当前位置:网站首页>NTFS security permissions
NTFS security permissions
2022-07-04 04:58:00 【Liang Chenxing】
List of articles
NTFS Summary of permissions
1. By setting NTFS Authority , Realization ( Limit ) Different users have different permissions to access different objects .
2. After assigning the correct access rights , Users can access their resources .
3. Set permissions to prevent resources from being tampered with , Delete .
File System Overview
A file system is a method of organizing files on an external storage device .
Common file systems :
- FAT windows
- NTFS windows
- EXT Linux common
NTFS characteristic
1. Improve disk read and write performance .
2. reliability .
Encrypted file system
Access control list ( Set the permissions )
3. Disk utilization .
Compress
Disk quota
4. Support single file larger than 4 individual G.
modify NTFS jurisdiction
Cancel permission inheritance
effect : After the cancellation , You can modify the permission list at will .
Method : Folder right click Properties —— Security —— senior —— Remove the first check mark — Select copy .
File and folder permissions
File permissions :
Folder permissions :
Case study :
establish jimi Folder , And set up NTFS jurisdiction , requirement a Users can only read files in folders , Can't be in jimi Create a new file in the folder ,b Users can only use jimi Create a new file in the folder , Can't read file .
Authority accumulation
When users belong to multiple groups at the same time , Permissions are cumulative !
Case study :
user a Belong to at the same time IT and HR Group ,IT Groups can pair folders jimi Read ,HR Groups can write to folders , be a The final permissions of the user are read and write .
Refuse maximum
When user permissions accumulate , If permission is denied , Refuse maximum !
Case study :
user a It belongs to the finance department , The members of the finance department are 10 Users , The finance department organizes the documents xxx Have access to , Current requirements a Users cannot leave the financial department group , Simultaneous requirements a No access to folder xxx Authority .
Take ownership
Only by default administrator You have the right to !
effect : You can change the owner of any folder to administrator.
Case study :
user a Resigned , but xxx The folder belongs to a, because a The user to xxx Permission modification has been made to the folder , Cause other users to xxx The folder does not have any permissions , Now you need an administrator administrator Users will xxx Modify folder permissions again .
Forced inheritance
effect : Forced inheritance of parent-child relationship !
Method : Right click folder properties – Security – senior – Tick the second check mark , that will do !
Case study :
xxx How high are subfolders and files in a folder , Due to long-time permission management , The permissions of multiple subfolders have been modified differently , Now we need xxx The permissions of all sub files and folders under are unified .
Impact of file replication on permissions
After the file is copied , The permissions of the file will be overwritten by the permissions of the target folder .
This chapter exercises :
1. Create a folder , Realization tom Users can only create new files ,jack Users can only read and download files .
2. Will the user a Add to ceo Group , And cannot be deleted from this group , For folder jimi Grant authority , requirement ceo The group can completely control jimi Folder , but a Cannot access this folder .
3. Ordinary users create files , And set permissions , And the administrator is not given any permission , After the administrator logs in to the system , The file can be deleted successfully ,
4. Practice forced inheritance , And verify the success .
边栏推荐
- 【MATLAB】MATLAB 仿真 — 低通高斯白噪声
- Annex 4: scoring criteria of the attacker docx
- Annex I: power of attorney for 202x XXX attack and defense drill
- appliedzkp zkevm(13)中的Public Inputs
- 【MATLAB】通信信号调制通用函数 — 插值函数
- Download kicad on Alibaba cloud image station
- 在代码中使用度量单位,从而生活更美好
- 附件三:防守方评分标准.docx
- Use units of measure in your code for a better life
- appliedzkp zkevm(11)中的EVM Proof
猜你喜欢

Deep parsing structured exception handling (SEH) - by Matt Pietrek

通过dd创建asm disk

在代码中使用度量单位,从而生活更美好

令人头痛的延时双删

Annexe VI: exposé sur les travaux de défense. Docx

How to build your own knowledge engine? Community open application

Can closed data be deleted by DBCA? can

How do good test / development programmers practice? Where to go

附件六:防守工作簡報.docx

NTFS 安全权限
随机推荐
6-5漏洞利用-SSH弱口令破解利用
rac删除损坏的磁盘组
Acwing game 58
Several smart watch related chips Bluetooth chip low power consumption
附件六:防守工作简报.docx
【MATLAB】通信信号调制通用函数 — 窄带高斯白噪声的生成
Formatted text of Kivy tutorial (tutorial includes source code)
【MATLAB】MATLAB 仿真 — 低通高斯白噪声
The paddlehub face recognition scheme is deployed, and the trained model is deployed and applied in pytchrom
附件三:防守方评分标准.docx
Network equipment emergency response Guide
Self sharing of a graduate
【MATLAB】MATLAB 仿真数字基带传输系统 — 双极性基带信号(第 I 类部分响应波形)的眼图
PaddleHub人脸识别方案部署,将训练好的模型在pytchrom中进行部署应用
Capturing and sorting out external Fiddler -- Conversation bar and filter
红队视角下的防御体系突破之第二篇案例分析
Network - vxlan
中职组网络安全—内存取证
Annex I: power of attorney for 202x XXX attack and defense drill
【MATLAB】通信信号调制通用函数 — 带通滤波器