December 2019
Beginner
510 pages
12h 7m
English
We have already identified that NTFS permissions are effective both locally and over the network. Therefore, what if a user tries accessing a resource where the two sets of permissions conflict with each other? We perform a three-step process to identify the effective permission:
I'm going to give an example here to reinforce this. A user is in the groups listed:
|
Group |
Share permission |
NTFS permission |
|
Sales |
Full Control |
Read |
|
Managers |