William Stanek - Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant

Здесь есть возможность читать онлайн «William Stanek - Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: ОС и Сети, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Windows Server 2012 R2 Pocket Consultant: Storage, Security, & Networking is designed to be a concise and compulsively usable resource for Windows administrators, developers, and programmers, and for anyone else who wants to use the storage, networking, and security features of Windows Server 2012 R2. This is the readable resource guide that you’ll want on your desk or in your pocket at all times. The book discusses everything you need to perform core tasks. Because the focus is directed on providing you with the maximum value in a pocket-sized guide, you don’t have to wade through hundreds of pages of extraneous information to find what you’re looking for. Instead, you’ll find exactly what you need to get the job done.

Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

with files and folders, start File Explorer.

2.Press and hold or right-click the object with which you want to work, and then tap or click Properties. In the Properties dialog box, tap or click the Security tab.

3.Tap or click Advanced to display the Advanced Security Settings dialog box.

4.On the Permissions tab, tap or click Enable Inheritance, and then tap or click OK. Note that the Enable Inheritance button is available only if permission inheritance currently is disabled.

File and folder permissions

NTFS permissions are always evaluated when a file is accessed On NTFS and ReFS - фото 66

NTFS permissions are always evaluated when a file is accessed. On NTFS and ReFS volumes, you can set security permissions on files and folders to grant or deny access to the files and folders. Because Windows Server 2012 R2 adds new layers of security, NTFS permissions now encompass the following:

Basic permissions

Claims-based permissions

Special permissions

You can view NTFS permissions for files and folders by following these steps:

1.In File Explorer, press and hold or right-click the file or folder with which you want to work, and then tap or click Properties. In the Properties dialog box, tap or click the Security tab.

2.In the Group Or User Names list, select the user, computer, or group whose permissions you want to view. If the permissions are not available (dimmed), the permissions are inherited from a parent object.

Shared folders have both share permissions and NTFS permissions. You can view the underlying NTFS permissions for shared folders by following these steps:

1.In Server Manager, the Shares subnode of the File And Storage Services node shows existing shares for file servers that have been added for management.

2.Press and hold or right-click the folder with which you want to work, and then tap or click Properties to display a Properties dialog box.

3.When you tap or click Permissions in the left pane, the current share permissions and NTFS permissions are shown in the main pane.

4.To get more information, tap or click Customize Permissions to open the Advanced Security Settings dialog box.

On file servers running Windows Server 2012 R2, you can also use central access policies to precisely define the specific attributes that users and devices must have to access resources.

Understanding file and folder permissions

The basic permissions you can assign to files and folders are summarized in Table 4–2. File permissions include Full Control, Modify, Read Execute, Read, and Write. Folder permissions include Full Control, Modify, Read Execute, List Folder Contents, Read, and Write.

TABLE 4–2File and folder permissions used by Windows Server 2012 R2

PERMISSION MEANING FOR FOLDERS MEANING FOR FILES
Read Permits viewing and listing files and subfolders Permits viewing or accessing a file’s contents
Write Permits adding files and subfolders Permits writing to a file
Read + Execute Does not permit viewing the contents of files. You can list file and folder names, but you can’t open files to read, nor can you execute files if that execute requires opening the file (as in a batch or PS1 file). Inherited by files and folders. Permits viewing and accessing a file’s contents in addition to executing a file
List Folder Contents Permits viewing and listing file names and subfolder names in addition to executing files; inherited by folders only Not applicable
Modify Permits reading and writing of files and subfolders; allows deletion of the folder Permits reading and writing of a file; allows deletion of a file
Full Control Permits reading, writing, changing, and deleting files and subfolders Permits reading, writing, changing, and deleting a file

Any time you work with file and folder permissions, you should keep the following in mind:

Read is the only permission needed to run scripts. Execute permission doesn’t matter.

Read access is required to access a shortcut and its target.

Giving a user permission to write to a file but not to delete it doesn’t prevent the user from deleting the file’s contents.

If a user has full control over a folder, the user can delete files in the folder regardless of the permission on the files.

The basic permissions are created by combining special permissions in logical groups. Table 4–3 shows special permissions used to create the basic permissions for files. By using advanced permission settings, you can assign these special permissions individually, if necessary. As you study the special permissions, keep the following in mind:

By default, if no access is specifically granted or denied, the user is denied access. Further, if a permission has been explicitly denied, the deny will override any permission grant.

Actions that users can perform are based on the sum of all the permissions assigned to the user and to all the groups of which the user is a member. For example, if the user GeorgeJ has Read access and is a member of the group Techies, which has Change access, GeorgeJ will have Change access. If Techies is a member of Administrators, which has Full Control, GeorgeJ will have complete control over the file. However, if GeorgeJ has been explicitly denied a permission, the deny will override any grant.

TABLE 4–3Special permissions for files

SPECIAL PERMISSIONS FULL CONTROL MODIFY READ+EXECUTE READ WRITE
Traverse Folder/Execute File Yes Yes Yes
List Folder/Read Data Yes Yes Yes Yes
Read Attributes Yes Yes Yes Yes
Read Extended Attributes Yes Yes Yes Yes
Create Files/Write Data Yes Yes Yes
Create Folders/Append Data Yes Yes Yes
Write Attributes Yes Yes Yes
Write Extended Attributes Yes Yes Yes
Delete Subfolders And Files Yes
Delete Yes Yes
Read Permissions Yes Yes Yes Yes Yes
Change Permissions Yes
Take Ownership Yes

Table 4–4 shows special permissions used to create the basic permissions for folders. As you study the special permissions, keep in mind that when you create files and folders, these files and folders inherit certain permission settings from parent objects. These permission settings are shown as the default permissions.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant»

Представляем Вашему вниманию похожие книги на «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant»

Обсуждение, отзывы о книге «Windows Server 2012 R2 Storage, Security, & Networking Pocket Consultant» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x