the Sharing tab in the folder's Properties sheet for more control.
Creating Folder Shares (Dialog Box)
- The File Sharing dialog box lets you choose network users to share with.
- You can enter a user's name and click "Add" or use the arrow to find them.
- Permission levels include "Read/Write," "Owner," and "Read."
Advanced Sharing
- The Advanced Sharing dialog box provides additional settings.
- Allows specifying a share name, limit on simultaneous users, comments, permissions, and caching.
Types of Folder Shares
- Server Message Blocks (SMB): Standard file-sharing protocol used by all Windows versions. Requires the File Server role service.
- Network File System (NFS): Standard file-sharing protocol used by most UNIX and Linux distributions. Requires the Server to have the NFS role service installed.
Create a Folder Share (Homepage)
- The Shares homepage allows viewing and managing shares in Server Manager, presenting a list of all shares, associated tasks, and volumes.
- This page displays a list of shares, and enables creation of a new share using the New Share Wizard.
Select the Profile for This Share
- The New Share Wizard presents different sharing profiles:
- SMB Share - Quick
- SMB Share - Advanced
- SMB Share - Applications
- NFS Share - Quick
- NFS Share - Advanced
Select the Server and Path for This Share
- The New Share Wizard allows choosing the server and path for the share.
- Selects which volume (e.g., C:) the new folder will be created under.
- Allows entering a custom path.
Specify Share Name
- The New Share Wizard prompts for the name and description of the share.
- It indicates whether the folder to share on the local computer exists (or will be created).
- A remote path or share can also be specified.
Configure Share Settings
- Users can decide whether to Enable access-based enumeration.
- This feature allows only files and folders with read permissions to display to users
- Allows caching of shares to make them available offline, if the BranchCache for Network Files role service is installed.
- Users can decide whether to Enable BranchCache on the share.
- Users can decide whether to Encrypt data access.
Specify Permissions to Control Access
- Permissions for files accessed via a share are decided by a combination of folder permissions, share permissions, and an optional central access policy.
- Pre-defined permissions and groups are provided (e.g., CREATOR OWNER, BUILTIN\Users).
Confirm Selections
- Before creating the share, this page confirms the settings defined in the Wizard.
- Includes information like the server, share name, protocol, disk space, and whether access-based enumeration, caching, BranchCache, and encryption are disabled.
The New Share on the Shares Homepage
- The new share appears after successful creation on the Shares homepage.
Assigning Permissions
- This section covers how to configure file and share access permissions.
- Discusses Access Control List (ACLs), Access Control Entries (ACEs), and security principals.
Windows Permissions Architecture
- ACLs (Access Control Lists) regulate access to folders.
- ACEs (Access Control Entries) determine which user has what permission by connecting to the user or group.
- Security principals are users or groups identified by Windows using security identifiers (SIDs).
The Security Tab of a Properties sheet
- Enables checking and changing permissions for different user groups, such as Everyone and Creator/Owner.
Basic and Advanced Permissions
- Basic permissions are preconfigured combinations.
- Advanced permissions offer granular controls, though rarely used.
Allowing and Denying Permissions
- Additive: Starts with no permissions, then grants Allow permissions.
- Subtractive: Grants Allow permissions, then adds Deny permissions for restricted access.
Inheriting Permissions
- Permissions apply downward to subfolders and files.
Effective Access
- The combined Allow and Deny permissions determine access to an element.
- Allow permissions are cumulative; Deny overrides Allow.
- Explicit permissions take precedence over inherited permissions.
The Effective Access Tab of the Advanced Security Settings Dialog Box
- This tab provides a detailed view of the permissions for a user, group, or device account.
- It allows evaluation of the potential impact of adding a group or user.
Setting Shared Folder Permissions
- This tab in the share's properties window allows specific share permissions.
Share Permissions
- Share permissions control access to shared folders.
- Different permissions dictate actions, such as full control, change, and read.
NTFS Authorization
- NTFS and ReFS support permissions.
- Each element has an ACL that includes ACEs (Access Control Entries) that link a security principal (person or group) with permissions.
- Security principals are identified by security identifiers (SIDs).
NTFS Basic Permissions
- Full Control: Modifying folder permissions, taking ownership, and performing related actions.
- Modify: Deleting/modifying folder(s).
- Read & Execute: Navigating and running applications within folders.
- Read: Viewing file contents, their ownership, permissions details
- Write: Creating, modifying (overwriting), attributes.
Configuring NTFS Quotas
- Enables administrators to set space restrictions for users on a volume.
- Users exceeding the limit can be either denied access or warned.
How NTFS Security and Shared Permissions Work Together
- When configuring a shared folder, both NTFS permissions (file/folder level) and shared permissions (network access) must be set up.
- When these two permissions conflict, local permissions (NTFS) take precedence.
Volume Shadow Copies
- Allows maintaining previous versions of files and folders.
- Enables reverting to earlier versions if accidentally deleted or overwritten.
- Applicable to volumes only, not individual files/folders.
NTFS Security and Shared Permissions Example
- The presentation provides an example to calculate the effective permissions for a user based on the combination of NTFS permissions and share permissions, and the hierarchy of permissions.
Volume Shadow Copies
- Allows maintaining previous versions of files on a server.
- A copy of a file is accessible even if it is deleted or overwritten.
- Can be applied to entire volumes only.
NTFS Quotas
- Enable administrators to set storage limits for users on a volume.
- Users exceeding the limit may be denied access or warned.
NTFS Basic Permissions—Additional Examples
- List Folder Contents: Viewing the names of subfolders and files within a folder.
- Read: Viewing files and subfolder contents, ownership, permissions, and attributes of a folder.
- Write: Creating new files and subfolders within a target folder, modifying folder attributes, and viewing ownership and permissions.
- Modify: Modifying file/folder attributes and deleting.
- Read & Execute: Navigating folders to access other files/folders, running applications.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on Windows permissions architecture and file-sharing settings with this comprehensive quiz. Explore topics such as inheritance of permissions, NTFS permissions, and the capabilities of security principals in Windows environments.