Jump to content

Permissions on large file server


Recommended Posts

Guest Andrew Hodgson
Posted

Hi all,

 

I have a question about permissions on a large file server we have at

the office.

 

We set up the server with a large drive (d:), and have the default

permissions on the root of the volume. We created directories in the

volume, and defined explicit permissions, blocking inheritance, and

removed all the default permissions barring the domain administrator,

the groups that need access to the relevant folder, and the local

administrator. We then shared the relevant directories out using

share permissions as the relevant groups that need access.

 

In the directories holding user profiles and the folders for the My

Documents redirection, we created the relevant folders and added the

relevant admin accounts to the list. We then added the domain users

group to be able to view directories under this folder, but defined

that this should only apply to the folder and nothing underneath it.

This works well - when we create a user, we create the folder, and

give the relevant user full control of the folder. The domain users

group does not appear in this folder, and the parent permissions are

inherited.

 

We are now wanting to take this a step further, by looking at how

specific users can gain access to the relevant folders for

administrative purposes, such as to change permissions on the relevant

folders (all folders on the server), without having to log in as the

domain administrator. We are quite happy if they could log in under

another domain account which has the relevant rights to do this, we

just need them to log in under an account which will be audited,

unlike the domain admin account, where anyone who knows the relevant

passwords can gain access therein.

 

Also, if there is a more secure way of doing the permissions for the

relevant profile/redirection directories, I would be interested to

know. We have seen for example that Vista (if left to create the

relevant directories) seems to set explicit permissions to the user,

barring the administrator or anyone else from accessing the files

underneath (unless the admin takes ownership of the folder).

 

We are using Windows Server 2003 R2 (SP2). Our domain is Windows

Server 2008 native, so if there would be any advantage in us upgrading

the file server to that, we would be interested to know.

 

Looking forward to anyone's thoughts in this matter,

Thanks,

Andrew.

  • Replies 1
  • Created
  • Last Reply

Popular Days

Guest Lanwench [MVP - Exchange]
Posted

Re: Permissions on large file server

 

Andrew Hodgson <me3@privacy.net> wrote:

> Hi all,

>

> I have a question about permissions on a large file server we have at

> the office.

>

> We set up the server with a large drive (d:), and have the default

> permissions on the root of the volume. We created directories in the

> volume, and defined explicit permissions, blocking inheritance, and

> removed all the default permissions barring the domain administrator,

> the groups that need access to the relevant folder, and the local

> administrator. We then shared the relevant directories out using

> share permissions as the relevant groups that need access.

>

> In the directories holding user profiles and the folders for the My

> Documents redirection, we created the relevant folders and added the

> relevant admin accounts to the list. We then added the domain users

> group to be able to view directories under this folder, but defined

> that this should only apply to the folder and nothing underneath it.

> This works well - when we create a user, we create the folder and

> give the relevant user full control of the folder. The domain users

> group does not appear in this folder, and the parent permissions are

> inherited.

>

> We are now wanting to take this a step further, by looking at how

> specific users can gain access to the relevant folders for

> administrative purposes, such as to change permissions on the relevant

> folders (all folders on the server), without having to log in as the

> domain administrator. We are quite happy if they could log in under

> another domain account which has the relevant rights to do this, we

> just need them to log in under an account which will be audited,

> unlike the domain admin account, where anyone who knows the relevant

> passwords can gain access therein.

>

> Also, if there is a more secure way of doing the permissions for the

> relevant profile/redirection directories, I would be interested to

> know. We have seen for example that Vista (if left to create the

> relevant directories) seems to set explicit permissions to the user,

> barring the administrator or anyone else from accessing the files

> underneath (unless the admin takes ownership of the folder).

>

> We are using Windows Server 2003 R2 (SP2). Our domain is Windows

> Server 2008 native, so if there would be any advantage in us upgrading

> the file server to that, we would be interested to know.

>

> Looking forward to anyone's thoughts in this matter,

> Thanks,

> Andrew.

 

Dunno if this will do everything you wish, but ee

 

 

How to dynamically create security-enhanced redirected folders by using

folder redirection in Windows 2000 and in Windows Server 2003

 

http://support.microsoft.com/kb/274443

 

---

SUMMARY

In Microsoft Windows 2000 and in Microsoft Windows Server 2003, as an

administrator, you can customize desktops by using Folder Redirection. You

can redirect the following folders by using Active Directory and Group

Policy:

.. Application Data

.. Desktop

.. My Documents

.. My Documents/My Pictures

.. Start Menu

You can find more information about Folder Redirection by searching Windows

Help for Folder Redirection.

 

When you redirect folders to a shared location on a network, users need both

read and write access to this location so that the users can read the

contents these folders. However, in some scenarios, you may not want to

grant read access.

 

 

= Create security-enhanced redirected folders =

 

To make sure that only the user and the domain administrators have

permissions to open a particular redirected folder, do the following:

 

1. Select a central location in your environment where you would like to

store Folder Redirection, and then share this folder. In this example,

FLDREDIR is used.

 

2. Set Share Permissions for the Everyone group to Full Control.

 

3. Use the following settings for NTFS Permissions:

. CREATOR OWNER - Full Control (Apply onto: Subfolders and Files Only)

. System - Full Control (Apply onto: This Folder, Subfolders and Files)

. Domain Admins - Full Control (Apply onto: This Folder, Subfolders

and Files)

. Everyone - Create Folder/Append Data (Apply onto: This Folder Only)

. Everyone - List Folder/Read Data (Apply onto: This Folder Only)

. Everyone - Read Attributes (Apply onto: This Folder Only)

. Everyone - Traverse Folder/Execute File (Apply onto: This Folder

Only)

 

4. Configure Folder Redirection Policy as outlined in Windows Help. Use a

path similar to \\server\FLDREDIR\username to create a folder under the

shared folder, FLDREDIR.

 

Because the Everyone group has the Create Folder/Append Data right, the

group members have the proper permissions to create the folder; however, the

members are not able to read the data afterwards.

 

The Username group is the name of the user that was logged on when you

created the folder. Because the folder is a child of the parent folder, it

inherits the permissions that you assigned to FLDREDIR. Also, because the

user is creating the folder, the user gains full control of the folder

because of the Creator Owner Permission setting.

 

 

REFERENCES

For additional information, click the article number below to view the

article in the Microsoft Knowledge Base:

232692 (http://support.microsoft.com/kb/232692/EN-US/) Folder Redirection

Feature in Windows


×
×
  • Create New...