当前位置:网站首页>NTFS security permissions
NTFS security permissions
2022-07-04 04:58:00 【Liang Chenxing】
List of articles
NTFS Summary of permissions
1. By setting NTFS Authority , Realization ( Limit ) Different users have different permissions to access different objects .
2. After assigning the correct access rights , Users can access their resources .
3. Set permissions to prevent resources from being tampered with , Delete .
File System Overview
A file system is a method of organizing files on an external storage device .
Common file systems :
- FAT windows
- NTFS windows
- EXT Linux common
NTFS characteristic
1. Improve disk read and write performance .
2. reliability .
Encrypted file system
Access control list ( Set the permissions )
3. Disk utilization .
Compress
Disk quota
4. Support single file larger than 4 individual G.
modify NTFS jurisdiction
Cancel permission inheritance
effect : After the cancellation , You can modify the permission list at will .
Method : Folder right click Properties —— Security —— senior —— Remove the first check mark — Select copy .
File and folder permissions
File permissions :
Folder permissions :
Case study :
establish jimi Folder , And set up NTFS jurisdiction , requirement a Users can only read files in folders , Can't be in jimi Create a new file in the folder ,b Users can only use jimi Create a new file in the folder , Can't read file .
Authority accumulation
When users belong to multiple groups at the same time , Permissions are cumulative !
Case study :
user a Belong to at the same time IT and HR Group ,IT Groups can pair folders jimi Read ,HR Groups can write to folders , be a The final permissions of the user are read and write .
Refuse maximum
When user permissions accumulate , If permission is denied , Refuse maximum !
Case study :
user a It belongs to the finance department , The members of the finance department are 10 Users , The finance department organizes the documents xxx Have access to , Current requirements a Users cannot leave the financial department group , Simultaneous requirements a No access to folder xxx Authority .
Take ownership
Only by default administrator You have the right to !
effect : You can change the owner of any folder to administrator.
Case study :
user a Resigned , but xxx The folder belongs to a, because a The user to xxx Permission modification has been made to the folder , Cause other users to xxx The folder does not have any permissions , Now you need an administrator administrator Users will xxx Modify folder permissions again .
Forced inheritance
effect : Forced inheritance of parent-child relationship !
Method : Right click folder properties – Security – senior – Tick the second check mark , that will do !
Case study :
xxx How high are subfolders and files in a folder , Due to long-time permission management , The permissions of multiple subfolders have been modified differently , Now we need xxx The permissions of all sub files and folders under are unified .
Impact of file replication on permissions
After the file is copied , The permissions of the file will be overwritten by the permissions of the target folder .
This chapter exercises :
1. Create a folder , Realization tom Users can only create new files ,jack Users can only read and download files .
2. Will the user a Add to ceo Group , And cannot be deleted from this group , For folder jimi Grant authority , requirement ceo The group can completely control jimi Folder , but a Cannot access this folder .
3. Ordinary users create files , And set permissions , And the administrator is not given any permission , After the administrator logs in to the system , The file can be deleted successfully ,
4. Practice forced inheritance , And verify the success .
边栏推荐
- 海力士EMMC5.0及5.1系列对比详解
- Correct the classpath of your application so that it contains a single, compatible version of com.go
- 关于solidworks standard无法获得许可 8544问题的总结
- 【MATLAB】MATLAB 仿真模拟调制系统 — SSB 系统
- Annexe VI: exposé sur les travaux de défense. Docx
- C basic (VII) document operation
- Technology Management - learning / practice
- GUI application: socket network chat room
- Secondary vocational group network security - memory Forensics
- Acwing game 58
猜你喜欢
The five pictures tell you: why is there such a big gap between people in the workplace?
定制一个自己项目里需要的分页器
Developing mqtt access program under QT
RPC - grpc simple demo - learn / practice
C basic (VII) document operation
20000 words will take you to master multithreading
How to build your own knowledge engine? Community open application
PostgreSQL 正式超越 MySQL,这家伙也太强了吧!
Change the background color of Kivy tutorial (tutorial includes source code)
中職組網絡安全—內存取證
随机推荐
中科磐云—数据分析与取证数据包flag
Developing mqtt access program under QT
Annex II: confidentiality agreement for offensive and defensive drills docx
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
Share some of my telecommuting experience
Beipiao programmer, 20K monthly salary, 15W a year, normal?
【MATLAB】MATLAB 仿真 — 模拟调制系统 之 AM 调制过程
附件2-2保密承诺书.docx
Definition of DCDC power supply current
Acwing game 58
测试 CS4344 立体声DA转换器
附件六:防守工作简报.docx
Annex 2-2 confidentiality commitment docx
【MATLAB】通信信号调制通用函数 — 带通滤波器
Deep understanding of redis -- bloomfilter
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
"Don't care too much about salary when looking for a job", this is the biggest lie I've ever heard
The paddlehub face recognition scheme is deployed, and the trained model is deployed and applied in pytchrom
Self sharing of a graduate
Secondary vocational group network security - memory Forensics