Difference between Share Permissions and Security NTFS Folder Permissions

What is the main difference between share and security in
1. 2003 server and above:
2. How in Organisations share data folder for users
AS per me i Have following conclusion 
1.
Yes - Always open up Share permissions to Everyone-Full and the ACL (apply permissions) to the actual data
folders (must be NTFS). With NT4 and W2000 you can leave the Share permissions at default when you create them and just ACL the NTFS data structures.
With W2003, the default Share permission is locked down to Read, and as Share permissions over-ride NTFS permissions,
even if you have Write access in the data folders, accessing via the Share will restrict to Read-Only, so you must open up the Share permissions on all new W2003 Shares that you create.
2.
Yes you can. Share the top level directory of your data. Open up the Share permissions to Everyone - Full,
and then ACL the sub-folders appropriately for you different user access requirements. Don't permission (ACL) any data with 'Everyone' always use Groups (or users if you must...e.g. Home Directories), and at minimum for 'public' data use 'Authenticated Users'.
Users will all be able to access the share, but only access folders and data that you allow via the NTFS permissions (ACLs).
The only other way is to create separate shares for each different access requirement - a pain and none too
flexible. Also if with W2K3 you leave the default Share permission (Read), even though you grant 'Write' NTFS permissions on the data, your users won't be able to write new data or make changes if they access via the Share, as Share permissions over-ride the
NTFS permissions.
If You have any other options so please suggest me or otherwise mark it as Answer 

Sounds good. :)
Arnav Sharma | http://arnavsharma.net/ Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading
the thread.

Similar Messages

  • Difference between "Empty trash" and "Secure Empty trash"

    Hi everyone,
    Today I used the "Secure Empty Trash" function by pressing the options key while "right clicking" on the trash. And in the message it said that if I empty the trash that way, I won't be able to recover the data. Which is what I wanted and is ok. But then the way it's said makes you think that if you don't do it that way then the normal "Empty Trash" doesn't really empty the trash and gives you the possibility of take the data back even after emptying the trash.
    I know some programs can help you do that. Either they recuperate the data after being installed separately or it's a sort of backup program like some by Norton on Windows were basically it backs up the Windows trash. But my question is, when they say with the "Empty Trash" message that you can recuperate the data, does it mean with one of those external programs or is there a hidden folder somewhere on Mac OS X where I can find all the stuff that ever went in my trash ?
    Thanks for your help !

    emptying the trash the normal way, deletes the reference of where the files exist on the hard disk, and shows the space these files occupy as empty space, now its deleted, and you can use whatever space these files used before deleting them, but you can use some pro apps that recover lost data, specially in case of mistaken deletion, as long as the sectors these files used on the hard disk were not used to store on by other data.
    while emptying the trash securely, does the same of normal emptying but it makes an additional step of over writing the sectors of the hard used by these data an amount of times, so its impossible for pro apps that recover data to read anything was stored on the hard disk after secure deletion.

  • Difference between Smart Mailbox and Smart Mailbox Folder

    What are the reason(s) for using one over the other?

    I know it's a bit less than obvious, but they're not equivalent or an "either/or". A "Smart Mailbox Folder" allows you to put your Smart Mailboxes into folders for grouping purposes. For instance, you could have a Smart Mailbox that collects all your messages to and from a friend of yours named "Sam", one that collected message to and from "Frieda", etc. and collect them all in a Smart Mailbox Folder titled "Friends". It's strictly an organization thing, for your own convenience, sort of like putting playlists in folders in iTunes, if you're familiar with that. If you only have a couple of Smart Mailboxes, a Smart Mailbox Folder probably won't be of much help, but if you have a bunch of Smart Mailboxes, organizing them into folders might be useful.
    Hope this explains things.
    Regards.
    Message was edited by: Dave Sawyer

  • What is difference between distribution list and share point group? Can we add distribution list into person and group column of share point list?

    what is difference between distribution list and share point group? Can we add distribution list into person and group column of share point list?

    there is a workaround you can try, create audience and add DL to them and deal with the audience or convert DL to groups
    https://social.technet.microsoft.com/Forums/en-US/02f0d773-8188-4d94-a448-0c04d838b0cf/distribution-lists-in-sharepoint?forum=sharepointgenerallegacy
    Kind Regards,
    John Naguib
    Technical Consultant/Architect
    MCITP, MCPD, MCTS, MCT, TOGAF 9 Foundation
    Please remember to mark your question as answered if this solves your problem

  • Differences between SharePoint 2007 and 2013 security options?

    Hi,
    We just did a test upgrade from Sharepoint 2007 to Sharepoint 2013 by copying over the content database. One thing we are noticing is that users who had permissions to upload to a document library no longer have that option in 2013. Is there a difference
    between the 2007 and 2013 "contribute" permission?
    What can I do to fix this issue?
    thanks,
    Sherazad

    their is no difference between 2007 & 2013 for Contribute premission.
    Contribute having the same rights in 2007 and 2010.
    Read permissions, plus:
    Add Items
    Edit Items
    Delete Items
    Delete Versions
    Browse Directories
    Edit Personal User Information
    Manage Personal Views
    Add/Remove Personal Web Parts
    Update Personal Web Parts
    You can further check here:
    SP 2013: http://technet.microsoft.com/en-us/library/cc721640.aspx
    Moss 2007: http://technet.microsoft.com/en-us/library/cc721640(v=office.12).aspx
    May be you edit the Contribute permission level, make sure its on its default.
    Please remember to mark your question as answered &Vote helpful,if this solves/helps your problem. ****************************************************************************************** Thanks -WS MCITP(SharePoint 2010, 2013) Blog: http://wscheema.com/blog

  • Differences between Classic BW and HANA on BW?

    Dear Friends,
    can we discuss here what are main difference between classic BW and HANA on BW?
    Please share your thoughts who was involved in RAMPup.
    already know some differences IMDB DSO, Cube, still some gaps are not clarify till i install BW on HAN
    thanks
    rao

    First of all , HANA Enterprise Extend edition DOES NOT Meets all  BW features.
    There are no best scenario, it is dependent on scenarios.HANA SPS3 scenarios would be great fit  for Agile Data mart however BW on HANA would be great fit for EDW scenarios.
    For users who already have BW with BWA, BW on HANA bring performance improvement on the other side of equation (ETL side)  along with query improvement.
    At high level, following are some of techinal issues with using HANA SPS 3 as "One fit for all" :
    1. Currently, there is no reporting tool available which can recogonize variable functionality of HANA. One may use universe variable functionality however the functionality will not provide all exhaustive options.
    2. Currently Hierarchies cannot be recogonized by any of reporting tools.
    3. Currently Data Level security options in HANA is limited.
    Another dimension to consider is if you have planning application,Integrated Planning is currently supported and BPC will be supported soon (the scenario is only possible BW on HANA).
    Hope this is helpful.
    PS:
    Regarding HANA 1.0 SPS3, for your below scenario:
    SAP & non SAP  -  BODS 4.0 -- HANA 1.0 SPS3 -- BI 4.0( Any front end ODBC support )
    you will need BODS 4.1 version.

  • Difference between File adapter and FTP adapter

    hi,
    I would like to know what is the difference between File adapter and FTP adapter
    thanks
    Yatan

    Both file and ftp adapters are non-concurrent jca adaps, however we go for file adapters mostly when you have files on your local environment and do not need to wait for someone to FTP the files on a timely basis. In case of FTP Adapter, we would need an FTP Server, a remote location with access where in files pitch in for polling.
    Also, File adapter is dependent on the local folder and OS, however FTP adapter is dependent on the local as well as the remote file system/OS/folder permissions/user access.

  • Folks would somebody be able to define difference between BI mobile and Afaria?

    I am looking for differences between BI Mobile and SAP Afaria, in a sense of Do's and Don'ts what they both can do and what they can't if compared with each other.
    If anyone has any knowledge on it and would like to share it would be great help, Thanks.

    FYI:  SAP has now realized the value of combining Mobile Analytics and Mobile Device/App Management, and has created an offering called "Mobile Secure BI Edition".
    This is a bundle of Lumira Desktop/Cloud, Afaria, and Mocana Mobile App Protection.  This will be announced at Sapphire, and launched in Q3 '14.
    -Paul Horan-

  • What is difference between transport protocol and message protocol

    what is difference between transport protocol and message protocol
    please give definition and small explanation

    Hi,
    Transport protocol gives information about outside of message details, kind of system, security details.
    A transport protocol is a network protocol that has the capability of transferring some payload from one node to another, thus providing some level of transparency from the underlying network.
    Transport protocols are used as a mechanism to move payloads around a network. Typically, a payload will have a transport binding associated with it. For example, SOAP (acting as a payload) has a predetermined binding for HTTP (a transport protocol).
    Some common transport protocols include: HTTP, HTTP-R, SMTP and BEEP.
    Message protocol gives you an idea of message type XI payload
    http://help.sap.com/saphelp_nw04/helpdata/en/b6/0b733cb7d61952e10000000a11405a/content.htm

  • Difference between Temp table and Variable table and which one is better performance wise?

    Hello,
    Anyone could you explain What is difference between Temp Table (#, ##) and Variable table (DECLARE @V TABLE (EMP_ID INT)) ?
    Which one is recommended to use for better performance?
    also Is it possible to create CLUSTER and NONCLUSTER Index on Variable table?
    In my case: 1-2 days transactional data are more than 3-4 Millions. I tried using both # and table variable and found table variable is faster.
    Is that Table variable using Memory or Disk space?
    Thanks Shiven:) If Answer is Helpful, Please Vote

    Check following link to see differences b/w TempTable & TableVariable: http://sqlwithmanoj.com/2010/05/15/temporary-tables-vs-table-variables/
    TempTables & TableVariables both use memory & tempDB in similar manner, check this blog post: http://sqlwithmanoj.com/2010/07/20/table-variables-are-not-stored-in-memory-but-in-tempdb/
    Performance wise if you are dealing with millions of records then TempTable is ideal, as you can create explicit indexes on top of them. But if there are less records then TableVariables are good suited.
    On Tables Variable explicit index are not allowed, if you define a PK column, then a Clustered Index will be created automatically.
    But it also depends upon specific scenarios you are dealing with , can you share it?
    ~manoj | email: http://scr.im/m22g
    http://sqlwithmanoj.wordpress.com
    MCCA 2011 | My FB Page

  • What's difference between iphone 4 and 4s?

    i bought an iphone 4 9months ago and the software was upgraded to iOS5 last month. since then i noticed that by the time i used to connect my iphone into my pc the itunes did not sync so i'd just tolerate as not a big deal for me... this is the problem that i have. yesterday evening, my iphone 4 was connected to my pc at the same downloading viber again from itunes at the moment i wanted to disconnect my iphone its dead! shut it off. i kept on switching evry10sec but there was no power. i knew there's enough battery as it connected in my pc. well, i gave up and leave it but 36hrs after when i'd tried again to switch on i saw on the lcd battery icon is red So i've charged immediately. now fine! i just want to share with you this experience... why its like this. Thanks there.

    what's difference between iphone 4 and 4s?
    Go here and see what's new:  http://www.apple.com/iphone/

  • Group Policy won't apply, No mapping between account names and security IDs was done.

    I am using Group Policy Preferences to remove users from the local admin group and add a local admin account.  This GPO is working on 90% of the Win7 machines on the network, but three laptops are not accepting the GPO.  I get the following error:
    Log Name:      Application
    Source:        Group Policy Local Users and Groups
    Date:          6/24/2014 8:49:28 AM
    Event ID:      4098
    Task Category: (2)
    Level:         Warning
    Keywords:      Classic
    User:          SYSTEM
    Computer:      laptop1.internal.com
    Description:
    The user 'Administrators' preference item in the 'Local Admin Policy - Remove Permissions {593ACD77-3663-4023-BEB8-938D83F7862E}' Group Policy object did not apply because it failed with error code '0x80070534 No mapping between account names and security
    IDs was done.' This error was suppressed.
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
        <Provider Name="Group Policy Local Users and Groups" />
        <EventID Qualifiers="34305">4098</EventID>
        <Level>3</Level>
        <Task>2</Task>
        <Keywords>0x80000000000000</Keywords>
        <TimeCreated SystemTime="2014-06-24T13:49:28.000000000Z" />
        <EventRecordID>68771</EventRecordID>
        <Channel>Application</Channel>
        <Computer>laptop1.internal.com</Computer>
        <Security UserID="S-1-5-18" />
      </System>
      <EventData>
        <Data>user</Data>
        <Data>Administrators</Data>
        <Data>Local Admin Policy - Remove Permissions {593ACD77-3663-4023-BEB8-938D83F7862E}</Data>
        <Data>0x80070534 No mapping between account names and security IDs was done.</Data>
      </EventData>
    </Event>
    I've searched high and low for an answer and nothing I find on-line seems to apply.  I also notice that the option to 'Run as Administrator' does not work.  If I right-click on cmd.exe and select 'run as administrator', the command box opens but
    I am not prompted for credentials and the command box does not have admin rights.  Not sure if this is related or not.
    Any help on this would be greatly appreciated.
    Thanks,
    Joe

    Hi,
    Delete your  remove action from the GPP and push it again, does this issue still occur?
    If it still exists, let’s collect the GPP log for analysis:
    Group policy Preference debug logging policy settings are located under:
    Computer Configuration\Administrative Templates\System\Group Policy
    Click Logging and tracing, select local users and group preference logging and trace.
    Meanwhile, just a similar issue, but it is worth trying:
    A user is added to the wrong group on a client computer that is running Windows 7 or Windows Server 2008 R2
    http://support.microsoft.com/kb/2280515
    If you have any feedback on our support, please click
    here
    Alex Zhao
    TechNet Community Support

  • Difference between SSA2.0 and 2.1

    Hi,
    Is there any note that explains the major differences between 2.0 and 2.1 both in terms of data model and SSA UI settings? I see that a few of options I had in 2.0 are missing in 2.1.
    Thanks,
    Voodi

    Hi Voodi,
    There are 2 parts to your question.
    Primary Role - This concept does not exist in SPM 2.1  This was used in 2.0 to specify which Browse menu (Content Tree) to display.  In SPM 2.1 there is only one Browse menu (Content Tree).
    Data Source - This concept still exists in SPM 2.1  This is used to determine which 'Dimensions & Measures' are displayed when user wants to create new reports.
    So in your case (when using a SPM 2.1 system) you would select the detail data source to create a new detail report and save it under the 'Detail Report' folder, next under measure properties select a specific measure -> under Detail Reports tab you select the detail report created to link it to this measure, provided you are an administrator.
    So basically the functionality still exists to create a new detail report and link it to a measure.
    Regards,
    Rohit

  • Difference between new network and extended network

    Difference between extended network and new network settings

    An "extended" network acts as one large wireless network. Wireless devices can roam anywhere a signal is present and stay on the network without having to make any changes.
    A "new" network will require that a wireless device manually "switch" to that network and enter the password for the network to connect whenever you want to use that network. In other words, a "new" network will use a different wireless network name and password, which will require that you manually log on to that network.
    The exception would be if you created a "new" wireless network and used the same wireless network name, same wireless security settings and same password as the "main" network and connected the AirPort back to the main router using an Ethernet cable. In that case, you would have an "Ethernet extended wireless" network.

  • Difference between BPC 5 and 7 ms

    Hello all,
    I have found documents about the bpc 7ms but however im looking for whats the difference between bpc 5 and bpc 7ms systems, new features and so on. Do anyone have information about this. Please Share =)
    Cheers
    Jojo

    hI,
    Right now BPC 5.1 is going on in the market, and BPC 7.0 NW version is in rampup.
    BPC 5.1 is the Microsoft version which uses the microsoft tools (Excel,powerpoint,etc) and the backend is SQL server, while BPC7.0 will be having both Microsoft version and Netweaver version.Here Microsoft version will be same as for BPC 5.1 with some advancements,while for NW version the backend will be BI.
    Between BPC 7.0NW and BPC 5.1
    What is In
    Integration with NetWeaver BI
    Increased dimensionality
    New Validations engine
    Integration with BI Accelerator
    Improved dynamic templates
    Lifecycle Management (transports)
    Statistics framework for monitoring
    64-bit ABAP A/S support
    Database neutrality
    Debugging capabilities (ABAP only)
    What is Out
    BPFs
    Books
    Drill-Through
    Dynamic Hierarchy Editor
    Insight
    SQL-Logic in Script Logic
    Some EV functions
    Ability to rename a member, delete a member being used, reduce the length of a property
    Custom Menus
    Thanks,
    Anila

Maybe you are looking for